Database security of government

The current e-government network information system classified data constitute a comprehensive information security in the database centrally stored, traditional information security solutions is mainly transmitted through the network channel encryption, PKI or enhanced authentication, firewall, IPS, and other technology fortress coping strategies, but these programs become fragile in reality, a lot of information leakage incidents broke out frequently.

Traditional solutions no application access and control any database access protocols, such as: SQL injection is a typical database ****** means; data leakage often occurs in the interior of a large number of operation and maintenance personnel in direct contact with sensitive data, traditional to prevent foreign-based network security solutions lose useless; *** destroyed because the database vulnerability is likely to be implicated in a number of departments of the database system can not be used, resulting in centralized data leaks after brush library; lack of database security control means need to achieve fine control, the current technology, information center and track the database administrator can not control access to sensitive data; the database file is stored in plain text parsing, active or passive mainstream organizational structure of large database data files public of, Once you have these data files, data storage is actually transparent. Data access tracking information appears fault, the needs of business users associated with the audit, information centers need the most accurate, detailed audit trail, you need to access the data actually locate operator to be responsible for effective accountability.

Under the new situation of information technology, e-government network often have to do in the off-site data collaboration, data access process should reinforce the use of the database to ensure data security, while database synchronization between different regions, both to ensure data confidentiality, but also it can not affect the normal use.

Security classification policy requires protection, protection of national security secrets, ××× release reinsurance confidentiality requirements and implemented in 2007, for security measures involving state secrets information systems, technical requirements are proposed classification and protection and evaluation requirements for fail grading system to protect classified information is required to stop running.

In terms of data security, confidentiality protection requirements grade level and above from the operation management system of separation of powers, authentication, access control, security audit carried out a series of technical requirements and evaluation, and occupy a higher proportion.

A lot of the data is confidential data within the network of e-government, the need for strict protection against tampering and leakage of information, as well as access to trace data to achieve full traceability of.

Due to historical reasons, many of the main core of the information center using Oracle and SQLServer database as the representative of foreign products, and because of the complexity of database technology in the short term is difficult to replace. Snowden occurrence of events, evidence of our confidential data on the foreign database, if not the use of domestic self-control database security reinforcement technology, confidential information in the database will have a huge risk of leakage.

Even in the database system to achieve a localization of classified information systems, operation and maintenance of the database currently there are three-way split, to prevent SQL injection vulnerabilities *** and all of the operations to be audited, and many other database security needs, therefore, database security reinforcement programs of universal significance.

The program of e-government portal network, office network and network services into three categories longitudinal information systems, back-end database system security risks faced by the core security needs careful analysis, and put forward by pre-diagnosis, a matter of control and postaudit opportunity to achieve full protection of database security solutions to meet the requirements of domestic and foreign security reinforcement database.

On the basis of the basic security mechanism on the existing database system, introduce a credible database access control mechanisms, with a database of the risks of early detection, control dangerous operation, administrator privileges restricted, sensitive data is difficult as burglary, classified encrypted data storage, access and other acts of auditable security capabilities to protect the security of the data stored in the database, the use of safety and security confidentiality, data center to meet the information security classification and protection requirements.

Through the analysis of security threats, overall design and planning, family security products division of work between each other, together form the overall protection system, covering pre-diagnosis of database security, a matter of control and post-mortem analysis. Prior diagnosis: leak sweep through the database product, the effective detection database of known vulnerabilities, and effective repair. Regular database security checks and take preventive measures, to conduct a comprehensive assessment database security risk, the use of specialized database vulnerability scanning system, the status of the safety database production domain to conduct a comprehensive test. Security vulnerabilities items include: weak passwords, default passwords, weak security policy, broad authority, sensitive data discovery, privilege escalation vulnerability, patch upgrades, assess security vulnerabilities and recommendations for repair, provide effective security configuration for the system upgrade reference. Things in control: firewalls resolved through the database and database encryption. Database Firewall - to protect the data from the source access, monitor database access and prevent unauthorized access, SQL Injection, illegal elevated privileges or roles as well as unauthorized access to sensitive data. Highly accurate analysis based on SQL syntax, avoid misjudgment; based on a flexible SQL-level policy setting black and white list; and support Bypass Proxy and hybrid deployment models to support high availability, maximum adapt to business needs; virtual patching to avoid because the database upgrade patch can not be caused by malicious access.

Stored in a database encryption to prevent sensitive information is parsed as plain text, the introduction of the right to security administrators to control system and database independent audit administrators implement security management means separation of powers to prevent the DBA, a third-party application developers and outsourced personnel unauthorized access to sensitive information, combined with dynamic password card and SQL-level API and application system to bind to solve the problem of illegal bypass the application to access the database. Post hoc analysis: solved through the database auditing techniques. By providing a network audit bypass port mirroring in the shunt or listening on the core routing device, so that all security audit can be monitored by the user operates the communication devices and the routing database, and the database operations and reduction protocol analysis, database operations detailed audit and audit user and has a wealth of query and reporting capabilities, easy maintenance, with professional auditing function, save manpower, reduce maintenance costs.

The program plans to use special database vulnerability scanning system, the current system is important to conduct a comprehensive database security vulnerability detection, effective exposure to the current security issues of database systems, along with recommendations of bug fixes, the overall security reinforcement. So as to enhance the overall security of the database system.

Separation of powers, responsibilities clear, breaking the traditional database operation and maintenance, independent control system privilege exercised by the DBA. DBA (database administrator): still own departments responsible for maintaining the database. DSA (security administrator): responsibility of the Information Center. Sensitive data access policy configuration, comprising a database containing the user including the DBA, IP, MAC and the like. DAA (audit administrator): responsibility of the Information Center. DBA is responsible for all database users, including the access behavior, configure the behavior of DSA audit.

After the separation of powers, DBA is still responsible for the operation and maintenance of conventional data, but for the most sensitive data, whether by security administrators to control access, while restricting DBA, the DBA who is also active exemption, reducing its suspected risk.

Prevention through virtual patch database are *** or *** using virtual patching technology to create a security layer around the database to prevent known vulnerabilities *** through the database, the database vulnerabilities can feature library malicious *** to date, the case did not patch the database, forming a virtual protective layer prior to the database.

Enabling access to sensitive data in strict control, fine control of the behavior of an application database access through SQL whitelist technology, all were alert and block access by non-application behavior of the application server to achieve strict protection for the application side.

Database Firewall series with the operation and maintenance side, effectively prevent business-related and other highly privileged DBA user access to sensitive data, IP | MAC and other elements of policy configuration, ensure the identity of the application of safe and reliable.

Solve the leakage problem by storing the plaintext database encryption, database files are stored in plain text, you need to encrypt sensitive field storage for desensitization of sensitive data, ensure that the database files even if lost, will not cause the entire library leaks. Backup files have strict management, encryption of sensitive columns are also stored. Log database server local maintenance and emergency database operations, this time expressly risk of data leakage, security administrators need to be present at the same time, high security classification data to be encrypted storage, managed by way of separation of powers.

By associating precise application audit effectively given the responsibility to specific staff, accurate audit, effective will be responsible for, need to have some key elements: the need for the most accurate, detailed audit trail in order to provide effective evidence is accountable: such as browser IP source, staff identity, access time, the operation content, the tools, access to the contents of the result set.

Audit Capabilities database firewall system, not only can efficiently and accurately implement the general database access auditing, and by AppSniffer deployed on an application server, you can SQL operations effectively associate with staff access to business systems through a browser, a real positioning the operator, will be responsible for achieving effective accountability.

Vulnerability internal database scanning system, unsafe configuration, to prevent unauthorized access: via the read-only account, from the inner to the outer enable detection; providing a perspective view of the vulnerability of existing data and safety evaluation database configuration; prevent unauthorized access to internal and external. ****** external vulnerabilities found, to prevent external ***: Achieving unauthorized detected from outside to inside; *** use of simulation technology vulnerability discovery, in the absence of authorization, the target database security in-depth analysis for detection; vulnerability details database collection outsiders can take advantage of. Monitoring database security, database security to prevent deterioration: establishing a secure baseline for the database, the database periodically scanning, reporting and analysis of the changing security situation occurred.

Guess you like

Origin blog.51cto.com/14323396/2412138