19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

S 2.129 Controlling access to database information<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: Administrators<br />

A number of measures are required to effectively protect the confidentiality<br />

and integrity of data in a database. In addition to measures for controlling<br />

access to a database system, described in S 2.128 Controlling access to a<br />

database system, the following measures are essentially needed for controlling<br />

access to database information:<br />

- <strong>Protection</strong> of database objects<br />

<strong>The</strong> database objects, i.e. tables, indices, database procedures etc. should<br />

be assigned logically to the applications using these objects. <strong>The</strong> resulting<br />

groups of database objects pertaining to each application are each assigned<br />

an account configured specially for this purpose. This allows the access<br />

rights on the database objects to be defined such that the objects can only<br />

be modified via these special IDs. If several applications access the same<br />

database objects, these should be put into a separate group.<br />

For example, if the data of two applications A and B are to be managed in<br />

the database, two database accounts - apnA and apnB - need to be created.<br />

All database objects which can be allocated uniquely to application A are<br />

configured and managed with database account apnA. <strong>The</strong> database objects<br />

of application B are handled similarly.<br />

One example of a central database object used by both applications is a<br />

table which lists all the printers installed. Database objects in this category<br />

should not be assigned one of the existing accounts (apnA or apnB);<br />

instead, such database objects should be grouped and managed centrally<br />

under a separate account (e.g. print).<br />

Such special IDs are not related to persons. Instead, staff members<br />

authorised specifically for this purpose (e.g. the administrator of the<br />

database or the corresponding application) receive the password of the<br />

required account if the database objects need to be modified.<br />

- Data security<br />

Special views can be configured for users, allowing data to be rendered<br />

visible or kept concealed in accordance with specified criteria. A view is<br />

used to explicitly define the fields of one or more tables which can be<br />

viewed by a user. A restrictive allocation of access rights (or grants, as<br />

described below) for such views allows confidential data to be protected<br />

against unauthorised access.<br />

Access rights (grants) need to be allocated for tables, views and even<br />

individual fields of a table. <strong>The</strong>se rights generally pertain to individual<br />

users, roles or user groups. However, such access rights should always be<br />

granted to user groups or roles, not to individual users, as a high number of<br />

users would require a great deal of administrative effort in this case. <strong>The</strong><br />

following types of access rights are available: read, update, delete and<br />

insert. Access rights should be granted as sparingly as possible, otherwise<br />

it becomes increasingly difficult to retain a clear overview of the actual<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!