SlideShare a Scribd company logo
1 of 43
Download to read offline
© 2021 IDERA, Inc. All rights reserved.
© 2021 Mullins Consulting, Inc. All rights reserved.
Database Auditing 2021
Tracking who did what to which data when –
on-prem and in the cloud
A webinar by Craig S. Mullins
www.mullinsconsutling.com
1
© 2021 Mullins Consulting, Inc. All rights reserved.
This presentation was prepared by:
Craig S. Mullins
President & Principal Consultant
IBM Champion for Analytics
IBM Gold Consultant
Mullins Consulting, Inc.
15 Coventry Ct
Sugar Land, TX 77479
Tel: 281-494-6153
E-mail: craig@craigsmullins.com
http://www.mullinsconsulting.com
This document is protected under the copyright laws of the United States and other countries as an unpublished work. This document
contains information that is proprietary and confidential to Mullins Consulting, Inc., which shall not be disclosed outside or
duplicated, used, or disclosed in whole or in part for any purpose other than as approved by Mullins Consulting, Inc. Any use or
disclosure in whole or in part of this information without the express written permission of Mullins Consulting, Inc. is prohibited.
© 2016 Craig S. Mullins and Mullins Consulting, Inc. (Unpublished). All rights reserved.
© 2021 Mullins Consulting, Inc. All rights reserved.
Data Breach Issues
• Trends and considerations
• Cost of a data breach
• Your database is a target!
Dealing with Data Protection
• Government and Industry Regulations
• Compliance and Requirements
Database Auditing
• Who are the stakeholders
• Types of database auditing
• Database auditing methods
© 2021 Mullins Consulting, Inc. All rights reserved.
Data Breach Issues
Data Loss Facts and Trends
© 2021 Mullins Consulting, Inc. All rights reserved.
Privacy Rights Clearinghouse is one source for tracking data breaches:
Since February 2005…
• There have been 9,015 data breach incidents impacting over 10 billion total records
containing sensitive personal information were exposed due to data security
breaches*
• That averages out to almost 12 data breaches every week
• Starting with ChoicePoint: (Feb 15, 2005) – data on 165,000 customers breached
Another good source is the annual Verizon Data Breach Investigations
Report…
• According to the Verizon Data Breach Report, in 2020 there were 5,258 confirmed
data breaches, across 88 different countries.
https://privacyrights.org/data-breaches
* As of September 7, 2019, reported by Privacy Rights Clearinghouse
Data Breaches are Common
© 2021 Mullins Consulting, Inc. All rights reserved.
Source: 2018 Gemalto Breach Level Index
https://breachlevelindex.com/
Frequency of Data Breaches
© 2021 Mullins Consulting, Inc. All rights reserved.
• Data breaches impact customer loyalty
• 64% of consumers are unlikely to do business with companies
where their sensitive data was stolen
• Companies bear the responsibility to protect customer data,
according to:
• Governmental and industry regulations
• But also customers: 69% of whom believe companies are most
responsible for protecting customer data
• Customers do not believe that companies take this responsibility to
protect their data as seriously as they should:
• 75% of consumers believe that companies do not take
protection and security of their data seriously
Source: 2015 Gemalto Breach Level Index http://bit.ly/1PUCspY
The Negative Impact of Data Breaches
© 2021 Mullins Consulting, Inc. All rights reserved.
The average cost of a
data breach (in 2018)
was up to $3.86 million
This is a 6.4% increase
from 2017
Source: Ponemon Institute 2018 Cost of a Data Breach Study: United States
• Regulatory Fines and Legal Judgments
• Legal Defense Costs
• Customer Notifications
• Credit Monitoring
• Forensic Analysis
• Reputational Losses
The Cost of a Data Breach
© 2021 Mullins Consulting, Inc. All rights reserved.
The cost of a data breach actually varies
• Average loss for a breach of 1,000 records:
• Between $52,000 and $87,000
• Average loss for a breach affecting 10 million records:
• Between $2.1 million and $5.2 million
Source: 2015 Verizon Data Breach Investigation Report
© 2021 Mullins Consulting, Inc. All rights reserved.
Your Database Systems are Targets for Attack
Enterprise database servers are a
significant target of data breach attacks
• Because that is where the data is!
• Personally identifiable information (PII)
• Such as SSN, address, etc.
• Personal financial data
• Bank account/credit card information
• Healthcare data
• Etc.
© 2021 Mullins Consulting, Inc. All rights reserved.
Source: 2015 Verizon Data Breach Investigation Report
Frequency of Database Attacks
© 2021 Mullins Consulting, Inc. All rights reserved.
Dealing With Data Protection Issues
Regulations and Governance
© 2021 Mullins Consulting, Inc. All rights reserved.
Sample Regulations Impacting Data Protection
Governance Privacy
1. Basel II
2. Sarbanes Oxley
3. Turnbull Report
4. OFAC
5. CMS ARS
1. PCI DSS
2. HIPAA
3. CA SB 1386/AB 1950
4. GLBA
5. FCRA -- “Red Flag”
6. FISMA
7. GDPR
Protect and control the process Protect the data
© 2021 Mullins Consulting, Inc. All rights reserved.
https://privacyrights.org/resources/data-breach-notification-united-states-and-territories
US State and Territory Regulations
As of 2018, all 50 states have enacted data breach notification
statutes.
The exact requirements of these regulations can vary greatly.
Considerations include:
▪ Definition of a breach
▪ Type and form of data to be protected (electronic, digital, paper, etc.)
▪ Encryption key breach specifications
▪ Type and amount of penalty to be imposed for violations
▪ Entities covered (person, partnership, coporation, sole proprietor, government,
etc.)
▪ Notification obligation and method
© 2021 Mullins Consulting, Inc. All rights reserved.
These resources can help to guide your compliance efforts:
▪ COBIT - https://cobitonline.isaca.org/
Control Objectives for Information and Related Technology
▪ Center for Internet Security (CIS) - https://www.cisecurity.org/
Organization dedicated to enhancing the cybersecurity readiness and response
among public and private sector entities
▪ Department of Defense (DoD) - http://www.defense.gov/Resources/DoD-Information-
Quality-Guidelines
Guidelines and procedures for information quality
▪ Security Technical Implementation Guide (STIG) -
http://iase.disa.mil/stigs/Pages/index.aspx
Technical guidance for securely locking down computer systems & software that
otherwise might be vulnerable to attacks
▪ Common Vulnerability Exposure (CVE) - https://cve.mitre.org/
Dictionary of publicly known information security vulnerabilities and exposures
Guidance for Regulatory Compliance
© 2021 Mullins Consulting, Inc. All rights reserved.
Database Auditing by Regulation
Audit Requirement SOX PCI-DSS GLB HIPAA Basel II GDPR
Access to sensitive data
(SELECT)
X X X X X
Modification of sensitive
data
(INSERT, UPDATE,
DELETE)
X X X
Database changes/DDL
(CREATE, ALTER, DROP)
X X X X X X
Security authorizations/DCL
(GRANT, REVOKE)
X X X X X X
Security exceptions
(e.g. failed logins, SQL
errors)
X X X X X X
© 2021 Mullins Consulting, Inc. All rights reserved.
Monitoring privileged users is a significant aspect of compliance
auditing… From a database perspective this includes:
• DBAs
• SYSADMs
• SECADMs
Not enough of
this is being
done…
Source: Cyberthreat Defense Report, CyberEdge Group
Privileged User Auditing
© 2021 Mullins Consulting, Inc. All rights reserved.
Database Auditing
What is it?
How is it done?
© 2021 Mullins Consulting, Inc. All rights reserved.
There are many names used for basically the same thing.
In this presentation the term database auditing is used, but
you may also know it as:
• Data Access Auditing
• Data Monitoring
• Database Activity Monitoring (DAM)
My definition of Database Auditing:
The process of monitoring access to and modification
of selected database objects and resources within
operational databases and retaining a detailed record of the
access where this record can be used to proactively trigger
actions and can be retrieved and analyzed as needed.
What is Database Auditing?
© 2021 Mullins Consulting, Inc. All rights reserved.
Database Auditing Key Stakeholders
SECURITY
OPERATIONS
✓ Real-time policies
✓ Secure audit trail
✓ Data mining &
forensics
✓ Business rqmts
✓ Separation of
duties
✓ Best practices
reports
✓ Automated controls
✓ Minimal impact
✓ Change management
✓ Performance
issues
© 2021 Mullins Consulting, Inc. All rights reserved.
Authorization Auditing
• Who can do what
Access Auditing
• Who did do what.
• Modifications: INSERT, UPDATE, DELETE
• Reads: SELECT
• DDL: CREATE, DROP, ALTER
• DCL: GRANT, REVOKE
• Utilities: Load, Unload, Export, Import, Copy…
Replication Auditing
• Who copied which data where.
Types of Database Auditing
© 2021 Mullins Consulting, Inc. All rights reserved.
Non-Standard Access
• File-level snooping as opposed to going through the DBMS
interface
• System-level snooping and zapping (e.g. pointers)
• Image copy backup data sets
• Unload data sets
• REORG data sets
• Database statistics
• Some database statistics, such as column distribution statistics,
can contain actual data values
• Such as AMASPZAP on mainframes
https://www.ibm.com/support/knowledgecenter/SSLTBW_2.1.0/com.ibm.zos.v2r1.ieab100/iea3b1_AMASPZAP.htm
© 2021 Mullins Consulting, Inc. All rights reserved.
Selective
• Must be rules-based to enable the capture of audit details only on the
specific data that requires auditing.
• Should be able to implement privileged user auditing, auditing by
application, by database object, by type of command, by utility, etc.
Comprehensive
• Must be able to capture the complete scenario of auditable
information.
Non-invasive
• Should be able to audit access to data without incurring expensive
performance degradation.
Be capable of answering:
• Who accessed/modified the data?
• When did it happen?
• Using what computer program or client software?
• From what location on the network?
• What was the SQL query that accessed the data?
• Was it successful; and if so, how many rows of data were retrieved?
General Database Auditing Requirements
© 2021 Mullins Consulting, Inc. All rights reserved.
There are 6 common methods used to audit databases:
1. Audit within the DBMS (traces)
Must start a trace w/I the DBMS/server
2. Audit using temporal capabilities
SYSTEM temporal tables to record all changed data
3. Audit using triggers (or hand-coding)
Database triggers or hard-coding audit trail in programs
4. Audit from the database transaction log files
Modifications are on the log anyway so…
5. Audit over the network
Sometimes called network sniffing: captures SQL requests
as they are sent over the network
6. Audit directly against the DBMS server control blocks
Sometimes called a “tap”
Database Auditing Approaches
© 2021 Mullins Consulting, Inc. All rights reserved.
Most DBMSes offer an audit or trace capability that enables you
to trace events or categories of events by UserID, object
ownership, etc.
You can typically choose from multiple audit options such as:
• Categories of events
• SELECT, INSERT, UPDATE, DELETE, CREATE, DROP,
REVOKE, GRANT, etc.
• Privileged User Access
• Specific Tables, UserIDs, programs…
1. Native DBMS Audit Capabilities
© 2021 Mullins Consulting, Inc. All rights reserved.
Potential Native Audit Issues:
Separation of duties – auditing typically is turned on and
off by DBAs (privileged users)
Overhead – some audit traces can consume a significant
amount of resources
• Don’t want to “dim the lights” to audit
Comprehensive capture – may not capture everything
that needs to be captured for compliance
First read/write in a UOR
Statements with syntax errors
Depends on the DBMS and the type of auditing
There can be multiple types of native audit per DBMS
Audit trail access – how do you access the audit trail;
may require significant programming + support
1. Native DBMS Audit Capabilities
© 2021 Mullins Consulting, Inc. All rights reserved.
A somewhat newer capability of several DBMS offerings is
the ability to create temporal tables
A system-level temporal table can be used to audit changes
(aka transaction time)
• System time tracks the insertion and modification history of the data.
• System Time is typically tracked using two tables.
2. System Temporal Tables
• One table contains the current data.
• Another, history table, contains the non-current data.
© 2021 Mullins Consulting, Inc. All rights reserved.
• Implementing auditing using SYSTEM time temporal tables…
• Typically requires a 3 step process:
1. Create the base table and include TIMESTAMP columns to track the
starting and ending points for the system time period
2. Create the history table with an identical structure, preferably by using a
CREATE TABLE . . . LIKE statement.
3. ALTER the current table to enable versioning thereby turning on the system
temporal capability.
2. System Temporal Tables
© 2021 Mullins Consulting, Inc. All rights reserved.
2. Temporal: Adding Data to our System Time “Table”
COURSENO TITLE CREDITS PRICE SYS_START SYS_END
500 INTRO TO COBOL 2 200.00 2012-01-10 9999-12-31
600 INTRO TO JAVA 2 250.00 2012-01-10 9999-12-31
650 ADVANCED JAVA 3 400.00 2012-01-10 9999-12-31
COURSE table
COURSENO TITLE CREDITS PRICE SYS_START SYS_END
COURSE_HIST table
The table contains three rows
The table is empty
– After inserting
these three rows →
– The data look like this
© 2021 Mullins Consulting, Inc. All rights reserved.
– After issuing these
statements (UPDATE
and DELETE) →
– Our tables now look like this
2. And then let’s DELETE from our System Time “Table”
COURSE table
COURSE_HIST table
The table contains two rows
The table contains two rows
COURSENO TITLE CREDITS PRICE SYS_START SYS_END
500 INTRO TO COBOL 2 200.00 2012-01-10 9999-12-31
650 ADVANCED JAVA 3 375.00 2012-01-15 9999-12-31
COURSENO TITLE CREDITS PRICE SYS_START SYS_END
650 ADVANCED JAVA 3 400.00 2012-01-10 2012-01-15
600 INTRO TO JAVA 2 250.00 2012-01-10 2012-02-05
© 2021 Mullins Consulting, Inc. All rights reserved.
• Simply retrieve the current info for Advanced Java course:
• Access info about Advanced Java course for January 16, 2012:
2. System Time: Sample Queries (#1, #2)
– Returns one row →
AS OF
FROM
BETWEEN
© 2021 Mullins Consulting, Inc. All rights reserved.
• Only useful to track modifications (U/I/D)
• No tracking of access to data (read/SELECT)
• No tracking of who made each change
• No way to audit privileged users
• Data management issues
• Large amount of “old” data
• Needs to be purged – but within the specifications of the
regulations being complied with!
• Uses the database itself to store audit data
• Separation of duties: a DBA can get past it
• Disconnect the temporal connection
• Delete data
• Reconnect
2. Issues w/Using Temporal for Auditing
© 2021 Mullins Consulting, Inc. All rights reserved.
3. Using Triggers
Similar to the temporal option, you can use database
Triggers to write audit records
Write a set of Triggers for the tables you wish to audit
• One each for Insert, Update, and Delete
Write the pertinent details – whatever you want – to audit
tables you define
• Or files if your DBMS allows
triggers to write to files
© 2021 Mullins Consulting, Inc. All rights reserved.
• You have to write and maintain the Triggers
• This can be an exposure based on who has access to the trigger code
• No tracking of access to data (read/SELECT)
• No way to audit privileged users
• Trigger performance can be poor
• Data management issues similar to temporal data
• e.g.) amount of data, purging, using the database to store audit data,
separation of duties
3. Issues w/Using Triggers for Auditing
© 2021 Mullins Consulting, Inc. All rights reserved.
Sometimes developers add “audit columns” to tables, such as
LAST_MODIFIED_DATE
• The idea here is for the program to auto-
matically change the LAST_MODIFIED_DATE
column in the programs whenever data is changed
• Every program?
Auditors don’t like this… it is a problem because:
• Audit trails should be kept outside of the database
• Can you guarantee that LAST_MODIFIED_DATE is accurate?
3½. Hand-coding audit trails?
• If you delete the row you lose the audit data
• Couldn’t someone have set it by accident (or nefariously)?
© 2021 Mullins Consulting, Inc. All rights reserved.
4. What About Using the Database Logs?
Database transaction log(s) capture ALL*
changes
made to data.
DBMS
Transaction
Log(s)
SQL
Changes
*Well, maybe not all changes, all the time.
Database
© 2021 Mullins Consulting, Inc. All rights reserved.
4. Issues With Database Log Auditing & Analysis
Log format is proprietary
Volume can be an issue
Easy access to online and archive logs?
• But how long do you keep your archive logs?
Dual usage of data could cause problems?
• Recovery and protection
• Audit
Tracks database modifications, but what about reads?
• Transaction logs do not record information about SELECT
And what about non-logged operations?
• LOAD LOG NO, REORG LOG NO
• Non-logged table spaces, LOBs
Cannot invoke real-time actions using log-based auditing
© 2021 Mullins Consulting, Inc. All rights reserved.
Database auditing via network sniffing captures SQL requests
as they go across the network
• Some third-party database auditing solutions use this approach
• Perhaps more effective for cloud database auditing
But not all requests go across the wire
• DBA access directly on the server
• Mainframe applications (CICS, IMS/TM, TSO, batch)
5. Network Capture
© 2021 Mullins Consulting, Inc. All rights reserved.
Audit database requests at the server
Capture all SQL requests at the server
All SQL access can be audited, not just those made over a network
Retain all pertinent audited information
• Without relying on the DBMS
No need to keep the active/archive log files
No need to start a DBMS trace
No need to modify the database schema
Concerns?
• Requires purchasing additional ISV software
• Interfaces with DBMS internals
6. Tap Database Server Control Blocks
© 2021 Mullins Consulting, Inc. All rights reserved.
The Best Approach?
All of the approaches discussed herein have their merits
depending upon the type of database applications that you
need to audit
Database auditing products may use one or more of these
different approaches and methods
• Understand the methods used by any product you
evaluate
• For example, a combination of native tracing and
capturing information from database control blocks
can make for a reasonable solution
© 2021 Mullins Consulting, Inc. All rights reserved.
Let’s Discuss a Few Cloud Issues
When the database exists in the cloud, remotely instead of on prem,
there may be challenges that need to be understood and managed:
• If the database is managed completely by the CSP, there may be
a lack of visibility and control
• It may be difficult to integrate cloud and on-prem audit activities
• Be aware of volume and licensing issues
Finally, if you rely on the cloud, make sure that any database
auditing product you acquire will work with your cloud provider
• and DBMS
Things can get complex…
© 2021 Mullins Consulting, Inc. All rights reserved.
Benefits of Database Auditing Products
• Favor products that offer built-in reporting for the regulations
you need to comply with (like GDPR, HIPAA, etc.)
Instead of you having to translate trace records to specific
compliance requirements
• Vendor maintenance and support for changing DBMS
capabilities and regulatory compliance specifications
• Customizable policies and alerting
• Typically come with a dashboard to view compliance
information, audit activities and issues
• Built-in support for specific regulations
• Many product consume fewer resources than alternate
approaches
© 2021 Mullins Consulting, Inc. All rights reserved.
Craig S. Mullins
Mullins Consulting, Inc.
15 Coventry Ct
Sugar Land, TX 77479
(281) 494-6153
E-mail: craig@craigsmullins.com
Web: www.mullinsconsulting.com
https://datatechnologytoday.wordpress.com/
Data & Technology Today Blog
http://www.mullinsconsulting.com/dba-corner.html
DBA Corner Columns
Contact Information
https://tinyurl.com/cj3x4tm6

More Related Content

What's hot

Idera live 2021: Keynote Presentation The Future of Data is The Data Cloud b...
Idera live 2021:  Keynote Presentation The Future of Data is The Data Cloud b...Idera live 2021:  Keynote Presentation The Future of Data is The Data Cloud b...
Idera live 2021: Keynote Presentation The Future of Data is The Data Cloud b...IDERA Software
 
Snowflake: The Good, the Bad, and the Ugly
Snowflake: The Good, the Bad, and the UglySnowflake: The Good, the Bad, and the Ugly
Snowflake: The Good, the Bad, and the UglyTyler Wishnoff
 
Company report xinglian
Company report xinglianCompany report xinglian
Company report xinglianXinglian Liu
 
SysAid Presentation V.7
SysAid Presentation V.7SysAid Presentation V.7
SysAid Presentation V.7srinivasp2010
 
Master the Multi-Clustered Data Warehouse - Snowflake
Master the Multi-Clustered Data Warehouse - SnowflakeMaster the Multi-Clustered Data Warehouse - Snowflake
Master the Multi-Clustered Data Warehouse - SnowflakeMatillion
 
Rise of the Data Cloud
Rise of the Data CloudRise of the Data Cloud
Rise of the Data CloudKent Graziano
 
RecordService for Unified Access Control
RecordService for Unified Access ControlRecordService for Unified Access Control
RecordService for Unified Access ControlCloudera, Inc.
 
Unlocking the Power of the Data Lake
Unlocking the Power of the Data LakeUnlocking the Power of the Data Lake
Unlocking the Power of the Data LakeArcadia Data
 
Horses for Courses: Database Roundtable
Horses for Courses: Database RoundtableHorses for Courses: Database Roundtable
Horses for Courses: Database RoundtableEric Kavanagh
 
IDERA Slides: Managing the Transition to Hybrid Cloud
IDERA Slides: Managing the Transition to Hybrid CloudIDERA Slides: Managing the Transition to Hybrid Cloud
IDERA Slides: Managing the Transition to Hybrid CloudDATAVERSITY
 
Data Modeling for Data Science: Simplify Your Workload with Complex Types in ...
Data Modeling for Data Science: Simplify Your Workload with Complex Types in ...Data Modeling for Data Science: Simplify Your Workload with Complex Types in ...
Data Modeling for Data Science: Simplify Your Workload with Complex Types in ...Cloudera, Inc.
 
Hadoop and Manufacturing
Hadoop and ManufacturingHadoop and Manufacturing
Hadoop and ManufacturingCloudera, Inc.
 
Hadoop India Summit, Feb 2011 - Informatica
Hadoop India Summit, Feb 2011 - InformaticaHadoop India Summit, Feb 2011 - Informatica
Hadoop India Summit, Feb 2011 - InformaticaSanjeev Kumar
 
Cloudera Federal Forum 2014: The Building Blocks of the Enterprise Data Hub
Cloudera Federal Forum 2014: The Building Blocks of the Enterprise Data HubCloudera Federal Forum 2014: The Building Blocks of the Enterprise Data Hub
Cloudera Federal Forum 2014: The Building Blocks of the Enterprise Data HubCloudera, Inc.
 
DataStax on Azure: Deploying an industry-leading data platform for cloud apps...
DataStax on Azure: Deploying an industry-leading data platform for cloud apps...DataStax on Azure: Deploying an industry-leading data platform for cloud apps...
DataStax on Azure: Deploying an industry-leading data platform for cloud apps...DataStax
 
IDERA Live | Doing More with Less: Managing Multiple Database Roles and Platf...
IDERA Live | Doing More with Less: Managing Multiple Database Roles and Platf...IDERA Live | Doing More with Less: Managing Multiple Database Roles and Platf...
IDERA Live | Doing More with Less: Managing Multiple Database Roles and Platf...IDERA Software
 
SnapLogic Cloud Integration
SnapLogic Cloud IntegrationSnapLogic Cloud Integration
SnapLogic Cloud IntegrationSnapLogic
 

What's hot (20)

Idera live 2021: Keynote Presentation The Future of Data is The Data Cloud b...
Idera live 2021:  Keynote Presentation The Future of Data is The Data Cloud b...Idera live 2021:  Keynote Presentation The Future of Data is The Data Cloud b...
Idera live 2021: Keynote Presentation The Future of Data is The Data Cloud b...
 
Snowflake: The Good, the Bad, and the Ugly
Snowflake: The Good, the Bad, and the UglySnowflake: The Good, the Bad, and the Ugly
Snowflake: The Good, the Bad, and the Ugly
 
Company report xinglian
Company report xinglianCompany report xinglian
Company report xinglian
 
SysAid Presentation V.7
SysAid Presentation V.7SysAid Presentation V.7
SysAid Presentation V.7
 
Master the Multi-Clustered Data Warehouse - Snowflake
Master the Multi-Clustered Data Warehouse - SnowflakeMaster the Multi-Clustered Data Warehouse - Snowflake
Master the Multi-Clustered Data Warehouse - Snowflake
 
Final report presentation
Final report presentationFinal report presentation
Final report presentation
 
Rise of the Data Cloud
Rise of the Data CloudRise of the Data Cloud
Rise of the Data Cloud
 
RecordService for Unified Access Control
RecordService for Unified Access ControlRecordService for Unified Access Control
RecordService for Unified Access Control
 
Unlocking the Power of the Data Lake
Unlocking the Power of the Data LakeUnlocking the Power of the Data Lake
Unlocking the Power of the Data Lake
 
Horses for Courses: Database Roundtable
Horses for Courses: Database RoundtableHorses for Courses: Database Roundtable
Horses for Courses: Database Roundtable
 
IDERA Slides: Managing the Transition to Hybrid Cloud
IDERA Slides: Managing the Transition to Hybrid CloudIDERA Slides: Managing the Transition to Hybrid Cloud
IDERA Slides: Managing the Transition to Hybrid Cloud
 
Data Modeling for Data Science: Simplify Your Workload with Complex Types in ...
Data Modeling for Data Science: Simplify Your Workload with Complex Types in ...Data Modeling for Data Science: Simplify Your Workload with Complex Types in ...
Data Modeling for Data Science: Simplify Your Workload with Complex Types in ...
 
Hadoop and Manufacturing
Hadoop and ManufacturingHadoop and Manufacturing
Hadoop and Manufacturing
 
Hadoop India Summit, Feb 2011 - Informatica
Hadoop India Summit, Feb 2011 - InformaticaHadoop India Summit, Feb 2011 - Informatica
Hadoop India Summit, Feb 2011 - Informatica
 
Cloudera Federal Forum 2014: The Building Blocks of the Enterprise Data Hub
Cloudera Federal Forum 2014: The Building Blocks of the Enterprise Data HubCloudera Federal Forum 2014: The Building Blocks of the Enterprise Data Hub
Cloudera Federal Forum 2014: The Building Blocks of the Enterprise Data Hub
 
DataStax on Azure: Deploying an industry-leading data platform for cloud apps...
DataStax on Azure: Deploying an industry-leading data platform for cloud apps...DataStax on Azure: Deploying an industry-leading data platform for cloud apps...
DataStax on Azure: Deploying an industry-leading data platform for cloud apps...
 
Data Sharing with Snowflake
Data Sharing with SnowflakeData Sharing with Snowflake
Data Sharing with Snowflake
 
IDERA Live | Doing More with Less: Managing Multiple Database Roles and Platf...
IDERA Live | Doing More with Less: Managing Multiple Database Roles and Platf...IDERA Live | Doing More with Less: Managing Multiple Database Roles and Platf...
IDERA Live | Doing More with Less: Managing Multiple Database Roles and Platf...
 
SnapLogic Cloud Integration
SnapLogic Cloud IntegrationSnapLogic Cloud Integration
SnapLogic Cloud Integration
 
Data Migration to Azure
Data Migration to AzureData Migration to Azure
Data Migration to Azure
 

Similar to Idera live 2021: Database Auditing - on-Premises and in the Cloud by Craig Mullins

How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?IBM Security
 
Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...
Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...
Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...IDERA Software
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...PECB
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsIBM Security
 
Improve IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkPrecisely
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityMousumi Manna
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityMousumi Manna
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityTapan Biswas
 
Database auditing essentials
Database auditing essentialsDatabase auditing essentials
Database auditing essentialsCraig Mullins
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud IBM Security
 
Ethernautics, Inc - Database Cyber Security Threats
Ethernautics, Inc - Database Cyber Security ThreatsEthernautics, Inc - Database Cyber Security Threats
Ethernautics, Inc - Database Cyber Security ThreatsMichael W. Meissner, RCDD
 
Michael Josephs
Michael JosephsMichael Josephs
Michael JosephsdaveGBE
 
Data protection and privacy in the world of database DevOps
Data protection and privacy in the world of database DevOpsData protection and privacy in the world of database DevOps
Data protection and privacy in the world of database DevOpsRed Gate Software
 
Data security in a big data environment sweden
Data security in a big data environment   swedenData security in a big data environment   sweden
Data security in a big data environment swedenIBM Sverige
 
A P/C Insurance Data Modernization Journey Featuring Pekin Insurance, ValueMo...
A P/C Insurance Data Modernization Journey Featuring Pekin Insurance, ValueMo...A P/C Insurance Data Modernization Journey Featuring Pekin Insurance, ValueMo...
A P/C Insurance Data Modernization Journey Featuring Pekin Insurance, ValueMo...ValueMomentum
 
5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown JewelsIBM Security
 
Strategic Enterprise Risk and Data Architecture
Strategic Enterprise Risk and Data ArchitectureStrategic Enterprise Risk and Data Architecture
Strategic Enterprise Risk and Data ArchitectureSandeepMaira
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analyticsMarc Vael
 
The Three Pitfalls of Data Security
The Three Pitfalls of Data SecurityThe Three Pitfalls of Data Security
The Three Pitfalls of Data SecurityMarkLogic
 

Similar to Idera live 2021: Database Auditing - on-Premises and in the Cloud by Craig Mullins (20)

How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?
 
Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...
Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...
Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
Improve IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in Splunk
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Database auditing essentials
Database auditing essentialsDatabase auditing essentials
Database auditing essentials
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
Ethernautics, Inc - Database Cyber Security Threats
Ethernautics, Inc - Database Cyber Security ThreatsEthernautics, Inc - Database Cyber Security Threats
Ethernautics, Inc - Database Cyber Security Threats
 
Michael Josephs
Michael JosephsMichael Josephs
Michael Josephs
 
Data protection and privacy in the world of database DevOps
Data protection and privacy in the world of database DevOpsData protection and privacy in the world of database DevOps
Data protection and privacy in the world of database DevOps
 
Asset Security
Asset Security Asset Security
Asset Security
 
Data security in a big data environment sweden
Data security in a big data environment   swedenData security in a big data environment   sweden
Data security in a big data environment sweden
 
A P/C Insurance Data Modernization Journey Featuring Pekin Insurance, ValueMo...
A P/C Insurance Data Modernization Journey Featuring Pekin Insurance, ValueMo...A P/C Insurance Data Modernization Journey Featuring Pekin Insurance, ValueMo...
A P/C Insurance Data Modernization Journey Featuring Pekin Insurance, ValueMo...
 
5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels
 
Strategic Enterprise Risk and Data Architecture
Strategic Enterprise Risk and Data ArchitectureStrategic Enterprise Risk and Data Architecture
Strategic Enterprise Risk and Data Architecture
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analytics
 
The Three Pitfalls of Data Security
The Three Pitfalls of Data SecurityThe Three Pitfalls of Data Security
The Three Pitfalls of Data Security
 

More from IDERA Software

The role of the database administrator (DBA) in 2020: Changes, challenges, an...
The role of the database administrator (DBA) in 2020: Changes, challenges, an...The role of the database administrator (DBA) in 2020: Changes, challenges, an...
The role of the database administrator (DBA) in 2020: Changes, challenges, an...IDERA Software
 
Problems and solutions for migrating databases to the cloud
Problems and solutions for migrating databases to the cloudProblems and solutions for migrating databases to the cloud
Problems and solutions for migrating databases to the cloudIDERA Software
 
Public cloud uses and limitations
Public cloud uses and limitationsPublic cloud uses and limitations
Public cloud uses and limitationsIDERA Software
 
Optimize the performance, cost, and value of databases.pptx
Optimize the performance, cost, and value of databases.pptxOptimize the performance, cost, and value of databases.pptx
Optimize the performance, cost, and value of databases.pptxIDERA Software
 
Six tips for cutting sql server licensing costs
Six tips for cutting sql server licensing costsSix tips for cutting sql server licensing costs
Six tips for cutting sql server licensing costsIDERA Software
 
Idera live 2021: The Power of Abstraction by Steve Hoberman
Idera live 2021:  The Power of Abstraction by Steve HobermanIdera live 2021:  The Power of Abstraction by Steve Hoberman
Idera live 2021: The Power of Abstraction by Steve HobermanIDERA Software
 
Idera live 2021: Why Data Lakes are Critical for AI, ML, and IoT By Brian Flug
Idera live 2021:  Why Data Lakes are Critical for AI, ML, and IoT  By Brian FlugIdera live 2021:  Why Data Lakes are Critical for AI, ML, and IoT  By Brian Flug
Idera live 2021: Why Data Lakes are Critical for AI, ML, and IoT By Brian FlugIDERA Software
 
Idera live 2021: Managing Digital Transformation on a Budget by Bert Scalzo
Idera live 2021:  Managing Digital Transformation on a Budget by Bert ScalzoIdera live 2021:  Managing Digital Transformation on a Budget by Bert Scalzo
Idera live 2021: Managing Digital Transformation on a Budget by Bert ScalzoIDERA Software
 
Idera live 2021: Managing Databases in the Cloud - the First Step, a Succes...
Idera live 2021:   Managing Databases in the Cloud - the First Step, a Succes...Idera live 2021:   Managing Databases in the Cloud - the First Step, a Succes...
Idera live 2021: Managing Databases in the Cloud - the First Step, a Succes...IDERA Software
 
Idera live 2021: Performance Tuning Azure SQL Database by Monica Rathbun
Idera live 2021:  Performance Tuning Azure SQL Database by Monica RathbunIdera live 2021:  Performance Tuning Azure SQL Database by Monica Rathbun
Idera live 2021: Performance Tuning Azure SQL Database by Monica RathbunIDERA Software
 
Geek Sync | How to Be the DBA When You Don't Have a DBA - Eric Cobb | IDERA
Geek Sync | How to Be the DBA When You Don't Have a DBA - Eric Cobb | IDERAGeek Sync | How to Be the DBA When You Don't Have a DBA - Eric Cobb | IDERA
Geek Sync | How to Be the DBA When You Don't Have a DBA - Eric Cobb | IDERAIDERA Software
 
Benefits of SQL Server 2017 and 2019 | IDERA
Benefits of SQL Server 2017 and 2019 | IDERABenefits of SQL Server 2017 and 2019 | IDERA
Benefits of SQL Server 2017 and 2019 | IDERAIDERA Software
 
Be Proactive: A Good DBA Goes Looking for Signs of Trouble | IDERA
Be Proactive: A Good DBA Goes Looking for Signs of Trouble | IDERABe Proactive: A Good DBA Goes Looking for Signs of Trouble | IDERA
Be Proactive: A Good DBA Goes Looking for Signs of Trouble | IDERAIDERA Software
 
Advanced SQL Server Performance Tuning | IDERA
Advanced SQL Server Performance Tuning | IDERAAdvanced SQL Server Performance Tuning | IDERA
Advanced SQL Server Performance Tuning | IDERAIDERA Software
 
Geek Sync | Planning a SQL Server to Azure Migration in 2021 - Brent Ozar
Geek Sync | Planning a SQL Server to Azure Migration in 2021 - Brent OzarGeek Sync | Planning a SQL Server to Azure Migration in 2021 - Brent Ozar
Geek Sync | Planning a SQL Server to Azure Migration in 2021 - Brent OzarIDERA Software
 
Geek Sync | Performance Tuning: Getting the Biggest Bang for Your Buck - Moni...
Geek Sync | Performance Tuning: Getting the Biggest Bang for Your Buck - Moni...Geek Sync | Performance Tuning: Getting the Biggest Bang for Your Buck - Moni...
Geek Sync | Performance Tuning: Getting the Biggest Bang for Your Buck - Moni...IDERA Software
 
Geek Sync | Meeting Security Benchmarks and Compliance with Microsoft SQL Ser...
Geek Sync | Meeting Security Benchmarks and Compliance with Microsoft SQL Ser...Geek Sync | Meeting Security Benchmarks and Compliance with Microsoft SQL Ser...
Geek Sync | Meeting Security Benchmarks and Compliance with Microsoft SQL Ser...IDERA Software
 
Geek Sync | How to Think Like the SQL ServerEngine - Brent Ozar
Geek Sync | How to Think Like the SQL ServerEngine - Brent OzarGeek Sync | How to Think Like the SQL ServerEngine - Brent Ozar
Geek Sync | How to Think Like the SQL ServerEngine - Brent OzarIDERA Software
 
Geek Sync | Data Integrity Demystified - Deborah Melkin | IDERA
Geek Sync | Data Integrity Demystified - Deborah Melkin | IDERAGeek Sync | Data Integrity Demystified - Deborah Melkin | IDERA
Geek Sync | Data Integrity Demystified - Deborah Melkin | IDERAIDERA Software
 
Geek Sync | Breaking Bad Habits: Solutions for Common Query Antipatterns - Je...
Geek Sync | Breaking Bad Habits: Solutions for Common Query Antipatterns - Je...Geek Sync | Breaking Bad Habits: Solutions for Common Query Antipatterns - Je...
Geek Sync | Breaking Bad Habits: Solutions for Common Query Antipatterns - Je...IDERA Software
 

More from IDERA Software (20)

The role of the database administrator (DBA) in 2020: Changes, challenges, an...
The role of the database administrator (DBA) in 2020: Changes, challenges, an...The role of the database administrator (DBA) in 2020: Changes, challenges, an...
The role of the database administrator (DBA) in 2020: Changes, challenges, an...
 
Problems and solutions for migrating databases to the cloud
Problems and solutions for migrating databases to the cloudProblems and solutions for migrating databases to the cloud
Problems and solutions for migrating databases to the cloud
 
Public cloud uses and limitations
Public cloud uses and limitationsPublic cloud uses and limitations
Public cloud uses and limitations
 
Optimize the performance, cost, and value of databases.pptx
Optimize the performance, cost, and value of databases.pptxOptimize the performance, cost, and value of databases.pptx
Optimize the performance, cost, and value of databases.pptx
 
Six tips for cutting sql server licensing costs
Six tips for cutting sql server licensing costsSix tips for cutting sql server licensing costs
Six tips for cutting sql server licensing costs
 
Idera live 2021: The Power of Abstraction by Steve Hoberman
Idera live 2021:  The Power of Abstraction by Steve HobermanIdera live 2021:  The Power of Abstraction by Steve Hoberman
Idera live 2021: The Power of Abstraction by Steve Hoberman
 
Idera live 2021: Why Data Lakes are Critical for AI, ML, and IoT By Brian Flug
Idera live 2021:  Why Data Lakes are Critical for AI, ML, and IoT  By Brian FlugIdera live 2021:  Why Data Lakes are Critical for AI, ML, and IoT  By Brian Flug
Idera live 2021: Why Data Lakes are Critical for AI, ML, and IoT By Brian Flug
 
Idera live 2021: Managing Digital Transformation on a Budget by Bert Scalzo
Idera live 2021:  Managing Digital Transformation on a Budget by Bert ScalzoIdera live 2021:  Managing Digital Transformation on a Budget by Bert Scalzo
Idera live 2021: Managing Digital Transformation on a Budget by Bert Scalzo
 
Idera live 2021: Managing Databases in the Cloud - the First Step, a Succes...
Idera live 2021:   Managing Databases in the Cloud - the First Step, a Succes...Idera live 2021:   Managing Databases in the Cloud - the First Step, a Succes...
Idera live 2021: Managing Databases in the Cloud - the First Step, a Succes...
 
Idera live 2021: Performance Tuning Azure SQL Database by Monica Rathbun
Idera live 2021:  Performance Tuning Azure SQL Database by Monica RathbunIdera live 2021:  Performance Tuning Azure SQL Database by Monica Rathbun
Idera live 2021: Performance Tuning Azure SQL Database by Monica Rathbun
 
Geek Sync | How to Be the DBA When You Don't Have a DBA - Eric Cobb | IDERA
Geek Sync | How to Be the DBA When You Don't Have a DBA - Eric Cobb | IDERAGeek Sync | How to Be the DBA When You Don't Have a DBA - Eric Cobb | IDERA
Geek Sync | How to Be the DBA When You Don't Have a DBA - Eric Cobb | IDERA
 
Benefits of SQL Server 2017 and 2019 | IDERA
Benefits of SQL Server 2017 and 2019 | IDERABenefits of SQL Server 2017 and 2019 | IDERA
Benefits of SQL Server 2017 and 2019 | IDERA
 
Be Proactive: A Good DBA Goes Looking for Signs of Trouble | IDERA
Be Proactive: A Good DBA Goes Looking for Signs of Trouble | IDERABe Proactive: A Good DBA Goes Looking for Signs of Trouble | IDERA
Be Proactive: A Good DBA Goes Looking for Signs of Trouble | IDERA
 
Advanced SQL Server Performance Tuning | IDERA
Advanced SQL Server Performance Tuning | IDERAAdvanced SQL Server Performance Tuning | IDERA
Advanced SQL Server Performance Tuning | IDERA
 
Geek Sync | Planning a SQL Server to Azure Migration in 2021 - Brent Ozar
Geek Sync | Planning a SQL Server to Azure Migration in 2021 - Brent OzarGeek Sync | Planning a SQL Server to Azure Migration in 2021 - Brent Ozar
Geek Sync | Planning a SQL Server to Azure Migration in 2021 - Brent Ozar
 
Geek Sync | Performance Tuning: Getting the Biggest Bang for Your Buck - Moni...
Geek Sync | Performance Tuning: Getting the Biggest Bang for Your Buck - Moni...Geek Sync | Performance Tuning: Getting the Biggest Bang for Your Buck - Moni...
Geek Sync | Performance Tuning: Getting the Biggest Bang for Your Buck - Moni...
 
Geek Sync | Meeting Security Benchmarks and Compliance with Microsoft SQL Ser...
Geek Sync | Meeting Security Benchmarks and Compliance with Microsoft SQL Ser...Geek Sync | Meeting Security Benchmarks and Compliance with Microsoft SQL Ser...
Geek Sync | Meeting Security Benchmarks and Compliance with Microsoft SQL Ser...
 
Geek Sync | How to Think Like the SQL ServerEngine - Brent Ozar
Geek Sync | How to Think Like the SQL ServerEngine - Brent OzarGeek Sync | How to Think Like the SQL ServerEngine - Brent Ozar
Geek Sync | How to Think Like the SQL ServerEngine - Brent Ozar
 
Geek Sync | Data Integrity Demystified - Deborah Melkin | IDERA
Geek Sync | Data Integrity Demystified - Deborah Melkin | IDERAGeek Sync | Data Integrity Demystified - Deborah Melkin | IDERA
Geek Sync | Data Integrity Demystified - Deborah Melkin | IDERA
 
Geek Sync | Breaking Bad Habits: Solutions for Common Query Antipatterns - Je...
Geek Sync | Breaking Bad Habits: Solutions for Common Query Antipatterns - Je...Geek Sync | Breaking Bad Habits: Solutions for Common Query Antipatterns - Je...
Geek Sync | Breaking Bad Habits: Solutions for Common Query Antipatterns - Je...
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 

Recently uploaded (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 

Idera live 2021: Database Auditing - on-Premises and in the Cloud by Craig Mullins

  • 1. © 2021 IDERA, Inc. All rights reserved. © 2021 Mullins Consulting, Inc. All rights reserved. Database Auditing 2021 Tracking who did what to which data when – on-prem and in the cloud A webinar by Craig S. Mullins www.mullinsconsutling.com 1
  • 2. © 2021 Mullins Consulting, Inc. All rights reserved. This presentation was prepared by: Craig S. Mullins President & Principal Consultant IBM Champion for Analytics IBM Gold Consultant Mullins Consulting, Inc. 15 Coventry Ct Sugar Land, TX 77479 Tel: 281-494-6153 E-mail: craig@craigsmullins.com http://www.mullinsconsulting.com This document is protected under the copyright laws of the United States and other countries as an unpublished work. This document contains information that is proprietary and confidential to Mullins Consulting, Inc., which shall not be disclosed outside or duplicated, used, or disclosed in whole or in part for any purpose other than as approved by Mullins Consulting, Inc. Any use or disclosure in whole or in part of this information without the express written permission of Mullins Consulting, Inc. is prohibited. © 2016 Craig S. Mullins and Mullins Consulting, Inc. (Unpublished). All rights reserved.
  • 3. © 2021 Mullins Consulting, Inc. All rights reserved. Data Breach Issues • Trends and considerations • Cost of a data breach • Your database is a target! Dealing with Data Protection • Government and Industry Regulations • Compliance and Requirements Database Auditing • Who are the stakeholders • Types of database auditing • Database auditing methods
  • 4. © 2021 Mullins Consulting, Inc. All rights reserved. Data Breach Issues Data Loss Facts and Trends
  • 5. © 2021 Mullins Consulting, Inc. All rights reserved. Privacy Rights Clearinghouse is one source for tracking data breaches: Since February 2005… • There have been 9,015 data breach incidents impacting over 10 billion total records containing sensitive personal information were exposed due to data security breaches* • That averages out to almost 12 data breaches every week • Starting with ChoicePoint: (Feb 15, 2005) – data on 165,000 customers breached Another good source is the annual Verizon Data Breach Investigations Report… • According to the Verizon Data Breach Report, in 2020 there were 5,258 confirmed data breaches, across 88 different countries. https://privacyrights.org/data-breaches * As of September 7, 2019, reported by Privacy Rights Clearinghouse Data Breaches are Common
  • 6. © 2021 Mullins Consulting, Inc. All rights reserved. Source: 2018 Gemalto Breach Level Index https://breachlevelindex.com/ Frequency of Data Breaches
  • 7. © 2021 Mullins Consulting, Inc. All rights reserved. • Data breaches impact customer loyalty • 64% of consumers are unlikely to do business with companies where their sensitive data was stolen • Companies bear the responsibility to protect customer data, according to: • Governmental and industry regulations • But also customers: 69% of whom believe companies are most responsible for protecting customer data • Customers do not believe that companies take this responsibility to protect their data as seriously as they should: • 75% of consumers believe that companies do not take protection and security of their data seriously Source: 2015 Gemalto Breach Level Index http://bit.ly/1PUCspY The Negative Impact of Data Breaches
  • 8. © 2021 Mullins Consulting, Inc. All rights reserved. The average cost of a data breach (in 2018) was up to $3.86 million This is a 6.4% increase from 2017 Source: Ponemon Institute 2018 Cost of a Data Breach Study: United States • Regulatory Fines and Legal Judgments • Legal Defense Costs • Customer Notifications • Credit Monitoring • Forensic Analysis • Reputational Losses The Cost of a Data Breach
  • 9. © 2021 Mullins Consulting, Inc. All rights reserved. The cost of a data breach actually varies • Average loss for a breach of 1,000 records: • Between $52,000 and $87,000 • Average loss for a breach affecting 10 million records: • Between $2.1 million and $5.2 million Source: 2015 Verizon Data Breach Investigation Report
  • 10. © 2021 Mullins Consulting, Inc. All rights reserved. Your Database Systems are Targets for Attack Enterprise database servers are a significant target of data breach attacks • Because that is where the data is! • Personally identifiable information (PII) • Such as SSN, address, etc. • Personal financial data • Bank account/credit card information • Healthcare data • Etc.
  • 11. © 2021 Mullins Consulting, Inc. All rights reserved. Source: 2015 Verizon Data Breach Investigation Report Frequency of Database Attacks
  • 12. © 2021 Mullins Consulting, Inc. All rights reserved. Dealing With Data Protection Issues Regulations and Governance
  • 13. © 2021 Mullins Consulting, Inc. All rights reserved. Sample Regulations Impacting Data Protection Governance Privacy 1. Basel II 2. Sarbanes Oxley 3. Turnbull Report 4. OFAC 5. CMS ARS 1. PCI DSS 2. HIPAA 3. CA SB 1386/AB 1950 4. GLBA 5. FCRA -- “Red Flag” 6. FISMA 7. GDPR Protect and control the process Protect the data
  • 14. © 2021 Mullins Consulting, Inc. All rights reserved. https://privacyrights.org/resources/data-breach-notification-united-states-and-territories US State and Territory Regulations As of 2018, all 50 states have enacted data breach notification statutes. The exact requirements of these regulations can vary greatly. Considerations include: ▪ Definition of a breach ▪ Type and form of data to be protected (electronic, digital, paper, etc.) ▪ Encryption key breach specifications ▪ Type and amount of penalty to be imposed for violations ▪ Entities covered (person, partnership, coporation, sole proprietor, government, etc.) ▪ Notification obligation and method
  • 15. © 2021 Mullins Consulting, Inc. All rights reserved. These resources can help to guide your compliance efforts: ▪ COBIT - https://cobitonline.isaca.org/ Control Objectives for Information and Related Technology ▪ Center for Internet Security (CIS) - https://www.cisecurity.org/ Organization dedicated to enhancing the cybersecurity readiness and response among public and private sector entities ▪ Department of Defense (DoD) - http://www.defense.gov/Resources/DoD-Information- Quality-Guidelines Guidelines and procedures for information quality ▪ Security Technical Implementation Guide (STIG) - http://iase.disa.mil/stigs/Pages/index.aspx Technical guidance for securely locking down computer systems & software that otherwise might be vulnerable to attacks ▪ Common Vulnerability Exposure (CVE) - https://cve.mitre.org/ Dictionary of publicly known information security vulnerabilities and exposures Guidance for Regulatory Compliance
  • 16. © 2021 Mullins Consulting, Inc. All rights reserved. Database Auditing by Regulation Audit Requirement SOX PCI-DSS GLB HIPAA Basel II GDPR Access to sensitive data (SELECT) X X X X X Modification of sensitive data (INSERT, UPDATE, DELETE) X X X Database changes/DDL (CREATE, ALTER, DROP) X X X X X X Security authorizations/DCL (GRANT, REVOKE) X X X X X X Security exceptions (e.g. failed logins, SQL errors) X X X X X X
  • 17. © 2021 Mullins Consulting, Inc. All rights reserved. Monitoring privileged users is a significant aspect of compliance auditing… From a database perspective this includes: • DBAs • SYSADMs • SECADMs Not enough of this is being done… Source: Cyberthreat Defense Report, CyberEdge Group Privileged User Auditing
  • 18. © 2021 Mullins Consulting, Inc. All rights reserved. Database Auditing What is it? How is it done?
  • 19. © 2021 Mullins Consulting, Inc. All rights reserved. There are many names used for basically the same thing. In this presentation the term database auditing is used, but you may also know it as: • Data Access Auditing • Data Monitoring • Database Activity Monitoring (DAM) My definition of Database Auditing: The process of monitoring access to and modification of selected database objects and resources within operational databases and retaining a detailed record of the access where this record can be used to proactively trigger actions and can be retrieved and analyzed as needed. What is Database Auditing?
  • 20. © 2021 Mullins Consulting, Inc. All rights reserved. Database Auditing Key Stakeholders SECURITY OPERATIONS ✓ Real-time policies ✓ Secure audit trail ✓ Data mining & forensics ✓ Business rqmts ✓ Separation of duties ✓ Best practices reports ✓ Automated controls ✓ Minimal impact ✓ Change management ✓ Performance issues
  • 21. © 2021 Mullins Consulting, Inc. All rights reserved. Authorization Auditing • Who can do what Access Auditing • Who did do what. • Modifications: INSERT, UPDATE, DELETE • Reads: SELECT • DDL: CREATE, DROP, ALTER • DCL: GRANT, REVOKE • Utilities: Load, Unload, Export, Import, Copy… Replication Auditing • Who copied which data where. Types of Database Auditing
  • 22. © 2021 Mullins Consulting, Inc. All rights reserved. Non-Standard Access • File-level snooping as opposed to going through the DBMS interface • System-level snooping and zapping (e.g. pointers) • Image copy backup data sets • Unload data sets • REORG data sets • Database statistics • Some database statistics, such as column distribution statistics, can contain actual data values • Such as AMASPZAP on mainframes https://www.ibm.com/support/knowledgecenter/SSLTBW_2.1.0/com.ibm.zos.v2r1.ieab100/iea3b1_AMASPZAP.htm
  • 23. © 2021 Mullins Consulting, Inc. All rights reserved. Selective • Must be rules-based to enable the capture of audit details only on the specific data that requires auditing. • Should be able to implement privileged user auditing, auditing by application, by database object, by type of command, by utility, etc. Comprehensive • Must be able to capture the complete scenario of auditable information. Non-invasive • Should be able to audit access to data without incurring expensive performance degradation. Be capable of answering: • Who accessed/modified the data? • When did it happen? • Using what computer program or client software? • From what location on the network? • What was the SQL query that accessed the data? • Was it successful; and if so, how many rows of data were retrieved? General Database Auditing Requirements
  • 24. © 2021 Mullins Consulting, Inc. All rights reserved. There are 6 common methods used to audit databases: 1. Audit within the DBMS (traces) Must start a trace w/I the DBMS/server 2. Audit using temporal capabilities SYSTEM temporal tables to record all changed data 3. Audit using triggers (or hand-coding) Database triggers or hard-coding audit trail in programs 4. Audit from the database transaction log files Modifications are on the log anyway so… 5. Audit over the network Sometimes called network sniffing: captures SQL requests as they are sent over the network 6. Audit directly against the DBMS server control blocks Sometimes called a “tap” Database Auditing Approaches
  • 25. © 2021 Mullins Consulting, Inc. All rights reserved. Most DBMSes offer an audit or trace capability that enables you to trace events or categories of events by UserID, object ownership, etc. You can typically choose from multiple audit options such as: • Categories of events • SELECT, INSERT, UPDATE, DELETE, CREATE, DROP, REVOKE, GRANT, etc. • Privileged User Access • Specific Tables, UserIDs, programs… 1. Native DBMS Audit Capabilities
  • 26. © 2021 Mullins Consulting, Inc. All rights reserved. Potential Native Audit Issues: Separation of duties – auditing typically is turned on and off by DBAs (privileged users) Overhead – some audit traces can consume a significant amount of resources • Don’t want to “dim the lights” to audit Comprehensive capture – may not capture everything that needs to be captured for compliance First read/write in a UOR Statements with syntax errors Depends on the DBMS and the type of auditing There can be multiple types of native audit per DBMS Audit trail access – how do you access the audit trail; may require significant programming + support 1. Native DBMS Audit Capabilities
  • 27. © 2021 Mullins Consulting, Inc. All rights reserved. A somewhat newer capability of several DBMS offerings is the ability to create temporal tables A system-level temporal table can be used to audit changes (aka transaction time) • System time tracks the insertion and modification history of the data. • System Time is typically tracked using two tables. 2. System Temporal Tables • One table contains the current data. • Another, history table, contains the non-current data.
  • 28. © 2021 Mullins Consulting, Inc. All rights reserved. • Implementing auditing using SYSTEM time temporal tables… • Typically requires a 3 step process: 1. Create the base table and include TIMESTAMP columns to track the starting and ending points for the system time period 2. Create the history table with an identical structure, preferably by using a CREATE TABLE . . . LIKE statement. 3. ALTER the current table to enable versioning thereby turning on the system temporal capability. 2. System Temporal Tables
  • 29. © 2021 Mullins Consulting, Inc. All rights reserved. 2. Temporal: Adding Data to our System Time “Table” COURSENO TITLE CREDITS PRICE SYS_START SYS_END 500 INTRO TO COBOL 2 200.00 2012-01-10 9999-12-31 600 INTRO TO JAVA 2 250.00 2012-01-10 9999-12-31 650 ADVANCED JAVA 3 400.00 2012-01-10 9999-12-31 COURSE table COURSENO TITLE CREDITS PRICE SYS_START SYS_END COURSE_HIST table The table contains three rows The table is empty – After inserting these three rows → – The data look like this
  • 30. © 2021 Mullins Consulting, Inc. All rights reserved. – After issuing these statements (UPDATE and DELETE) → – Our tables now look like this 2. And then let’s DELETE from our System Time “Table” COURSE table COURSE_HIST table The table contains two rows The table contains two rows COURSENO TITLE CREDITS PRICE SYS_START SYS_END 500 INTRO TO COBOL 2 200.00 2012-01-10 9999-12-31 650 ADVANCED JAVA 3 375.00 2012-01-15 9999-12-31 COURSENO TITLE CREDITS PRICE SYS_START SYS_END 650 ADVANCED JAVA 3 400.00 2012-01-10 2012-01-15 600 INTRO TO JAVA 2 250.00 2012-01-10 2012-02-05
  • 31. © 2021 Mullins Consulting, Inc. All rights reserved. • Simply retrieve the current info for Advanced Java course: • Access info about Advanced Java course for January 16, 2012: 2. System Time: Sample Queries (#1, #2) – Returns one row → AS OF FROM BETWEEN
  • 32. © 2021 Mullins Consulting, Inc. All rights reserved. • Only useful to track modifications (U/I/D) • No tracking of access to data (read/SELECT) • No tracking of who made each change • No way to audit privileged users • Data management issues • Large amount of “old” data • Needs to be purged – but within the specifications of the regulations being complied with! • Uses the database itself to store audit data • Separation of duties: a DBA can get past it • Disconnect the temporal connection • Delete data • Reconnect 2. Issues w/Using Temporal for Auditing
  • 33. © 2021 Mullins Consulting, Inc. All rights reserved. 3. Using Triggers Similar to the temporal option, you can use database Triggers to write audit records Write a set of Triggers for the tables you wish to audit • One each for Insert, Update, and Delete Write the pertinent details – whatever you want – to audit tables you define • Or files if your DBMS allows triggers to write to files
  • 34. © 2021 Mullins Consulting, Inc. All rights reserved. • You have to write and maintain the Triggers • This can be an exposure based on who has access to the trigger code • No tracking of access to data (read/SELECT) • No way to audit privileged users • Trigger performance can be poor • Data management issues similar to temporal data • e.g.) amount of data, purging, using the database to store audit data, separation of duties 3. Issues w/Using Triggers for Auditing
  • 35. © 2021 Mullins Consulting, Inc. All rights reserved. Sometimes developers add “audit columns” to tables, such as LAST_MODIFIED_DATE • The idea here is for the program to auto- matically change the LAST_MODIFIED_DATE column in the programs whenever data is changed • Every program? Auditors don’t like this… it is a problem because: • Audit trails should be kept outside of the database • Can you guarantee that LAST_MODIFIED_DATE is accurate? 3½. Hand-coding audit trails? • If you delete the row you lose the audit data • Couldn’t someone have set it by accident (or nefariously)?
  • 36. © 2021 Mullins Consulting, Inc. All rights reserved. 4. What About Using the Database Logs? Database transaction log(s) capture ALL* changes made to data. DBMS Transaction Log(s) SQL Changes *Well, maybe not all changes, all the time. Database
  • 37. © 2021 Mullins Consulting, Inc. All rights reserved. 4. Issues With Database Log Auditing & Analysis Log format is proprietary Volume can be an issue Easy access to online and archive logs? • But how long do you keep your archive logs? Dual usage of data could cause problems? • Recovery and protection • Audit Tracks database modifications, but what about reads? • Transaction logs do not record information about SELECT And what about non-logged operations? • LOAD LOG NO, REORG LOG NO • Non-logged table spaces, LOBs Cannot invoke real-time actions using log-based auditing
  • 38. © 2021 Mullins Consulting, Inc. All rights reserved. Database auditing via network sniffing captures SQL requests as they go across the network • Some third-party database auditing solutions use this approach • Perhaps more effective for cloud database auditing But not all requests go across the wire • DBA access directly on the server • Mainframe applications (CICS, IMS/TM, TSO, batch) 5. Network Capture
  • 39. © 2021 Mullins Consulting, Inc. All rights reserved. Audit database requests at the server Capture all SQL requests at the server All SQL access can be audited, not just those made over a network Retain all pertinent audited information • Without relying on the DBMS No need to keep the active/archive log files No need to start a DBMS trace No need to modify the database schema Concerns? • Requires purchasing additional ISV software • Interfaces with DBMS internals 6. Tap Database Server Control Blocks
  • 40. © 2021 Mullins Consulting, Inc. All rights reserved. The Best Approach? All of the approaches discussed herein have their merits depending upon the type of database applications that you need to audit Database auditing products may use one or more of these different approaches and methods • Understand the methods used by any product you evaluate • For example, a combination of native tracing and capturing information from database control blocks can make for a reasonable solution
  • 41. © 2021 Mullins Consulting, Inc. All rights reserved. Let’s Discuss a Few Cloud Issues When the database exists in the cloud, remotely instead of on prem, there may be challenges that need to be understood and managed: • If the database is managed completely by the CSP, there may be a lack of visibility and control • It may be difficult to integrate cloud and on-prem audit activities • Be aware of volume and licensing issues Finally, if you rely on the cloud, make sure that any database auditing product you acquire will work with your cloud provider • and DBMS Things can get complex…
  • 42. © 2021 Mullins Consulting, Inc. All rights reserved. Benefits of Database Auditing Products • Favor products that offer built-in reporting for the regulations you need to comply with (like GDPR, HIPAA, etc.) Instead of you having to translate trace records to specific compliance requirements • Vendor maintenance and support for changing DBMS capabilities and regulatory compliance specifications • Customizable policies and alerting • Typically come with a dashboard to view compliance information, audit activities and issues • Built-in support for specific regulations • Many product consume fewer resources than alternate approaches
  • 43. © 2021 Mullins Consulting, Inc. All rights reserved. Craig S. Mullins Mullins Consulting, Inc. 15 Coventry Ct Sugar Land, TX 77479 (281) 494-6153 E-mail: craig@craigsmullins.com Web: www.mullinsconsulting.com https://datatechnologytoday.wordpress.com/ Data & Technology Today Blog http://www.mullinsconsulting.com/dba-corner.html DBA Corner Columns Contact Information https://tinyurl.com/cj3x4tm6