SlideShare a Scribd company logo
Biznet Gio Presentation - Database Security
Yusuf Hadiwinata Sutandar
Linux Geek, Opensource Enthusiast, Security Hobbies
RHCT, RHCSAv5-v7,RHCEv5-v7,RHCVA, RHCI, RHCX, RHCSA-RHOS,RHCJA,CEI, CEH,
CHFI, CND, EDRP, CCNA, MCTCNA, Security+, Network+, VCA, vExpert 2017-2018
Senior Operation Manager Technology
Key-Service For Your Business
Key-Service For Your Business
What Is Database Security?
Database security, under the
umbrella of information security,
protects the confidentiality,
integrity and availability of an
organization’s databases.
Key-Service For Your Business
Importance of Database Security and Integrity
Database security is more than just important:
it is essential to any company with any online
component. Sufficient database security
prevents data bring lost or compromised,
which may have serious ramifications for the
company both in terms of finances and
reputation
Key-Service For Your Business
Biggest Data Breaches of 2018
Aadhaar (Kemendagri India)
1.1 billion records breached
Date disclosed: January 3, 2018
Facebook (sosmed)
At least 87 million records breached
Date disclosed: March 17, 2018
The Oregon Clinic (healtcare)
Records affected: 64,487
The most affected industries in 2017 (by number of breaches)
https://www.medcareernews.com/top-industries-affected-data-leaks-2017/
Key-Service For Your Business
Data Breaches of 2018 Map
http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
Key-Service For Your Business
Most Common Attack Vector
https://www.sophos.com/en-us/medialibrary/pdfs/other/apt-infographic.pdf?cmp=70130000001xIObAAM
Key-Service For Your Business
Enterprise Security Framework
Source: Oracle Security In Depth Reference Architecture
Key-Service For Your Business
Database Security Conceptual View
Source: Oracle Security In Depth Reference Architecture
Key-Service For Your Business
Data Security Logical Architecture View
Source: Oracle Security In Depth Reference Architecture
Key-Service For Your Business
The Methodology for Proven Database Security
Leverage Biznet
Manage Services
Provider
to secure cloud database
investment
Key-Service For Your Business
Inventory
• Discover, classify and prioritize the
databases containing your valuable
information whether cloud based or
on-premise
• Discover, Track and Manage Your SQL
Server Inventory
• Manage known databases on your
network and in the cloud; discover
unknown databases outside the
scope of current compliance controls
Key-Service For Your Business
Inventory
Key-Service For Your Business
Testing
• Define and manage security standards and
compliance policies to be used to assess
database security posture
• Schedule or run ad-hoc job-based
assessments to quantify cloud based or
on-premise database adherence to
selected policies
Key-Service For Your Business
Compliance and Certifications
Key-Service For Your Business
Compliance Enablement Logical Architecture
Source: Oracle Security In Depth Reference Architecture
Key-Service For Your Business
Eliminate Vulnerabilities
• Fix potentially harmful password configurations,
table access grants, user roles and other
vulnerable areas identified in assessment of
database assets.
• Conduct regular and continuous assessments to
identify issues and ensure that they are
remediated in a timely manner.
Key-Service For Your Business
Enforce Least Privileges
• Ensure employees and applications
have only the rights needed to do
their jobs
• Understand who has access to what
data and how they’ve been granted
that access
Key Point:
Analyze membership to powerful server roles and groups such as administrators, systems administrators, and
security administrators to ensure the level of access is warranted. From a group, see the list of group members
and select a member for further analysis. From a user, see the group memberships and drill upwards to view
inherited permissions.
Key-Service For Your Business
Monitor for Anomalies
• Inspect database access and activities
for policy violations and attempted
attacks
• Audit actions of known privileged
users as well as administrative activity
Key-Service For Your Business
Fraud Detection Logical Architecture View
Source: Oracle Security In Depth Reference Architecture
Key-Service For Your Business
Protecting
• Deploy policy-based Activity Monitoring to create an easily managed set of
actionable security and compliance alerts.
• Transparent Data Encryption (TDE) to protect sensitive data
• Database Firewall acts as the first line of defense for databases, helping prevent
internal and external attacks from reaching the database
Key-Service For Your Business
DR / Backup Plan - Multiple Data Center
Cloud Provider providing Multi Region Provide higher Avaibility to Database
Key-Service For Your Business
No Bandwidth Hassle
Key-Service For Your Business
Respond to Incident
Audit and Respond to suspicious activity and policy violations in real time
• Send an alert to IT Security to prompt further investigation.
• Notify the SIEM system to correlate database activity with web application logs.
• Initiate a malware scan to remove any injected code.
• Lockout the user’s account to prevent further attempts to access sensitive data.
Key-Service For Your Business
Peace of Mind
Key-Service For Your Business
Question and Answer
Key-Service For Your Business
Key-Service
For Your Business
www.biznetgiocloud.com
PT. Biznet Gio Nusantara MidPlaza 1, 7th Floor Jl. Jend Sudirman Kav. 10-11 Jakarta 10220 – Indonesia

More Related Content

PDF
Biznet Gio Presentation - Cloud Computing
PDF
Protecting National Critical Infrastructure Asiangames 2018
PPTX
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
PDF
Workshop on CASB Part 2
PDF
ECS: Delivering Better Cyber Intelligence and Compliance
PPSX
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
PPTX
Security and governance in the cloud
PPTX
Security As A Service In Cloud(SECaaS)
Biznet Gio Presentation - Cloud Computing
Protecting National Critical Infrastructure Asiangames 2018
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
Workshop on CASB Part 2
ECS: Delivering Better Cyber Intelligence and Compliance
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Security and governance in the cloud
Security As A Service In Cloud(SECaaS)

What's hot (19)

PPTX
The Software-Defined Perimeter: Securing Network Access for the Modern Workforce
PPTX
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
PDF
63 Requirements for CASB
PDF
Take It to the Cloud: The Evolution of Security Architecture
PDF
CSA Introduction 2013 David Ross
PPTX
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
PDF
Thin Air or Solid Ground? Practical Cloud Security
PDF
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
PDF
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
PPTX
Rethinking Cybersecurity for the Digital Transformation Era
PDF
CSA Standards Development Summary
PPTX
The evolution of IT in a cloud world
PPTX
Secure your M365 resources using Azure AD Identity Governance
PPTX
Secure your cloud applications by building solid foundations with enterprise ...
PDF
Implementing zero trust architecture in azure hybrid cloud
PDF
Using Data Science for Cybersecurity
PPTX
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
PDF
CASB — Your new best friend for safe cloud adoption?
PPTX
NIST Cybersecurity Framework (CSF) on the Public Cloud
The Software-Defined Perimeter: Securing Network Access for the Modern Workforce
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
63 Requirements for CASB
Take It to the Cloud: The Evolution of Security Architecture
CSA Introduction 2013 David Ross
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Thin Air or Solid Ground? Practical Cloud Security
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
Rethinking Cybersecurity for the Digital Transformation Era
CSA Standards Development Summary
The evolution of IT in a cloud world
Secure your M365 resources using Azure AD Identity Governance
Secure your cloud applications by building solid foundations with enterprise ...
Implementing zero trust architecture in azure hybrid cloud
Using Data Science for Cybersecurity
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
CASB — Your new best friend for safe cloud adoption?
NIST Cybersecurity Framework (CSF) on the Public Cloud
Ad

Similar to Biznet Gio Presentation - Database Security (20)

PPTX
Make your Azure PaaS Deployment More Safe
PPTX
PPTX
Modern Data Security for the Enterprises – SQL Server & Azure SQL Database
PDF
ALTR Company Overview 2023
PPTX
Breakdown of Microsoft Purview Solutions
PPTX
Aligning Application Security to Compliance
PDF
2022 Trends in Enterprise Analytics
PPTX
I am sharing 'Unit-2' with youuuuuu.PPTX
PPTX
ISS CAPSTONE TEAM
PPTX
3. Cloud-Infrastructure-and-Entitlements-Management.pptx
PPTX
Security Architecture Best Practices for SaaS Applications
PPTX
SMAC - Social, Mobile, Analytics and Cloud - An overview
PPTX
B2 - The History of Content Security: Part 2 - Adam Levithan
PDF
SECURING THE CLOUD DATA LAKES
PPTX
13 April 2015 DC-Salesservice power.pptx
PPTX
Emerging IT Trends and Innovation Concepts.pptx
PDF
MSFT Cloud Architecture Information Protection
PDF
ppt-security-dbsat-222-overview-nodemo.pdf
PDF
Data Services Marketplace
PPTX
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
Make your Azure PaaS Deployment More Safe
Modern Data Security for the Enterprises – SQL Server & Azure SQL Database
ALTR Company Overview 2023
Breakdown of Microsoft Purview Solutions
Aligning Application Security to Compliance
2022 Trends in Enterprise Analytics
I am sharing 'Unit-2' with youuuuuu.PPTX
ISS CAPSTONE TEAM
3. Cloud-Infrastructure-and-Entitlements-Management.pptx
Security Architecture Best Practices for SaaS Applications
SMAC - Social, Mobile, Analytics and Cloud - An overview
B2 - The History of Content Security: Part 2 - Adam Levithan
SECURING THE CLOUD DATA LAKES
13 April 2015 DC-Salesservice power.pptx
Emerging IT Trends and Innovation Concepts.pptx
MSFT Cloud Architecture Information Protection
ppt-security-dbsat-222-overview-nodemo.pdf
Data Services Marketplace
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
Ad

More from Yusuf Hadiwinata Sutandar (20)

PDF
Varnish Enterprise Feature​ Migration From Varnish Cache​
PDF
Presentasi_Yusuf_Hadiwinata_Sutandar_PANDI_Berdaulat_Digital.pdf
PDF
LOUCA23 Yusuf Hadiwinata Linux Security BestPractice
PDF
How DevOps works in the Enterprise
PDF
Acronis Meet and Learn
PDF
BiznetGio Presentation Business Continuity
PDF
March of the Penguin - 31 years Linux Snapshot
PDF
Choose the Right Container Storage for Kubernetes
PDF
Biznet GIO National Seminar on Digital Forensics
PDF
PHPIDOL#80: Kubernetes 101 for PHP Developer. Yusuf Hadiwinata - VP Operation...
PDF
Kubernetes Jakarta Meetup 010 - Service Mesh Observability with Kiali
PDF
Devops Indonesia Presentation Monitoring Framework
PDF
Bssn book security awarness
PDF
Job vacancies cti group
PDF
Devops Indonesia - DevSecOps - The Open Source Way
PDF
Devops indonesia - The Future Container
PDF
Journey to the devops automation with docker kubernetes and openshift
PDF
War of Openstack Private Cloud Distribution
PDF
create auto scale jboss cluster with openshift
PDF
Docker handons-workshop-for-charity
Varnish Enterprise Feature​ Migration From Varnish Cache​
Presentasi_Yusuf_Hadiwinata_Sutandar_PANDI_Berdaulat_Digital.pdf
LOUCA23 Yusuf Hadiwinata Linux Security BestPractice
How DevOps works in the Enterprise
Acronis Meet and Learn
BiznetGio Presentation Business Continuity
March of the Penguin - 31 years Linux Snapshot
Choose the Right Container Storage for Kubernetes
Biznet GIO National Seminar on Digital Forensics
PHPIDOL#80: Kubernetes 101 for PHP Developer. Yusuf Hadiwinata - VP Operation...
Kubernetes Jakarta Meetup 010 - Service Mesh Observability with Kiali
Devops Indonesia Presentation Monitoring Framework
Bssn book security awarness
Job vacancies cti group
Devops Indonesia - DevSecOps - The Open Source Way
Devops indonesia - The Future Container
Journey to the devops automation with docker kubernetes and openshift
War of Openstack Private Cloud Distribution
create auto scale jboss cluster with openshift
Docker handons-workshop-for-charity

Recently uploaded (20)

PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
KodekX | Application Modernization Development
PDF
Encapsulation theory and applications.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Cloud computing and distributed systems.
PDF
Approach and Philosophy of On baking technology
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Modernizing your data center with Dell and AMD
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
A Presentation on Artificial Intelligence
PPTX
Big Data Technologies - Introduction.pptx
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Diabetes mellitus diagnosis method based random forest with bat algorithm
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Per capita expenditure prediction using model stacking based on satellite ima...
Advanced methodologies resolving dimensionality complications for autism neur...
Unlocking AI with Model Context Protocol (MCP)
Dropbox Q2 2025 Financial Results & Investor Presentation
KodekX | Application Modernization Development
Encapsulation theory and applications.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Cloud computing and distributed systems.
Approach and Philosophy of On baking technology
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Modernizing your data center with Dell and AMD
Reach Out and Touch Someone: Haptics and Empathic Computing
A Presentation on Artificial Intelligence
Big Data Technologies - Introduction.pptx

Biznet Gio Presentation - Database Security

  • 2. Yusuf Hadiwinata Sutandar Linux Geek, Opensource Enthusiast, Security Hobbies RHCT, RHCSAv5-v7,RHCEv5-v7,RHCVA, RHCI, RHCX, RHCSA-RHOS,RHCJA,CEI, CEH, CHFI, CND, EDRP, CCNA, MCTCNA, Security+, Network+, VCA, vExpert 2017-2018 Senior Operation Manager Technology
  • 4. Key-Service For Your Business What Is Database Security? Database security, under the umbrella of information security, protects the confidentiality, integrity and availability of an organization’s databases.
  • 5. Key-Service For Your Business Importance of Database Security and Integrity Database security is more than just important: it is essential to any company with any online component. Sufficient database security prevents data bring lost or compromised, which may have serious ramifications for the company both in terms of finances and reputation
  • 6. Key-Service For Your Business Biggest Data Breaches of 2018 Aadhaar (Kemendagri India) 1.1 billion records breached Date disclosed: January 3, 2018 Facebook (sosmed) At least 87 million records breached Date disclosed: March 17, 2018 The Oregon Clinic (healtcare) Records affected: 64,487 The most affected industries in 2017 (by number of breaches) https://www.medcareernews.com/top-industries-affected-data-leaks-2017/
  • 7. Key-Service For Your Business Data Breaches of 2018 Map http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
  • 8. Key-Service For Your Business Most Common Attack Vector https://www.sophos.com/en-us/medialibrary/pdfs/other/apt-infographic.pdf?cmp=70130000001xIObAAM
  • 9. Key-Service For Your Business Enterprise Security Framework Source: Oracle Security In Depth Reference Architecture
  • 10. Key-Service For Your Business Database Security Conceptual View Source: Oracle Security In Depth Reference Architecture
  • 11. Key-Service For Your Business Data Security Logical Architecture View Source: Oracle Security In Depth Reference Architecture
  • 12. Key-Service For Your Business The Methodology for Proven Database Security Leverage Biznet Manage Services Provider to secure cloud database investment
  • 13. Key-Service For Your Business Inventory • Discover, classify and prioritize the databases containing your valuable information whether cloud based or on-premise • Discover, Track and Manage Your SQL Server Inventory • Manage known databases on your network and in the cloud; discover unknown databases outside the scope of current compliance controls
  • 14. Key-Service For Your Business Inventory
  • 15. Key-Service For Your Business Testing • Define and manage security standards and compliance policies to be used to assess database security posture • Schedule or run ad-hoc job-based assessments to quantify cloud based or on-premise database adherence to selected policies
  • 16. Key-Service For Your Business Compliance and Certifications
  • 17. Key-Service For Your Business Compliance Enablement Logical Architecture Source: Oracle Security In Depth Reference Architecture
  • 18. Key-Service For Your Business Eliminate Vulnerabilities • Fix potentially harmful password configurations, table access grants, user roles and other vulnerable areas identified in assessment of database assets. • Conduct regular and continuous assessments to identify issues and ensure that they are remediated in a timely manner.
  • 19. Key-Service For Your Business Enforce Least Privileges • Ensure employees and applications have only the rights needed to do their jobs • Understand who has access to what data and how they’ve been granted that access Key Point: Analyze membership to powerful server roles and groups such as administrators, systems administrators, and security administrators to ensure the level of access is warranted. From a group, see the list of group members and select a member for further analysis. From a user, see the group memberships and drill upwards to view inherited permissions.
  • 20. Key-Service For Your Business Monitor for Anomalies • Inspect database access and activities for policy violations and attempted attacks • Audit actions of known privileged users as well as administrative activity
  • 21. Key-Service For Your Business Fraud Detection Logical Architecture View Source: Oracle Security In Depth Reference Architecture
  • 22. Key-Service For Your Business Protecting • Deploy policy-based Activity Monitoring to create an easily managed set of actionable security and compliance alerts. • Transparent Data Encryption (TDE) to protect sensitive data • Database Firewall acts as the first line of defense for databases, helping prevent internal and external attacks from reaching the database
  • 23. Key-Service For Your Business DR / Backup Plan - Multiple Data Center Cloud Provider providing Multi Region Provide higher Avaibility to Database
  • 24. Key-Service For Your Business No Bandwidth Hassle
  • 25. Key-Service For Your Business Respond to Incident Audit and Respond to suspicious activity and policy violations in real time • Send an alert to IT Security to prompt further investigation. • Notify the SIEM system to correlate database activity with web application logs. • Initiate a malware scan to remove any injected code. • Lockout the user’s account to prevent further attempts to access sensitive data.
  • 26. Key-Service For Your Business Peace of Mind
  • 27. Key-Service For Your Business Question and Answer
  • 28. Key-Service For Your Business Key-Service For Your Business www.biznetgiocloud.com PT. Biznet Gio Nusantara MidPlaza 1, 7th Floor Jl. Jend Sudirman Kav. 10-11 Jakarta 10220 – Indonesia