At the heart of any useful information system is a database. Tables and rows; views and relations; and of course, there is the data itself. Yet the database is only a small portion of the information system that enables its use—the database management system (DBMS). Is yours secure?
Security of Database Systems
Like any other information system, a database system requires configuration, patching, authentication and authorization controls. Most commercial database systems include helpful procedures that make life easier for application developers and database administrators. Unfortunately, these same procedures, if not properly locked down, can make life easier for your adversaries. Many of the first steps toward developing an information system revolve around the database. Quite often, the decisions made in the database system development effort will have a major impact on information security.
Database Security Auditing
Sword & Shield engineers are experienced in auditing Oracle, Microsoft SQL, Notes, and several other database management system products. Among other things, Sword & Shield security engineers analyze authentication and authorization controls in the database system for least-privilege access controls and audit traceability. Emphasis is placed on matching the degree of security with the business and operational needs.
Find Out More
Sword & Shield has been outsmarting cyber-criminals and improving security for enterprises around the world since 1997. Fill out our Consultation Request form or call us so we can begin securing your future.
U.S. Toll-free: 800-810-1885