IBM Infosphere Guardium - Database Security

76
© 2010 IBM Corporation Information Management IBM InfoSphere Guardium Enterprise-wide Database Protection and Compliance

description

 

Transcript of IBM Infosphere Guardium - Database Security

Page 1: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Information Management

IBM InfoSphere Guardium Enterprise-wide Database Protection and Compliance

Page 2: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

SQL injection played a role in 79% of records compromised

during 2009 breaches

“Although much angst and security funding is given to …. mobile

devices and end-user systems, these assets are simply not

a major point of compromise.”

Database Servers Are The Primary Source of Breached Data

2010 Data Breach Report from Verizon Business RISK Team http://www.verizonbusiness.com/resources/reports/rp_2010-data-breach-report_en_xg.pdf

Source of Breached Records

… up from 75% in 2009 Report

Page 3: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Information Management

Perimeter defenses no longer sufficient

A fortress mentality will not work in cyber. We cannot retreat

behind a Maginot Line of firewalls.

-- William J. Lynn III, U.S. Deputy Defense Secretary

Outsourcing

Web-Facing Apps

Employee Self-Service,

Partners & Suppliers

Insiders (DBAs, developers,

outsourcers, etc.)

Stolen Credentials

(Zeus, etc.)

Page 4: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Information Management

Typical home-grown solutions are costly and ineffective

Create reports

Manual review

Manual remediation dispatch and tracking

Significant labor cost to review data and maintain process

High performance impact on DBMS from native logging

Not real time

Does not meet auditor requirements for Separation of Duties

Audit trail is not secure

Inconsistent policies enterprise-wide

Native Database Logging

Pearl/Unix Scripts/C++

Scrape and parse the data

Move to central repository

Native Database Logging

Native Database Logging

Native Database Logging

Page 5: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Information Management

InfoSphere Guardium continues to demonstrate its leadership …

2011

Source: The Forrester Wave™: Database Auditing And Real-Time Protection, Q2 2011, May 6, 2011. The Forrester Wave is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forrester's call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is based

on best available resources. Opinions reflect judgment at the time and are subject to change.

Page 6: IBM Infosphere Guardium - Database Security

© 2011 IBM Corporation

IBM Security Solutions

6

What We Offer?

Database User Activity Monitoring

- Auditing and reporting

- Enforcing database user access

- Prevention (blocking)

Data Privacy

- Masking non-production data

- Encryption for production data

- Redaction for documents

Vulnerability Assessment

Page 7: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Information Management

Collector

Real time database monitoring and protection with InfoSphere Guardium

No DBMS or application changes

Does not rely on DBMS-resident logs that can

easily be erased by attackers, rogue insiders

100% visibility including local DBA access

Minimal performance impact

Cross-DBMS solution

Granular, real-time policies & auditing

–Who, what, when, how

Automated compliance reporting, sign-

offs and escalations (financial

regulations, PCI DSS, data privacy

regulations, etc.)

Host-based

Probes (S-TAPs)

Page 8: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Information Management

Page 9: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Information Management

IBM InfoSphere Guardium Architecture

Page 10: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Information Management

Page 11: IBM Infosphere Guardium - Database Security

© 2011 IBM Corporation

IBM Security Solutions

Scalable Multi-Tier Architecture

Integration with LDAP,

IAM, SIEM, IBM TSM,

BMC Remedy, …

Oracle on

Linux for

System z

Page 12: IBM Infosphere Guardium - Database Security

© 2011 IBM Corporation

IBM Security Solutions

Page 13: IBM Infosphere Guardium - Database Security

© 2011 IBM Corporation

IBM Security Solutions

Page 14: IBM Infosphere Guardium - Database Security

© 2011 IBM Corporation

IBM Security Solutions

Page 15: IBM Infosphere Guardium - Database Security

© 2011 IBM Corporation

IBM Security Solutions

Page 16: IBM Infosphere Guardium - Database Security

© 2011 IBM Corporation

IBM Security Solutions

Page 17: IBM Infosphere Guardium - Database Security

© 2011 IBM Corporation

IBM Security Solutions

Page 18: IBM Infosphere Guardium - Database Security

© 2011 IBM Corporation

IBM Security Solutions

Page 19: IBM Infosphere Guardium - Database Security

© 2011 IBM Corporation

IBM Security Solutions

Page 20: IBM Infosphere Guardium - Database Security

© 2011 IBM Corporation

IBM Security Solutions

Page 21: IBM Infosphere Guardium - Database Security

© 2011 IBM Corporation

IBM Security Solutions

Page 22: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Information Management

IBM InfoSphere Guardium Installation

Page 23: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Information Management

Page 24: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Information Management

Page 25: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Information Management

Page 26: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Information Management

IBM InfoSphere Guardium Data Base Auto Discovery (DBAD)

Page 27: IBM Infosphere Guardium - Database Security

© 2011 IBM Corporation

IBM Security Solutions

Page 28: IBM Infosphere Guardium - Database Security

© 2011 IBM Corporation

IBM Security Solutions

Page 29: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Information Management

IBM InfoSphere Guardium Security Policy & Reporting

Page 30: IBM Infosphere Guardium - Database Security

© 2011 IBM Corporation

IBM Security Solutions

Page 31: IBM Infosphere Guardium - Database Security

© 2011 IBM Corporation

IBM Security Solutions

Page 32: IBM Infosphere Guardium - Database Security

© 2011 IBM Corporation

IBM Security Solutions

Page 33: IBM Infosphere Guardium - Database Security

© 2011 IBM Corporation

IBM Security Solutions

Page 34: IBM Infosphere Guardium - Database Security

© 2011 IBM Corporation

IBM Security Solutions

Page 35: IBM Infosphere Guardium - Database Security

© 2011 IBM Corporation

IBM Security Solutions

Page 36: IBM Infosphere Guardium - Database Security

© 2011 IBM Corporation

IBM Security Solutions

Page 37: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Information Management

IBM InfoSphere Guardium Classifier

Page 38: IBM Infosphere Guardium - Database Security

© 2011 IBM Corporation

IBM Security Solutions

Page 39: IBM Infosphere Guardium - Database Security

© 2011 IBM Corporation

IBM Security Solutions

Page 40: IBM Infosphere Guardium - Database Security

© 2011 IBM Corporation

IBM Security Solutions

Page 41: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Information Management

IBM InfoSphere Guardium Real Time & Correlation Alerts

Page 42: IBM Infosphere Guardium - Database Security

© 2011 IBM Corporation

IBM Security Solutions

Page 43: IBM Infosphere Guardium - Database Security

© 2011 IBM Corporation

IBM Security Solutions

Page 44: IBM Infosphere Guardium - Database Security

© 2011 IBM Corporation

IBM Security Solutions

Page 45: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Information Management

IBM InfoSphere Guardium S-GATE

Page 46: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Page 47: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Page 48: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Page 49: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Page 50: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Page 51: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Information Management

IBM InfoSphere Guardium Quarantine & Redact

Page 52: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Page 53: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Page 54: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Page 55: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Page 56: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Page 57: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Information Management

IBM InfoSphere Guardium Configuration Audit System (CAS)

Page 58: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Page 59: IBM Infosphere Guardium - Database Security

© 2011 IBM Corporation

IBM Security Solutions

Page 60: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Page 61: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Page 62: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Page 63: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Information Management

IBM InfoSphere Guardium Vulnerability Assesment

Page 64: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Page 65: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Page 66: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Information Management

IBM InfoSphere Guardium Entitlement Reports

Page 67: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Page 68: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Page 69: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Information Management

IBM InfoSphere Guardium Application User Identification

Page 70: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Page 71: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Page 72: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Page 73: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Page 74: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Page 75: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Page 76: IBM Infosphere Guardium - Database Security

© 2010 IBM Corporation

Information Management

IBM InfoSphere Guardium Paldies par uzmanību!