Submit Search
Upload
TLV - MySQL Security overview
•
3 likes
•
403 views
Mark Swarbrick
Follow
TLV - MySQL Security overview
Read less
Read more
Technology
Report
Share
Report
Share
1 of 44
Download now
Download to read offline
Recommended
MySQL Security + GDPR - 2018 MySQL Days
MySQL Security + GDPR - 2018 MySQL Days
Mark Swarbrick
MySQL + GDPR
MySQL + GDPR
Mark Swarbrick
TLV - MySQL Enterprise Edition + Cloud
TLV - MySQL Enterprise Edition + Cloud
Mark Swarbrick
TLV - Whats new in MySQL 8
TLV - Whats new in MySQL 8
Mark Swarbrick
MySQL Enterprise Monitor 3
MySQL Enterprise Monitor 3
Mark Swarbrick
MySQL HA
MySQL HA
Mark Swarbrick
Percona Live - Dublin 03 ee + cloud
Percona Live - Dublin 03 ee + cloud
Mark Swarbrick
Percona Live - Dublin 02 security + tuning
Percona Live - Dublin 02 security + tuning
Mark Swarbrick
Recommended
MySQL Security + GDPR - 2018 MySQL Days
MySQL Security + GDPR - 2018 MySQL Days
Mark Swarbrick
MySQL + GDPR
MySQL + GDPR
Mark Swarbrick
TLV - MySQL Enterprise Edition + Cloud
TLV - MySQL Enterprise Edition + Cloud
Mark Swarbrick
TLV - Whats new in MySQL 8
TLV - Whats new in MySQL 8
Mark Swarbrick
MySQL Enterprise Monitor 3
MySQL Enterprise Monitor 3
Mark Swarbrick
MySQL HA
MySQL HA
Mark Swarbrick
Percona Live - Dublin 03 ee + cloud
Percona Live - Dublin 03 ee + cloud
Mark Swarbrick
Percona Live - Dublin 02 security + tuning
Percona Live - Dublin 02 security + tuning
Mark Swarbrick
Why MySQL High Availability Matters
Why MySQL High Availability Matters
Mark Swarbrick
No sql from the web’s favourite relational database MySQL
No sql from the web’s favourite relational database MySQL
Mark Swarbrick
2016 MySQL State of the Dolphin
2016 MySQL State of the Dolphin
Mark Swarbrick
MySQL Enterprise Edition
MySQL Enterprise Edition
Mark Swarbrick
MySQL Security Best Practises
MySQL Security Best Practises
Mark Swarbrick
Percona Live - Dublin 01 my sql ha-mysql-clusters
Percona Live - Dublin 01 my sql ha-mysql-clusters
Mark Swarbrick
MySQL as a Document Store
MySQL as a Document Store
Mark Swarbrick
Developing MySQL applications in the Cloud
Developing MySQL applications in the Cloud
Mark Swarbrick
Oracle MySQL Cloud Service
Oracle MySQL Cloud Service
Mark Swarbrick
Oow MySQL Whats new in security overview sept 2017 v1
Oow MySQL Whats new in security overview sept 2017 v1
Mark Swarbrick
MySQL Enterprise Cloud
MySQL Enterprise Cloud
Mark Swarbrick
MySQL InnoDB + NDB Cluster - 2018 MySQL Days
MySQL InnoDB + NDB Cluster - 2018 MySQL Days
Mark Swarbrick
MySQL London Tech Tour March 2015 - Big Data
MySQL London Tech Tour March 2015 - Big Data
Mark Swarbrick
FOSDEM'18: MySQL InnoDB Cluster - MySQL HA Made Easy!
FOSDEM'18: MySQL InnoDB Cluster - MySQL HA Made Easy!
Miguel Araújo
Application Development with Oracle Database
Application Development with Oracle Database
gvenzl
TDC2018SP | Trilha NoSQL - Tecnicas avancadas utilizadas por redes sociais qu...
TDC2018SP | Trilha NoSQL - Tecnicas avancadas utilizadas por redes sociais qu...
tdc-globalcode
Valor diferencial de la propuesta cloud
Valor diferencial de la propuesta cloud
OracleIberia
Nuevas oportunidades de negocio en turismo
Nuevas oportunidades de negocio en turismo
OracleIberia
Why Your Customers Care About Compliance and You Should Too
Why Your Customers Care About Compliance and You Should Too
Amazon Web Services
AUSOUG Analytics Update - Nov 14 2018
AUSOUG Analytics Update - Nov 14 2018
Jason Lowe
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
Luca Martelli
A5 cloud security_now_a_reason_to_move_to_the_cloud
A5 cloud security_now_a_reason_to_move_to_the_cloud
Dr. Wilfred Lin (Ph.D.)
More Related Content
What's hot
Why MySQL High Availability Matters
Why MySQL High Availability Matters
Mark Swarbrick
No sql from the web’s favourite relational database MySQL
No sql from the web’s favourite relational database MySQL
Mark Swarbrick
2016 MySQL State of the Dolphin
2016 MySQL State of the Dolphin
Mark Swarbrick
MySQL Enterprise Edition
MySQL Enterprise Edition
Mark Swarbrick
MySQL Security Best Practises
MySQL Security Best Practises
Mark Swarbrick
Percona Live - Dublin 01 my sql ha-mysql-clusters
Percona Live - Dublin 01 my sql ha-mysql-clusters
Mark Swarbrick
MySQL as a Document Store
MySQL as a Document Store
Mark Swarbrick
Developing MySQL applications in the Cloud
Developing MySQL applications in the Cloud
Mark Swarbrick
Oracle MySQL Cloud Service
Oracle MySQL Cloud Service
Mark Swarbrick
Oow MySQL Whats new in security overview sept 2017 v1
Oow MySQL Whats new in security overview sept 2017 v1
Mark Swarbrick
MySQL Enterprise Cloud
MySQL Enterprise Cloud
Mark Swarbrick
MySQL InnoDB + NDB Cluster - 2018 MySQL Days
MySQL InnoDB + NDB Cluster - 2018 MySQL Days
Mark Swarbrick
MySQL London Tech Tour March 2015 - Big Data
MySQL London Tech Tour March 2015 - Big Data
Mark Swarbrick
FOSDEM'18: MySQL InnoDB Cluster - MySQL HA Made Easy!
FOSDEM'18: MySQL InnoDB Cluster - MySQL HA Made Easy!
Miguel Araújo
Application Development with Oracle Database
Application Development with Oracle Database
gvenzl
TDC2018SP | Trilha NoSQL - Tecnicas avancadas utilizadas por redes sociais qu...
TDC2018SP | Trilha NoSQL - Tecnicas avancadas utilizadas por redes sociais qu...
tdc-globalcode
Valor diferencial de la propuesta cloud
Valor diferencial de la propuesta cloud
OracleIberia
Nuevas oportunidades de negocio en turismo
Nuevas oportunidades de negocio en turismo
OracleIberia
Why Your Customers Care About Compliance and You Should Too
Why Your Customers Care About Compliance and You Should Too
Amazon Web Services
AUSOUG Analytics Update - Nov 14 2018
AUSOUG Analytics Update - Nov 14 2018
Jason Lowe
What's hot
(20)
Why MySQL High Availability Matters
Why MySQL High Availability Matters
No sql from the web’s favourite relational database MySQL
No sql from the web’s favourite relational database MySQL
2016 MySQL State of the Dolphin
2016 MySQL State of the Dolphin
MySQL Enterprise Edition
MySQL Enterprise Edition
MySQL Security Best Practises
MySQL Security Best Practises
Percona Live - Dublin 01 my sql ha-mysql-clusters
Percona Live - Dublin 01 my sql ha-mysql-clusters
MySQL as a Document Store
MySQL as a Document Store
Developing MySQL applications in the Cloud
Developing MySQL applications in the Cloud
Oracle MySQL Cloud Service
Oracle MySQL Cloud Service
Oow MySQL Whats new in security overview sept 2017 v1
Oow MySQL Whats new in security overview sept 2017 v1
MySQL Enterprise Cloud
MySQL Enterprise Cloud
MySQL InnoDB + NDB Cluster - 2018 MySQL Days
MySQL InnoDB + NDB Cluster - 2018 MySQL Days
MySQL London Tech Tour March 2015 - Big Data
MySQL London Tech Tour March 2015 - Big Data
FOSDEM'18: MySQL InnoDB Cluster - MySQL HA Made Easy!
FOSDEM'18: MySQL InnoDB Cluster - MySQL HA Made Easy!
Application Development with Oracle Database
Application Development with Oracle Database
TDC2018SP | Trilha NoSQL - Tecnicas avancadas utilizadas por redes sociais qu...
TDC2018SP | Trilha NoSQL - Tecnicas avancadas utilizadas por redes sociais qu...
Valor diferencial de la propuesta cloud
Valor diferencial de la propuesta cloud
Nuevas oportunidades de negocio en turismo
Nuevas oportunidades de negocio en turismo
Why Your Customers Care About Compliance and You Should Too
Why Your Customers Care About Compliance and You Should Too
AUSOUG Analytics Update - Nov 14 2018
AUSOUG Analytics Update - Nov 14 2018
Similar to TLV - MySQL Security overview
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
Luca Martelli
A5 cloud security_now_a_reason_to_move_to_the_cloud
A5 cloud security_now_a_reason_to_move_to_the_cloud
Dr. Wilfred Lin (Ph.D.)
Enterprise Mobility: Secure Containerization
Enterprise Mobility: Secure Containerization
Domenico Catalano
Chicago EPM Day-Excellence in Consolidations with HFM
Chicago EPM Day-Excellence in Consolidations with HFM
Alithya
Cómo terminar tu Planeación Financiera antes de las 6PM
Cómo terminar tu Planeación Financiera antes de las 6PM
OracleOfficeOfFinance
MySQL Group Replication
MySQL Group Replication
Mark Swarbrick
Data Management in a Microservices World
Data Management in a Microservices World
gvenzl
Overview Oracle Identity Management tijdens AMIS Simplified Security seminar
Overview Oracle Identity Management tijdens AMIS Simplified Security seminar
Getting value from IoT, Integration and Data Analytics
Next Generation Data Center Strategies
Next Generation Data Center Strategies
Venkat Nambiyur
Apouc 2014-learn-from-oracle-support
Apouc 2014-learn-from-oracle-support
OUGTH Oracle User Group in Thailand
#OOW16 - Risk Management Cloud / GRC General Session
#OOW16 - Risk Management Cloud / GRC General Session
Dane Roberts
Fast Data Overview for Data Science Maryland Meetup
Fast Data Overview for Data Science Maryland Meetup
C. Scyphers
Agile Development and DevOps in the Oracle Cloud
Agile Development and DevOps in the Oracle Cloud
jeckels
NZOUG - GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Pres...
NZOUG - GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Pres...
Sandesh Rao
AIOUG-GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Preser...
AIOUG-GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Preser...
Sandesh Rao
Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - ...
Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - ...
Nadine Schoene
(Oracle) DBA Skills to Have, to Obtain and to Nurture
(Oracle) DBA Skills to Have, to Obtain and to Nurture
Markus Michalewicz
Securing Corporate Applications and Data on Personal Devices
Securing Corporate Applications and Data on Personal Devices
Artur Alves
MySQL Clusters
MySQL Clusters
Mark Swarbrick
Social sourcing ppt
Social sourcing ppt
krittenlee
Similar to TLV - MySQL Security overview
(20)
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
A5 cloud security_now_a_reason_to_move_to_the_cloud
A5 cloud security_now_a_reason_to_move_to_the_cloud
Enterprise Mobility: Secure Containerization
Enterprise Mobility: Secure Containerization
Chicago EPM Day-Excellence in Consolidations with HFM
Chicago EPM Day-Excellence in Consolidations with HFM
Cómo terminar tu Planeación Financiera antes de las 6PM
Cómo terminar tu Planeación Financiera antes de las 6PM
MySQL Group Replication
MySQL Group Replication
Data Management in a Microservices World
Data Management in a Microservices World
Overview Oracle Identity Management tijdens AMIS Simplified Security seminar
Overview Oracle Identity Management tijdens AMIS Simplified Security seminar
Next Generation Data Center Strategies
Next Generation Data Center Strategies
Apouc 2014-learn-from-oracle-support
Apouc 2014-learn-from-oracle-support
#OOW16 - Risk Management Cloud / GRC General Session
#OOW16 - Risk Management Cloud / GRC General Session
Fast Data Overview for Data Science Maryland Meetup
Fast Data Overview for Data Science Maryland Meetup
Agile Development and DevOps in the Oracle Cloud
Agile Development and DevOps in the Oracle Cloud
NZOUG - GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Pres...
NZOUG - GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Pres...
AIOUG-GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Preser...
AIOUG-GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Preser...
Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - ...
Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - ...
(Oracle) DBA Skills to Have, to Obtain and to Nurture
(Oracle) DBA Skills to Have, to Obtain and to Nurture
Securing Corporate Applications and Data on Personal Devices
Securing Corporate Applications and Data on Personal Devices
MySQL Clusters
MySQL Clusters
Social sourcing ppt
Social sourcing ppt
More from Mark Swarbrick
MySQL NoSQL Document Store
MySQL NoSQL Document Store
Mark Swarbrick
MySQL @ the University Of Nottingham
MySQL @ the University Of Nottingham
Mark Swarbrick
InnoDb Vs NDB Cluster
InnoDb Vs NDB Cluster
Mark Swarbrick
MySQL Security & GDPR
MySQL Security & GDPR
Mark Swarbrick
Intro To MySQL 2019
Intro To MySQL 2019
Mark Swarbrick
MySQL 8
MySQL 8
Mark Swarbrick
MySQL Dublin Event Nov 2018 - MySQL 8
MySQL Dublin Event Nov 2018 - MySQL 8
Mark Swarbrick
MySQL Dublin Event Nov 2018 - State of the Dolphin
MySQL Dublin Event Nov 2018 - State of the Dolphin
Mark Swarbrick
Oracle Code Event - MySQL JSON Document Store
Oracle Code Event - MySQL JSON Document Store
Mark Swarbrick
MySQL At University Of Nottingham - 2018 MySQL Days
MySQL At University Of Nottingham - 2018 MySQL Days
Mark Swarbrick
MySQL At Mastercard - 2018 MySQL Days
MySQL At Mastercard - 2018 MySQL Days
Mark Swarbrick
MySQL 8 - 2018 MySQL Days
MySQL 8 - 2018 MySQL Days
Mark Swarbrick
MySQL Cloud - 2018 MySQL Days
MySQL Cloud - 2018 MySQL Days
Mark Swarbrick
MySQL 2018 Intro - 2018 MySQL Days
MySQL 2018 Intro - 2018 MySQL Days
Mark Swarbrick
MySQL Cluster Whats New
MySQL Cluster Whats New
Mark Swarbrick
MySQL Enterprise Cloud
MySQL Enterprise Cloud
Mark Swarbrick
More from Mark Swarbrick
(16)
MySQL NoSQL Document Store
MySQL NoSQL Document Store
MySQL @ the University Of Nottingham
MySQL @ the University Of Nottingham
InnoDb Vs NDB Cluster
InnoDb Vs NDB Cluster
MySQL Security & GDPR
MySQL Security & GDPR
Intro To MySQL 2019
Intro To MySQL 2019
MySQL 8
MySQL 8
MySQL Dublin Event Nov 2018 - MySQL 8
MySQL Dublin Event Nov 2018 - MySQL 8
MySQL Dublin Event Nov 2018 - State of the Dolphin
MySQL Dublin Event Nov 2018 - State of the Dolphin
Oracle Code Event - MySQL JSON Document Store
Oracle Code Event - MySQL JSON Document Store
MySQL At University Of Nottingham - 2018 MySQL Days
MySQL At University Of Nottingham - 2018 MySQL Days
MySQL At Mastercard - 2018 MySQL Days
MySQL At Mastercard - 2018 MySQL Days
MySQL 8 - 2018 MySQL Days
MySQL 8 - 2018 MySQL Days
MySQL Cloud - 2018 MySQL Days
MySQL Cloud - 2018 MySQL Days
MySQL 2018 Intro - 2018 MySQL Days
MySQL 2018 Intro - 2018 MySQL Days
MySQL Cluster Whats New
MySQL Cluster Whats New
MySQL Enterprise Cloud
MySQL Enterprise Cloud
Recently uploaded
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
2toLead Limited
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
shyamraj55
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
Sinan KOZAK
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Mark Billinghurst
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
BookNet Canada
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
Kalema Edgar
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Memoori
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
null - The Open Security Community
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
Florian Wilhelm
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
ngoud9212
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
comworks
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
Commit University
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April Automation LPDG
MarianaLemus7
Key Features Of Token Development (1).pptx
Key Features Of Token Development (1).pptx
LBM Solutions
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
Scott Keck-Warren
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
carlostorres15106
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
Softradix Technologies
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
Slibray Presentation
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
Miki Katsuragi
Recently uploaded
(20)
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April Automation LPDG
Key Features Of Token Development (1).pptx
Key Features Of Token Development (1).pptx
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
TLV - MySQL Security overview
1.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | How MySQL Security and Enterprise Features Assisting you with GDPR Compliance Mike Frank – MySQL Product Management Director Copyright © 2016,
Oracle and/or its affiliates. All rights reserved.
2.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle. 2
3.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Program Agenda Security Challenges MySQL Security Solutions and GDPR Overview The Details New Security Features in MySQL 8 1 2 3 4 Confidential – Oracle Internal/Restricted/Highly Restricted 3
4.
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | 89% of Organizations Experienced Data Breaches, According to New Ponemon Report Source: Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data, conducted by Ponemon Institute 4 66% of the largest businesses in the UK have suffered a cyberattack or data breach within the past twelve months Source: UK government's Cyber Security Breaches Survey 2016 25% experience a repeated breach at least one a month Source: UK government's Cyber Security Breaches Survey 2016
5.
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | Mega Breaches 429 Million identities exposed in 2015. 75% Web sites with vulnerabilities. 15% of all websites had a critical vulnerability. 9 In 2015, a record of nine mega-breaches were reported. One worlds largest 191M. (Mega-breach = more than 10 million records.) Mobile Vulnerabilities on the rise – up 214% Infection by SQL Injection still strong. Malware attacks on databases 5 Source: Internet Security Threat Report 2016, Symantec
6.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Complexity grows Risk Grows 6
7.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Regulatory Compliance • Regulations – PCI – DSS: Payment Card Data –
HIPAA: Privacy of Health Data – Sarbanes Oxley, GLBA, The USA Patriot Act: Financial Data, NPI "personally identifiable financial information” – EU General Data Protection Directive: Protection of Personal Data (GDPR) • Requirements – Continuous Monitoring (Users, Schema, Backups, etc) – Data Protection (Encryption, Privilege Management, etc.) – Data Retention (Backups, User Activity, etc.) – Data Auditing (User activity, etc.) 7
8.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Large Fines • GDPR – The greater of 20,000,000 Euros or 4% of annual revenue •
PCI – Range from $5,000 to $500,000 • HIPAA – Fines up to $400 to $50k per violation (or per record) Large Losses • $3.62 Million – Average cost of a breach • WW $141 per stolen record – The average per capita cost of data breach was $225 in the United States • Faster the data breach can be identified and contained, the lower the costs. Cost of Regulatory Compliance 8 * Ponemon Institute’s 2017 Cost of Data Breach Study: Global Overview
9.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | MySQL and European Union General Data Protection Regulation 9
10.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Introduction • The E.U. General Data Protection Regulation (GDPR) comes into effect in May 2018 • GDPR is a European Union “EU”-wide framework •
Published May 2016, Enforceable by May 2018 • Fines for GDPR violations are – The greater of 20,000,000 Euros or 4% of annual revenue (R150, A83) • Exact security controls are not specified in the GDPR – WHAT to do – Not HOW to do it Confidential – Oracle Internal 10
11.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Appropriate Security Controls • Data must be processed with controls that provide “appropriate security and confidentiality “ – Recitals of note - R74-78, R81, R83, R87, R90, A5, A24-25, A28, A32, A35) • Exact security controls are not specified in the GDPR – WHAT to do – Not HOW to do it Confidential – Oracle Internal
11
12.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | EU General Data Protection Regulation (GDPR) • Data privacy as a fundamental right Focus is on 3 Areas • Assessment – Processes, Profiles, Data Sensitivity, Risks •
Prevention – Encryption, Anonymization, Access Controls, Separation of Duties • Detection – Auditing, Activity monitoring, Alerting, Reporting Would also suggest there is a 4th Recovery – Disaster recovery - Backup/Restore, HA 12
13.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | GDPR and MySQL • We can’t be entirely prescriptive • We have many things that can be applied towards attaining compliance – Products – Features – Best Practices – Documents – Integrations 13
14.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | 14 Enterprise Security Architecture ¡ ¡
Workbench ¡ ¡ Enterprise Monitor ¡ Enterprise Encryption ¡ ¡ Firewall ¡ Key Vault ¡ Enterprise Authentication ¡ Network Encryption ¡ Enterprise Audit ¡ Audit Vault ¡ Strong Authentication ¡ Access Controls ¡ Assess ¡ Prevent ¡ Detect ¡ Recover ¡ Enterprise Backup ¡ HA • Innodb Cluster ¡ Thread Pool
15.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Assess Security Risks 15 Discover Personal Data Scan Security Configuration Privilege Analysis
16.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Assess - MySQL Enterprise Features and GDPR • Assess Risks – MySQL Enterprise Monitor • Account assessment and reporting •
Identifies Security Vulnerabilities – discover security holes, advises remediating actions – Advisors provide rules designed to enforce security best practices and alert upon discovering vulnerabilities – MySQL Enterprise Workbench • Discover tables and columns containing “Personal Data” • Data Modeling tool - Reverse Engineering of Data Model to review data stored in the database • Schema Inspector, Table Inspectors – for schema assessment, grant inspection – MySQL Security Best Practices Guidelines 16
17.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | MySQL Enterprise Monitor • Enforce MySQL Security Best Practices – Identifies Vulnerabilities –
Assesses current setup against security hardening policies • Monitoring & Alerting – User Monitoring – Password Monitoring – Schema Change Monitoring – Backup Monitoring – Configuration Management – Configuration Tuning Advice • Centralized User Management 17 "I definitely recommend the MySQL Enterprise Monitor to DBAs who don't have a ton of MySQL experience. It makes monitoring MySQL security, performance and availability very easy to understand and to act on.” Sandi Barr Sr. Software Engineer Schneider Electric
18.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | MySQL Enterprise Monitor • Administrative Privileges • Database Privileges •
Session Limits and Object Privileges • User privileges – Creating, altering and deleting databases – Creating, altering and deleting tables – Execute INSERT, SELECT, UPDATE, DELETE queries – Create, execute, or delete stored procedures and with what rights – Create or delete indexes Assess MySQL Authorization 18 Security Privilege Management in MySQL Workbench
19.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Assess your data and data model using MySQL Workbench 19
20.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Prevent - MySQL Enterprise Features and GDPR • Prevent Attacks (Articles 32, 83, 28, 26, 5, 20, 27, 30, 64) – MySQL Enterprise Security – Transparent Data Encryption • Includes Key Management •
Protects Tablespace via Encryption, Keys via Key Manager/Vault integration – MySQL Enterprise Security – Firewall • MySQL Firewall Statement/User/IP Whitelists, Rules – MySQL Enterprise Security – Authentication • Centralized Authentication Infrastructure – DBA configurable IP whitelisting, Connection Limits, … • Via server level and via per Account IP/Hostname Controls, Account resource limits, – In transit data encryption - • Full support for TLS 1.2 - X509, Certificate Authorities, Exclude Lists, etc. 20
21.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | MySQL Database Encrypted Tablespace Files Protected Key Hacker / Dishonest
OS User Accesses Files Directly Information Access Blocked By Encryption MySQL Enteprise Transparent Data Encryption Protects against Attacks on Database Files
22.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | What is Transparent Data Encryption? • Data at Rest Encryption – Tablespaces, Disks, Storage, OS File system • Transparent to applications and users – No application code, schema or data type changes •
Transparent to DBAs – Keys are hidden from DBAs, no configuration changes • Requires Key Management – Protection, rotation, storage, recovery Confidential – Oracle Internal/Restricted/Highly Restricted 22
23.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Using MySQL Transparent Data Encryption is EASY SQL • New option in CREATE TABLE ENCRYPTION=“Y” • New SQL : ALTER INSTANCE ROTATE INNODB MASTER KEY Plugin Infrastructure •
New plugin type : keyring • Ability to load plugin before InnoDB initialization : --early-plugin-load Keyring plugin • Used to retrieve keys from Key Stores • Over Standardized KMIP protocol InnoDB • Support for encrypted tables • IMPORT/EXPORT of encrypted tables • Support for master key rotation Confidential – Oracle Internal/Restricted/Highly Restricted 23
24.
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | • KMIP – Key Management Interoperability Protocol (Oasis Standard) • Keys are protected and secure •
Enables customers to meet regulatory requirements • KMIP mode tested with the following products – Oracle Key Vault (OKV) – Gemalto Safenet KeySecure – Fornetix Key Orchestration Appliance • Additional Options – New! Encrypted Key Ring File • MySQL 5.7.21 Also – Cloud Key Services • New! features coming with 8.0 GA MySQL Enterprise Transparent Data Encryption KMIP Compliant
25.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | MySQL Enterprise Firewall: Overview 25 Inbound SQL Traffic Web Applications SQL Injection
Attack Via Brower ALLOW BLOCK DETECT 1 2 3 Instance MySQL Enterprise FirewallInternet
26.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | MySQL Enterprise Firewall • Real Time Protection – Queries analyzed and matched against White List •
Blocks SQL Injection Attacks – Block Out of Policy Transactions • Intrusion Detection – Detect and Alert on Out of Policy Transactions • Learns White List – Automated creation of approved list of SQL command patterns on a per user basis • Transparent – No changes to application required • New Feature in 5.7.20 – Firewall Rules – VIA Audit Plugin abort() – Create more general allow/deny firewall rules using JSON syntax. 26 MySQL Enterprise Firewall monitoring
27.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | MySQL Enterprise Authentication 27 • Integrate with Centralized Authentication Infrastructure – Centralized Account Management – Password Policy Management – Groups & Roles Supports – Windows Active Directory – Linux PAM (Pluggable Authentication Modules) – New! Native LDAP • Ultra Fast and Flexible Integrates MySQL with existing security infrastructures
28.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Detect - MySQL Enterprise Features and GDPR • Detect(Articles 30, 82, 33) – MySQL Enterprise Security – Audit • Policy-based auditing solution – gather audit log of activity •
Use to spot database misuse • Use to prove compliance to GDPR – MySQL Enterprise Security – Firewall • Real-time protection against database specific attacks • Use to alert and/or block nefarious activity – such as personal data leakage 28
29.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Focus on MySQL Enterprise Audit • Many regulations or security guidelines – for example GDPR – Mandate recording or auditing of the activities on the Personal Data –
Recommend records must be maintained centrally - responsibility of the Controller. – Processors and third-parties must not be able to tamper or destroy the audit records. – In addition to book-keeping, auditing helps in forensic analysis in case of a breach. • MySQL Enterprise Audit data can be – New! Privileged users can access RO via SQL (Often DBA SSH access to server is forbidden) – Maintained in Oracle Audit Vault – certified, Splunk, others – Outputs standard XML or JSON that easily integrate with various 3rd party solutions – Supports encryption (MySQL 5.7.18+) – Can direct security logs to write-once storage, 29
30.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | MySQL Enterprise Audit - Work Flow 30 • NEW! SQL
31.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Detect - MySQL Enterprise Features and GDPR – MySQL Enterprise Workbench • Security related – – Inspect Audit Data – Configure Firewall – Manage Users – MySQL Enterprise Monitor • Monitor/Alert on Firewall, Audit, Backups and more • Detect configuration changes 31
32.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Additional Security Controls Disaster Recovery - ensure availability of end-user data • Backup – MySQL Enterprise Backup • Includes encryption •
Support for MySQL TDE – Oracle Cloud MySQL database service includes Backup and Recovery Confidential – Oracle Internal 32
33.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Additional Security Controls Disaster Recovery - ensure availability of end-user data • HA – Various options • MySQL InnoDB Cluster – Based on MySQL Group Replication (mulit-master) •
Traditional MySQL Replication Topologies Confidential – Oracle Internal 33
34.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Additional Security Controls Hashing, Signing, Encryption, Key Ring Functions – Symmetric Encryption – AES – Hashing – SHA-2, SHA-1 – Asymmetric Public Key Encryption (RSA) – Asymmetric Private Key Decryption (RSA) – Generate Public/Private Key (RSA, DSA, DH) – Derive Symmetric Keys from Public and Private Key pairs (DH) – Digitally Sign Data (RSA, DSA) – Verify Data Signature (RSA, DSA) – Validation Data Authenticity (RSA, DSA) – Get, Put Keys with ACLs Confidential – Oracle Internal 34
35.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | New Security Features in MySQL 8.0 Confidential – Oracle Internal/Restricted/Highly Restricted 35
36.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | New! MySQL Roles Improving MySQL Access Controls • Introduced in the 8.0.0 DMR • Easier to manage user and applications rights •
As standards compliant as practically possible • Multiple default roles • Can export the role graph in GraphML 36 Feature Request from DBAs Directly In directly Set Role(s) Default Role(s) Set of ACLS Set of ACLS
37.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | New! Atomic ACL Statements • Long standing MySQL issue! – For Replication, HA, Backups, etc. • Possible now - ACL tables reside in 8.0 InnoDB Data Dictionary •
Not just a table operation: memory caches need update too • Applies to statements performing multiple logical operations, e.g. – CREATE USER u1, u2 – GRANT SELECT ON *.* TO u1, u2 • Uses a custom MDL lock to block ACL related activity – While altering the ACL caches and tables 37 Feature Request from DBAs
38.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | New! Dynamic Privileges Provides finer grained administrative level access controls • Too often super is required for tasks when less privilege is really needed • Needed to allow adding administrative access controls •
SUPER privilege split into a set of dynamic privileges, e.g. – SYSTEM_VARIABLES_ADMIN – ROLE_ADMIN – CONNECTION_ADMIN, etc. • Each plugin can now register and use their own unique privileges • All existing MySQL plugins currently using SUPER are updated to add specific privileges, e.g. 38
39.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | 39 Enterprise Security Architecture ¡ ¡
Workbench • Model • Data • Audit Data • User Management ¡ ¡ Enterprise Monitor • Identifies Vulnerabilities • Security hardening policies • User Monitoring • Password Monitoring • Schema Change Monitoring • Backup Monitoring ¡ Enterprise Encryption • TDE • Encryption • PKI ¡ ¡ Firewall ¡ Key Vault ¡ Enterprise Authentication • SSO - LDAP, AD, PAM ¡ Network Encryption ¡ Enterprise Audit • Powerful Rules Engine ¡ Audit Vault ¡ Strong Authentication ¡ Access Controls ¡ Assess ¡ Prevent ¡ Detect ¡ Recover ¡ Enterprise Backup ¡ HA • Innodb Cluster ¡ Thread Pool
40.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Security Direction Continuing to focus in areas such as • TDE / Encryption / Key Management • Masking •
Audit • Firewall • Authentication • Integration to various Oracle Cloud Services Confidential – Oracle Internal/Restricted/Highly Restricted 40 Customer feedback and requirements drive our priorities Tell us what you want, need, etc. Give us problematic use cases
41.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Security Resources • http://mysqlserverteam.com/ • http://insidemysql.com/ •
https://blogs.oracle.com/mysql • https://www.mysql.com/why-mysql/#en-0-40 • https://www.mysql.com/why-mysql/presentations/#en-17-40 • https://www.mysql.com/news-and-events/on-demand-webinars/ #en-20-40 • https://www.mysql.com/news-and-events/health-check/ 41
42.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | References • MySQL Enterprise Security • MySQL Enterprise Authentication •
MySQL Enterprise Firewall • MySQL Enterprise Transparent Data Encryption • MySQL Enterprise Audit • MySQL Enterprise Backup • MySQL Enteprise Monitor • Encryption Functions • Enterprise Encryption Functions Confidential – Oracle Internal 42
43.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | 43
Download now