18.12.2012 Views

Proceedings

Proceedings

Proceedings

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

� business continuity plan;<br />

� testing plans and results of the last disaster recovery test.<br />

• Physical security<br />

Physical access to database systems should be restricted to authorised personnel<br />

only. The auditor should visit the data centre to ensure that database systems are<br />

stored in secured environments, like equipments are connected to an alternative<br />

power source, there are smoke detectors, fire extinguishers, there are no pipes<br />

crossing the data room, etc and that password-protected screen savers are in place.<br />

Once all of the aforementioned audit steps will be covered, the results will be captured<br />

in the audit report.<br />

CONCLUSIONS<br />

Today’s threat landscape has evolved toward targeted attacks aimed at specific<br />

companies, specially the financial services ones. Stealing digital money, payment card<br />

information, personal data and customers databases became the top priority for<br />

attackers. And all these data are stored in the databases.<br />

Oracle is used worldwide to house business database applications. If not well<br />

protected, the databases become a very attractive target for the attackers. Oracle has<br />

enhanced the security features of the database but if not properly configured, is almost<br />

useless. Hardening measures that are at no cost and easy to implement should be<br />

known by all database administrators and IT auditors. It was proven that 64% of the<br />

breaches could be easily prevented by the implementation of simple and cheap<br />

controls. Clearly there is a strong need for improving and enforcing the accountability<br />

management. The simple goal is to ensure that users do not have more privileges than<br />

they need and all access is monitored. The practices of using generic accounts and<br />

username sharing should be discontinued. Even if everybody agrees that it shouldn’t<br />

be there, there are still active default accounts or default passwords.<br />

The audit of the databases has become a critical challenge for organizations. Any<br />

deficiency in the database security can nullify all the controls that have been<br />

implemented at the application level. Moreover, the regulatory environment has<br />

increased over the last years, international and national regulations have evolved in<br />

detailed frameworks covering the internal control system and special data aspects, like<br />

preserving confidentiality, integrity and availability. All these regulatory constraints<br />

have been translated into the activation of audit trails mechanisms within the<br />

information systems and into the growth of the storage capacity, all this having a<br />

serious impact on the performance of the information systems. Nowadays, the IT<br />

management faces a new challenge that is to find the right balance between the risk<br />

level introduced by the information systems and the mitigating controls with a direct<br />

impact on the systems’ performance.<br />

~ 300 ~

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!