DataSunrise Achieves AWS DevOps Competency Status in AWS DevSecOps and Monitoring, Logging, Performance

What is Data Audit Used For? Essential for security

What is Data Audit Used For? Essential for security

Almost every large organization has a special department to fight against information security threats. In this article we discuss what is data audit used for, it’s purpose and benefits. In most cases, its department staff has to perform the following tasks:

  • Detection of user passwords cracking and network ports scanning.
  • Prevention of computer virus infections.
  • Detecting of malicious and illegal software installed on company employees’ PCs.
  • Internet fraud prevention.
  • Revealing of errors and problems of information systems operation cycle (process).
  • Detection of software errors and system malfunctions.
  • Revealing of potential vulnerabilities in security and data storage systems, which can be used to perform data breach.

In most cases all the previously mentioned means used for protection against third-party hackers. However, the insider threats could be not less dangerous than hacker attacks. Insider threats called that way because their source is company’s own employees or hired contractors. In most cases of insider-driven incidents, the data thefts or data leaks are done via email, messengers, social networks, cloud storage and the like.

There are a lot of DLP solutions on the market today for data leak channels control. However but in practical life, the violators use not only email and web applications. Various types of databases are widely used to store sensitive data in today’s corporate environment. These DBMSs and associated applications interact with each other through the specific protocols. The problem is that many DLP solutions are not capable of scanning database-specific traffic, so it is necessary to use dedicated software.

Database Activity Monitoring by DataSunrise

DataSunrise Database Security Suite is purpose-built for database traffic analysis. The database monitoring functionality performs database auditing. Auditing results can be stored in a built-in database or exported to external SIEM-systems for analysis.

Advanced Solution for Database Audit and Database Activity Monitoring

While performing database auditing, DataSunrise collects the following information:

First and foremost, audit results evaluation helps to detect the culprit of data leak and to evaluate its cost. But database auditing also enables you to prevent data theft by revealing suspicious user behavior (for example, queries which are not typical for certain users, attempts to access database elements they are not allowed to view etc.).

DataSunrise Database Audit – Database Activity Monitoring module also features a self-learning algorithms that DataSunrise uses to log SQL queries typical for the given database. Because these queries resemble normal user behavior, they are considered as safe by default, thus all other queries can be considered as suspicious and should be blocked or inspected more thoroughly.

audit

DataSunrise Data Audit and SOX Compliance

Section 404 of SOX establishes the following requirements on database audit:

  • 1.1 Monitoring database access by privilege users and “masqueraders”
  • 1.2 Monitoring changes in privileges
  • 1.3 Monitoring access failures

System Events section of DataSunrise provides comprehensive logs on database connection, authentication attempts, security policy changes, privilege assignment and other system events, which helps to prevent exceeding of authority by insiders and to protect data privacy and governance.

  • 1.4 Monitoring schema changes
  • 1.5 Monitoring direct data access

DataSunrise continuously monitors changes made to database content and provides comprehensive logs containing the following:

  • SQL code of intercepted queries.
  • Session information: user names, client applications, session duration time, IP addresses (hostnames) queries came from and so on.
  • Target database information: database instance which received user queries, number of database entries that were affected by incoming query.
  • Database errors.

DataSunrise Data Audit and PCI DSS

PCI DSS Requirement 10 defines obligations of affected organizations pertaining to monitoring and tracking of cardholder data, which include:

  • 10.1 Implement audit trails to link all access to system components to each individual user.

Logs contain data on all actions of the user since opening the session till it’s closing, including the database elements the user accessed.

  • 10.2 Implement automated audit trails for all system components to reconstruct the following events:
    10.2.1 Verify all individual access to cardholder data is logged.
    10.2.2 Verify all actions taken by any individual with root or administrative privileges are logged.
  • 10.3.1 Verify user identification is included in log entries.
    10.3.2 Verify type of event is included in log entries.
    10.3.3 Verify date and time stamp is included in log entries.
    10.3.4 Verify success or failure indication is included in log entries.
    10.3.5 Verify origination of event is included in log entries.
    10.3.6 Verify identity or name of affected data, system component, or resources is included in log entries.

DataSunrise DAM solution tracks logs on all database events including culprit of queries, detailed session data, error logs, SQL codes of the queries, results of their execution, and all required parameters are given above. There is also the Data Discovery feature that helps to detect and organize sensitive data including credit card numbers.

  • 10.5 Secure audit trails so they cannot be altered.
    10.5.3 Promptly back up audit trail files to a centralized log server or media that is difficult to alter.
    10.5.4 Write logs for external-facing technologies onto a secure, centralized, internal log server or media device.

Audit logs are stored in specified PostgreSQL, MySQL database, DataSunrise integrated SQLite database. Storing logs in external databases with separate authentication requirement allows you to conform to the above requirements and prevents attackers from tracking up their traces. DataSunrise generates audit reports in csv and pdf formats. DataSunrise also has a report functionality which views information on target database traffic as tables or diagrams. For real-time analysis of database audit results, DataSunrise can be integrated with almost every existing SIEM-system due to Syslog protocol support.

  • 10.6 Review logs and security events for all system components to identify anomalies or suspicious activity. Note: Log harvesting, parsing, and alerting tools may be used to meet this Requirement.

Each audit rule of DataSunrise has an option to add subscribers that will receive a notification whenever the rule is triggered. Properly configured audit rules help to conform to the above requirement and save a lot of time for DBAs.

Note: Some of the sub-clauses of requirements are not mentioned as they require measures on the part of the product acquirer.

Conclusion

Security and audit settings of DataSunrise are highly scalable and easy-to-use. Spend some time to properly configure privacy and audit policies, this will automate main daily routine procedures of monitoring, simplify the required procedures and save time of your employees.

Database audit helps to perform both data leak investigation and prevention. Thus DataSunrise Database Audit functionality is another line of defense of your precious information.

DataSunrise supports all major databases and data warehouses such as Oracle, Exadata, IBM DB2, IBM Netezza, MySQL, MariaDB, Greenplum, Amazon Aurora, Amazon Redshift, Microsoft SQL Server, Azure SQL, Teradata and more. You are welcome to download a free trial if would like to install on your premises. In case you are a cloud user and run your database on Amazon AWS or Microsoft Azure you can get it from AWS market place or Azure market place.

Next

DataSunrise for Oracle Security

DataSunrise for Oracle Security

Learn More

Need Our Support Team Help?

Our experts will be glad to answer your questions.

Countryx
United States
United Kingdom
France
Germany
Australia
Afghanistan
Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belgium
Belize
Benin
Bermuda
Bhutan
Bolivia
Bosnia and Herzegovina
Botswana
Bouvet
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Canada
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Congo, Republic of the
Congo, The Democratic Republic of the
Cook Islands
Costa Rica
Cote D'Ivoire
Croatia
Cuba
Cyprus
Czech Republic
Denmark
Djibouti
Dominica
Dominican Republic
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard Island and Mcdonald Islands
Holy See (Vatican City State)
Honduras
Hong Kong
Hungary
Iceland
India
Indonesia
Iran, Islamic Republic Of
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Japan
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Democratic People's Republic of
Korea, Republic of
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Libyan Arab Jamahiriya
Liechtenstein
Lithuania
Luxembourg
Macao
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States of
Moldova, Republic of
Monaco
Mongolia
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia, Republic of
Northern Mariana Islands
Norway
Oman
Pakistan
Palau
Palestinian Territory, Occupied
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Helena
Saint Kitts and Nevis
Saint Lucia
Saint Pierre and Miquelon
Saint Vincent and the Grenadines
Samoa
San Marino
Sao Tome and Principe
Saudi Arabia
Senegal
Serbia and Montenegro
Seychelles
Sierra Leone
Singapore
Slovakia
Slovenia
Solomon Islands
Somalia
South Africa
South Georgia and the South Sandwich Islands
Spain
Sri Lanka
Sudan
Suriname
Svalbard and Jan Mayen
Swaziland
Sweden
Switzerland
Syrian Arab Republic
Taiwan, Province of China
Tajikistan
Tanzania, United Republic of
Thailand
Timor-Leste
Togo
Tokelau
Tonga
Trinidad and Tobago
Tunisia
Turkey
Turkmenistan
Turks and Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Venezuela
Viet Nam
Virgin Islands, British
Virgin Islands, U.S.
Wallis and Futuna
Western Sahara
Yemen
Zambia
Zimbabwe
Choose a topicx
General Information
Sales
Customer Service and Technical Support
Partnership and Alliance Inquiries
General information:
info@datasunrise.com
Customer Service and Technical Support:
support.datasunrise.com
Partnership and Alliance Inquiries:
partner@datasunrise.com