Restricting Access To Databases - Restricting Access

Restricting Access

Steps to restrict database access within an organization:

  1. Implement Separation of duties (SOD) a preventive control.
  2. Establish test and production environments which is preventive control.
  3. Restrict user account and Database administrator access which is a preventive control.
  4. Turn on audit trails, monitoring software, or exception reports which are detective controls.

Elements to restrict include:

  1. Data access (Successful/Failed Selects)
  2. Data Changes (Insert, Update, Delete)
  3. System Access (Successful/Failed Logins; User/Role/Permissions/Password changes)
  4. Privileged User Activity (All)
  5. Schema Changes (Create/Drop/Alter Tables, Columns, Fields)

Read more about this topic:  Restricting Access To Databases

Famous quotes containing the words restricting and/or access:

    We enunciate a grand principle, then we are timid and begin restricting its application. We are a nation of infidels to principle.
    Mary F. Eastman, U.S. suffragist. As quoted in History of Woman Suffrage, vol. 4, ch. 7, by Susan B. Anthony and Ida Husted Harper (1902)

    Oh, the holiness of always being the injured party. The historically oppressed can find not only sanctity but safety in the state of victimization. When access to a better life has been denied often enough, and successfully enough, one can use the rejection as an excuse to cease all efforts. After all, one reckons, “they” don’t want me, “they” accept their own mediocrity and refuse my best, “they” don’t deserve me.
    Maya Angelou (b. 1928)