SlideShare a Scribd company logo
© 2019 IDERA, Inc. All rights reserved.
© 2019 IDERA, Inc. All rights reserved. 2
UNDERSTANDING SQL SERVER
COMPLIANCE BOTH IN THE CLOUD AND
ON PREMISES
▪ Kim Brushaber, Senior Product Manager, SQL Compliance Manager
© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 3
CLOUD COMPLIANCE
© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 4
CLOUD/HYBRID COMPLIANCE VS ON PREM
▪ Processes happen faster
▪ Access points are more numerous
▪ Usage can scale up and down quickly as needed
▪ Servers are constantly changing and can be spun up or taken down
regularly
▪ Audit and Event Logs may or may not be available for you to review
▪ Physical Systems are managed by a CSP and not your IT
▪ Large CSPs are already managing security for all of their other clients
© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 5
CLOUD COMPLIANCE RESPONSIBILITIES
▪ Many service providers say they are compliant with various regulations
▪ Discuss the definition of compliance with your Cloud Service Provider
(CSP) to ensure their definition fits with your compliance processes
▪ Some traditional on-premise compliance responsibilities may be deferred
to a CSP in the cloud, but many of the responsibilities are still yours
▪ The CSP maintains the physical equipment and location of it, they are
responsible for keeping those systems in compliance
▪ Ultimately, the responsibility falls on you and the way you choose to
configure your data
© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 6
CLOUD COMPLIANCE AND HIPAA
▪ The HITECH Act (associated with HIPAA) states that you must notify OCR
after a breach of more than 500 individuals
▪ OCR’s breach database shows that many of the breaches are from:
• Stolen or lost laptops
• Mobile Devices
• Portable Media (IE Thumb Drives)
▪ A properly secured cloud environment could solve some of the challenges
with the exposure of these endpoints
▪ Many of the OCR’s cloud settlements deal with the lack of properly
executed BAAs (Business Associate Agreements) before uploading PHI
to the cloud
© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 7
HIPAA COMPLIANCE AND BAAS
▪ Sign a Business Associate Agreement (BAA)
• The BAA needs to show that they appropriately safeguard PHI
▪ Conduct a HIPAA Security Risk Analysis with your BAA
▪ Implement HIPAA Security Safeguards
▪ Comply with the HIPAA Privacy Rule
▪ Comply with the HIPAA Breach Notification Rule
© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 8
CRITERIA FOR EVALUATING CSP GDPR COMPLIANCE
▪ Security and Privacy – Do they comply with your IT Security Requirements?
• ISO 27001 or ISO 27018 certifications
▪ Risk Management – Do they conduct regular audits?
• Compliance with Article 28
▪ Data Location – Do you know where your data is stored?
• A company’s headquarters may not be where your data is hosted and it may move
around
▪ Security Features – Do they have the right security features?
• Verify if they have backup, encryption, access control policies, etc
▪ Data Ownership – Do they have Data Processing Agreements (DPAs)?
• Make sure you own your data and they can not share it with 3rd parties
▪ Deleting Data – Can you delete/erase the data?
• Confirm that they will also remove the data once you have terminated the service
▪ Breach Response – Do they have a breach response process in place?
© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 9
SOX AND SOC 1 AND SOC2
▪ When it comes to SOX Compliance you want a vendor who can provide
reports known as Service Organization Controls (SOC 1 and SOC 2)
▪ SOC 1
• It includes auditor’s opinion on the effectiveness of the datacenter’s
design of controls and system and the accuracy and completeness of
those controls
▪ SOC 2
• It includes the auditor’s opinion on the security and availability of the
CSP’s systems as they relate to a set of predefined benchmarks
• It also includes opinions and results on the integrity of the systems and
privacy standards
© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 10
UNDERSTANDING THE REGULATIONS
© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 11
WHY WE HAVE REGULATIONS
▪ Improved Security
• Establishing a baseline keeps security levels relatively consistent across companies and
industries
▪ Minimize Loss
• Good practices in place prevents data breaches
▪ Increase Internal Control
• Reduce employee mistakes and insider theft
▪ Maintain Trust
• Customers trust people who follow set standards
▪ Reporting Consistency
• Consistent reports allow audits to go more smoothly
© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 12
SOME OF THE DATA/SECURITY REGULATIONS
▪ CIS (Center for Internet Security) – Global Internet Security Standards
▪ DISA/STIG (Defense Information Systems Agency) – Anyone with Government Contracts
▪ FISMA/NIST (Federal Information Security Management Act) – All Federal Agencies
▪ FERPA (Family Education Rights and Privacy Act) – Educational Institutions
▪ GDPR (General Data Protection Regulation) – Anyone collecting data on EU Members
▪ HIPAA (Health Insurance Portability and Accountability Act) – Healthcare Institutions
▪ NERC-CIP (North American Electricity Reliability Corporation) – Electricity Providers
▪ PCI DSS (Payment Card Industry Data Security Standard) – Anyone capturing credit card data
▪ SOX (Sarbanes Oxley) – Publicly Traded Companies and management and accounting firms
© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 13
PERSONALLY IDENTIFIABLE INFORMATION (PII) COVERED
BY GDPR
Any information that can be classified as personal details – or that can be used to
determine your identity
▪ Name
▪ Identification number
▪ Email address
▪ Online user identifier
▪ Social media posts
▪ Physical, physiological or genetic information
▪ Medical information
▪ Location
▪ Bank details
▪ IP address
▪ Cookies
© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 14
THE DATA ASPECTS OF REGULATIONS
© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 15
DATA STANDARDS VS SECURITY STANDARDS
▪ Data Standards “WHAT”
• What information needs to be protected/audited
• What you should do if your data is breached
▪ Security Standards “HOW”
• How you should configure your network
• How you should configure your systems (i.e. SQL Server, Oracle)
© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 16
WHAT THE REGULATIONS LOOK FOR
▪ Reporting (And Maintaining) Audit Data
▪ Tracking User Access
▪ Protecting The Data From The Bad Guys (And Watch for Data Breaches)
▪ Planning And Having Good Processes And Response Plans
▪ Assessing Your Risks
© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 17
CIS
▪ Tracking
• Capture Logins and Failed Logins
© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 18
DISA STIG
▪ Reporting
• Generate audit records for DoD-defined auditable events
• Generate audit records when privileges and permissions retrieved
• Initiate session auditing upon startup
• Audit records for events identified by type, location and subject
• Capture the audit information in a centralized place
▪ Tracking
• Capture, record and log all content related to a user session
• Protect audit information from unauthorized read access, modification or deletion
▪ Planning
• Alert support staff in real time for any failure events
© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 19
FISMA/NIST
▪ Tracking
• Audit access
▪ Protecting
• Monitor, report and respond to incidents
▪ Planning
• Create an audit process and certification
• Plan for contingency
• Manage your configurations
▪ Assessing
• Assess your risks
• Confirm system and information integrity
© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 20
FERPA
▪ Tracking
• Document who has access to student information
• Confirm that the instructors or officials only access records for legitimate purposes
• Authorized representatives may have access to education records in connection with
an audit
▪ Planning
• Student transfers must be handled appropriately
© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 21
GDPR
▪ Reporting
• Provide audit details about how that data is processed and who interacted with it
▪ Tracking
• Know who has access to PII data
▪ Protecting
• Notify the supervising authority of a breach within 72 hours
▪ Planning
• Identify PII Data
• Process data lawfully, fairly and in a way that users understand
• Limit the collection of data to only what is necessary
▪ Assessing
• Conduct impact assessments for higher risk areas
© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 22
HIPAA
▪ Tracking
• Monitor log-in attempts
▪ Protecting
• Protect, detect, contain and correct security violations
• Detect breaches and notify impacted individuals
▪ Planning
• Implement security measures to reduce risks and vulnerabilities
• Implement procedures to regularly review audit logs, access reports and security
incidents
• Implement procedures to terminate access
© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 23
NERC - CIP
▪ Reporting
• Log events for identification of and after-the-fact investigations of Cyber Security
Incidents
▪ Tracking
• Log failed and successful logins
© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 24
PCI DSS
▪ Reporting
• Implement automated audit trails for all database events
• Retain audit trail history for at least a year
▪ Tracking
• Assign a unique identifier for each person who has access
• Actions taken on critical data must be traced to known authorized users
• Track and monitor all access to the network
• Immediately revoke access for terminated users
▪ Protecting
• Change vendor supplied defaults and disable unnecessary default accounts
• Encrypt the data
• Secure audit trails so they can not be altered
▪ Planning
• Develop configuration standards
© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 25
SOX
▪ Reporting
• Report on effectiveness of company’s internal controls and procedures
• Report on who changed permissions
• Report on who changed the financial data
▪ Tracking
• Report on who accessed the financial data
© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 26
LET’S TALK A LITTLE ABOUT DATA BREACH
“
© 2019 IDERA, Inc. All rights reserved. 2
Almost 15 Billion Records have been lost or
stolen since 2013. Only 4% were secure
breaches where encryption was used and
the stolen data was useless.
Breachlevelindex.com
“
© 2019 IDERA, Inc. All rights reserved. 2
Over 6.3 million data records are lost or
stolen every day.
Breachlevelindex.com
© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 29
WHAT ARE THE ODDS?
▪ 1 in 960,000 – odds of being struck by lightning
▪ 1 in 220 – odds of dating a millionaire
▪ 1 in 4 – odds of experiencing a data breach
https://securityintelligence.com/know-the-odds-the-cost-of-a-data-breach-in-2017/
© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 30
2018 COST PER DATA BREACH
▪ The average cost for each lost or stolen record containing sensitive and
confidential information was $148 (a 4.8% increase from the year before)
▪ The average size of a data breach was 26,000 records
▪ $148 x 26,000 ~ $3.86 M (increased 6.4% over 2018)
https://www.ibm.com/security/data-breach
“
© 2019 IDERA, Inc. All rights reserved. 3
Hospitals spend 64% more annually on
advertising for the two years following a
breach
https://healthitsecurity.com/news/hospitals-spend-64-more-on-advertising-after-a-data-breach
“
© 2019 IDERA, Inc. All rights reserved. 3
Companies that contained a breach in less
than 30 days saved more than $1 million
compared to those that took more than 30
days
(the average time to contain a breach is 69
days)
https://www.ibm.com/downloads/cas/861MNWN2
“
© 2019 IDERA, Inc. All rights reserved. 3
A mega breach of 1 million records has an
average total cost of $40 million
https://www.ibm.com/downloads/cas/861MNWN2
“
© 2019 IDERA, Inc. All rights reserved. 3
A mega breach of 50 million records has an
average total cost of $350 million
https://www.ibm.com/downloads/cas/861MNWN2
© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 35
SHOCKING, RIGHT??
© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 36
WE’RE HERE TO HELP
© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 37
HOW CAN YOU MEET THE REQUIREMENTS
▪ Reporting (And Maintaining) Audit Data
▪ Tracking User Access
▪ Protecting The Data From The Bad Guys (And Watch for Data Breaches)
▪ Planning And Having Good Processes And Response Plans
▪ Assessing Your Risks
© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 38
SQL SERVER FEATURES FOR COMPLIANCE
▪ Reporting
• SQL Server Audit
• Temporal Tables
▪ Tracking
• Object Level Permissions
• Role-Based Security
▪ Protection
• Authentication Protocols
• Firewalls
• Dynamic Data Masking
• Transport Level Security (TLS)
• Encryption Protocols (TDE, Always Encrypted, Always On)
© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 39
ORACLE FEATURES FOR COMPLIANCE
▪ Reporting
• Auditing
▪ Tracking
• Access Control
• Separation of Duties
▪ Protection
• Encryption
• Security Monitoring and Alerting
• Data Masking and Data Redaction
▪ Assessing
• Risk Assessments
© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 40
WHAT CAN TOOLS LIKE SQL COMPLIANCE MANAGER DO?
▪ Reporting
• Capture Activity On Database (DDL And DML)
• Track The Behavior Of Privileged Users
• Track Who Is Accessing Your Sensitive Data
• Track Who Has Changed Your Data And What Has It Changed To
• Track Security And Administrative Changes
• Track User-Defined Events
• Audit Systems Tables, Stored Procedures, Views, Indexes, Etc.
▪ Tracking
• Capture Logins, Logouts, Failed Logins
▪ Protecting
• Determine How Much Data Was Accessed In A Breach
© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 41
SQL COMPLIANCE MANAGER - REGULATION GUIDELINE
WIZARD
© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 42
SQL COMPLIANCE MANAGER - CONFIGURATION
© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 43
SQL COMPLIANCE MANAGER – PRIVILEGED USER SETUP
© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 44
SQL COMPLIANCE MANAGER – SENSITIVE COLUMNS
© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 45
SQL COMPLIANCE MANAGER – BEFORE AFTER DATA
(BAD) TRACKING
© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 46
SQL COMPLIANCE MANAGER – USER ACTIVITY HISTORY
REPORT
© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 47
SQL COMPLIANCE MANAGER – USER LOGIN HISTORY
© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 48
SQL COMPLIANCE MANAGER – REGULATORY
COMPLIANCE CHECK REPORT
© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 49
IDERA PRODUCTS CAN HELP YOU WITH:
▪ Reporting (And Maintaining) Audit Data
• SQL Compliance Manager
▪ Tracking User Access
• SQL Compliance Manager
▪ Protecting The Data From The Bad Guys (And Watch for Data Breaches)
• SQL Compliance Manager
• SQL Secure
▪ Planning And Having Good Processes And Response Plans
• SQL Compliance Manager
• SQL Secure
• ER/Studio Business Architect
▪ Assessing Your Risks
• SQL Compliance Manager
• SQL Secure
© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 50
IN CONCLUSION
▪ Cloud Compliance is slightly different than On-Prem Compliance
▪ There are a ton of regulations to comply with
▪ Data breach continues to be a growing problem
▪ Regulations require organizations to:
• Report audit data
• Track user access
• Protect data from the bad guys
• Have good processes and response plans
• Understand what your risks are
▪ The right tools can help to simplify and automate the auditing process
© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 5151
THANKS!
Any questions?
You can find me at:
@Brushaber_IDERA on Twitter

More Related Content

PPTX
The EU General Protection Regulation and how Oracle can help
PDF
Is it time for an IT Assessment?
PDF
Seattle Tech4Good meetup: Data Security and Privacy
PDF
GDPR Changing Mindset
PDF
7 Key GDPR Requirements & the Role of Data Governance
PDF
Cross border - off-shoring and outsourcing privacy sensitive data
PPTX
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
PDF
Cloud Regulations and Security Standards by Ran Adler
The EU General Protection Regulation and how Oracle can help
Is it time for an IT Assessment?
Seattle Tech4Good meetup: Data Security and Privacy
GDPR Changing Mindset
7 Key GDPR Requirements & the Role of Data Governance
Cross border - off-shoring and outsourcing privacy sensitive data
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
Cloud Regulations and Security Standards by Ran Adler

What's hot (14)

PPTX
Dealing with 3rd parties under gdpr
PDF
Isaca new delhi india privacy and big data
PPTX
General Data Protection Regulation (GDPR)
PDF
4 Security Guidelines for SharePoint Governance
PPTX
General Data Protection Regulation (GDPR)
PDF
The Definitive GDPR Guide for Event Professionals
PDF
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
PPTX
GDPR: Your Journey to Compliance
PPTX
Payroll Data & GDPR: What you need to know?
PPTX
Vuzion Love Cloud GDPR Event
PPTX
Training privacy by design
PPTX
Digital Velocity London 2017 - Data Privacy and Sovereignty, Sheila Fitz Patrick
PPT
Jms secure data presentation
PPTX
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
Dealing with 3rd parties under gdpr
Isaca new delhi india privacy and big data
General Data Protection Regulation (GDPR)
4 Security Guidelines for SharePoint Governance
General Data Protection Regulation (GDPR)
The Definitive GDPR Guide for Event Professionals
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR: Your Journey to Compliance
Payroll Data & GDPR: What you need to know?
Vuzion Love Cloud GDPR Event
Training privacy by design
Digital Velocity London 2017 - Data Privacy and Sovereignty, Sheila Fitz Patrick
Jms secure data presentation
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
Ad

Similar to IDERA Live | Understanding SQL Server Compliance both in the Cloud and On Premises (20)

PPTX
093049ov4.pptx
PDF
Strategic imperative the enterprise data model
PPTX
IDERA Live | Maintaining Data Governance During Rapidly Changing Conditions
PPTX
Mapping Business Processes to Compliance Procedures
PDF
Mapping Business Processes to Compliance Procedures
PDF
Battle the Dark Side of Data Governance
PDF
Navigating the Complex World of Compliance Guidelines
PDF
Data Architecture - The Foundation for Enterprise Architecture and Governance
PDF
More Databases. More Hackers. More Audits.
PPTX
The Changing Role of a DBA in an Autonomous World
PPTX
Improve IT Security and Compliance with Mainframe Data in Splunk
PPTX
Understanding New Technology and Security Risks as you respond to COVID-19
PPTX
Cloud Storage: How to Fight Off Data Security Threats & Stay Compliant
PDF
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
PPTX
How Cloudera SDX can aid GDPR compliance
PPTX
gkknwqeq3232,sqSecurity essentials domain 3
PPTX
Hadoop and Financial Services
PPTX
IDERA Live | Databases Don't Build and Populate Themselves
PDF
CDP_Engagement_Team_Training_BRADESCO.pdf
PDF
The New Normal: Dealing with the Reality of an Unsecure World
093049ov4.pptx
Strategic imperative the enterprise data model
IDERA Live | Maintaining Data Governance During Rapidly Changing Conditions
Mapping Business Processes to Compliance Procedures
Mapping Business Processes to Compliance Procedures
Battle the Dark Side of Data Governance
Navigating the Complex World of Compliance Guidelines
Data Architecture - The Foundation for Enterprise Architecture and Governance
More Databases. More Hackers. More Audits.
The Changing Role of a DBA in an Autonomous World
Improve IT Security and Compliance with Mainframe Data in Splunk
Understanding New Technology and Security Risks as you respond to COVID-19
Cloud Storage: How to Fight Off Data Security Threats & Stay Compliant
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
How Cloudera SDX can aid GDPR compliance
gkknwqeq3232,sqSecurity essentials domain 3
Hadoop and Financial Services
IDERA Live | Databases Don't Build and Populate Themselves
CDP_Engagement_Team_Training_BRADESCO.pdf
The New Normal: Dealing with the Reality of an Unsecure World
Ad

More from IDERA Software (20)

PPTX
The role of the database administrator (DBA) in 2020: Changes, challenges, an...
PPTX
Problems and solutions for migrating databases to the cloud
PPTX
Public cloud uses and limitations
PPTX
Optimize the performance, cost, and value of databases.pptx
PPTX
Monitor cloud database with SQL Diagnostic Manager for SQL Server
PPTX
Database administrators (dbas) face increasing pressure to monitor databases
PPTX
Six tips for cutting sql server licensing costs
PDF
Idera live 2021: The Power of Abstraction by Steve Hoberman
PDF
Idera live 2021: Why Data Lakes are Critical for AI, ML, and IoT By Brian Flug
PDF
Idera live 2021: Will Data Vault add Value to Your Data Warehouse? 3 Signs th...
PDF
Idera live 2021: Managing Digital Transformation on a Budget by Bert Scalzo
PDF
Idera live 2021: Keynote Presentation The Future of Data is The Data Cloud b...
PDF
Idera live 2021: Managing Databases in the Cloud - the First Step, a Succes...
PDF
Idera live 2021: Database Auditing - on-Premises and in the Cloud by Craig M...
PDF
Idera live 2021: Performance Tuning Azure SQL Database by Monica Rathbun
PPTX
Geek Sync | How to Be the DBA When You Don't Have a DBA - Eric Cobb | IDERA
PPTX
How Users of a Performance Monitoring Tool Can Benefit from an Inventory Mana...
PPTX
Benefits of Third Party Tools for MySQL | IDERA
PPTX
Achieve More with Less Resources | IDERA
PPTX
Benefits of SQL Server 2017 and 2019 | IDERA
The role of the database administrator (DBA) in 2020: Changes, challenges, an...
Problems and solutions for migrating databases to the cloud
Public cloud uses and limitations
Optimize the performance, cost, and value of databases.pptx
Monitor cloud database with SQL Diagnostic Manager for SQL Server
Database administrators (dbas) face increasing pressure to monitor databases
Six tips for cutting sql server licensing costs
Idera live 2021: The Power of Abstraction by Steve Hoberman
Idera live 2021: Why Data Lakes are Critical for AI, ML, and IoT By Brian Flug
Idera live 2021: Will Data Vault add Value to Your Data Warehouse? 3 Signs th...
Idera live 2021: Managing Digital Transformation on a Budget by Bert Scalzo
Idera live 2021: Keynote Presentation The Future of Data is The Data Cloud b...
Idera live 2021: Managing Databases in the Cloud - the First Step, a Succes...
Idera live 2021: Database Auditing - on-Premises and in the Cloud by Craig M...
Idera live 2021: Performance Tuning Azure SQL Database by Monica Rathbun
Geek Sync | How to Be the DBA When You Don't Have a DBA - Eric Cobb | IDERA
How Users of a Performance Monitoring Tool Can Benefit from an Inventory Mana...
Benefits of Third Party Tools for MySQL | IDERA
Achieve More with Less Resources | IDERA
Benefits of SQL Server 2017 and 2019 | IDERA

Recently uploaded (20)

PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Encapsulation theory and applications.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Machine Learning_overview_presentation.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
A Presentation on Artificial Intelligence
PPTX
Big Data Technologies - Introduction.pptx
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Cloud computing and distributed systems.
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Encapsulation theory and applications.pdf
Network Security Unit 5.pdf for BCA BBA.
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Machine Learning_overview_presentation.pptx
20250228 LYD VKU AI Blended-Learning.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
MYSQL Presentation for SQL database connectivity
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Electronic commerce courselecture one. Pdf
Assigned Numbers - 2025 - Bluetooth® Document
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
A Presentation on Artificial Intelligence
Big Data Technologies - Introduction.pptx
A comparative analysis of optical character recognition models for extracting...
Mobile App Security Testing_ A Comprehensive Guide.pdf
Spectroscopy.pptx food analysis technology
Cloud computing and distributed systems.
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...

IDERA Live | Understanding SQL Server Compliance both in the Cloud and On Premises

  • 1. © 2019 IDERA, Inc. All rights reserved.
  • 2. © 2019 IDERA, Inc. All rights reserved. 2 UNDERSTANDING SQL SERVER COMPLIANCE BOTH IN THE CLOUD AND ON PREMISES ▪ Kim Brushaber, Senior Product Manager, SQL Compliance Manager
  • 3. © 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 3 CLOUD COMPLIANCE
  • 4. © 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 4 CLOUD/HYBRID COMPLIANCE VS ON PREM ▪ Processes happen faster ▪ Access points are more numerous ▪ Usage can scale up and down quickly as needed ▪ Servers are constantly changing and can be spun up or taken down regularly ▪ Audit and Event Logs may or may not be available for you to review ▪ Physical Systems are managed by a CSP and not your IT ▪ Large CSPs are already managing security for all of their other clients
  • 5. © 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 5 CLOUD COMPLIANCE RESPONSIBILITIES ▪ Many service providers say they are compliant with various regulations ▪ Discuss the definition of compliance with your Cloud Service Provider (CSP) to ensure their definition fits with your compliance processes ▪ Some traditional on-premise compliance responsibilities may be deferred to a CSP in the cloud, but many of the responsibilities are still yours ▪ The CSP maintains the physical equipment and location of it, they are responsible for keeping those systems in compliance ▪ Ultimately, the responsibility falls on you and the way you choose to configure your data
  • 6. © 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 6 CLOUD COMPLIANCE AND HIPAA ▪ The HITECH Act (associated with HIPAA) states that you must notify OCR after a breach of more than 500 individuals ▪ OCR’s breach database shows that many of the breaches are from: • Stolen or lost laptops • Mobile Devices • Portable Media (IE Thumb Drives) ▪ A properly secured cloud environment could solve some of the challenges with the exposure of these endpoints ▪ Many of the OCR’s cloud settlements deal with the lack of properly executed BAAs (Business Associate Agreements) before uploading PHI to the cloud
  • 7. © 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 7 HIPAA COMPLIANCE AND BAAS ▪ Sign a Business Associate Agreement (BAA) • The BAA needs to show that they appropriately safeguard PHI ▪ Conduct a HIPAA Security Risk Analysis with your BAA ▪ Implement HIPAA Security Safeguards ▪ Comply with the HIPAA Privacy Rule ▪ Comply with the HIPAA Breach Notification Rule
  • 8. © 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 8 CRITERIA FOR EVALUATING CSP GDPR COMPLIANCE ▪ Security and Privacy – Do they comply with your IT Security Requirements? • ISO 27001 or ISO 27018 certifications ▪ Risk Management – Do they conduct regular audits? • Compliance with Article 28 ▪ Data Location – Do you know where your data is stored? • A company’s headquarters may not be where your data is hosted and it may move around ▪ Security Features – Do they have the right security features? • Verify if they have backup, encryption, access control policies, etc ▪ Data Ownership – Do they have Data Processing Agreements (DPAs)? • Make sure you own your data and they can not share it with 3rd parties ▪ Deleting Data – Can you delete/erase the data? • Confirm that they will also remove the data once you have terminated the service ▪ Breach Response – Do they have a breach response process in place?
  • 9. © 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 9 SOX AND SOC 1 AND SOC2 ▪ When it comes to SOX Compliance you want a vendor who can provide reports known as Service Organization Controls (SOC 1 and SOC 2) ▪ SOC 1 • It includes auditor’s opinion on the effectiveness of the datacenter’s design of controls and system and the accuracy and completeness of those controls ▪ SOC 2 • It includes the auditor’s opinion on the security and availability of the CSP’s systems as they relate to a set of predefined benchmarks • It also includes opinions and results on the integrity of the systems and privacy standards
  • 10. © 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 10 UNDERSTANDING THE REGULATIONS
  • 11. © 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 11 WHY WE HAVE REGULATIONS ▪ Improved Security • Establishing a baseline keeps security levels relatively consistent across companies and industries ▪ Minimize Loss • Good practices in place prevents data breaches ▪ Increase Internal Control • Reduce employee mistakes and insider theft ▪ Maintain Trust • Customers trust people who follow set standards ▪ Reporting Consistency • Consistent reports allow audits to go more smoothly
  • 12. © 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 12 SOME OF THE DATA/SECURITY REGULATIONS ▪ CIS (Center for Internet Security) – Global Internet Security Standards ▪ DISA/STIG (Defense Information Systems Agency) – Anyone with Government Contracts ▪ FISMA/NIST (Federal Information Security Management Act) – All Federal Agencies ▪ FERPA (Family Education Rights and Privacy Act) – Educational Institutions ▪ GDPR (General Data Protection Regulation) – Anyone collecting data on EU Members ▪ HIPAA (Health Insurance Portability and Accountability Act) – Healthcare Institutions ▪ NERC-CIP (North American Electricity Reliability Corporation) – Electricity Providers ▪ PCI DSS (Payment Card Industry Data Security Standard) – Anyone capturing credit card data ▪ SOX (Sarbanes Oxley) – Publicly Traded Companies and management and accounting firms
  • 13. © 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 13 PERSONALLY IDENTIFIABLE INFORMATION (PII) COVERED BY GDPR Any information that can be classified as personal details – or that can be used to determine your identity ▪ Name ▪ Identification number ▪ Email address ▪ Online user identifier ▪ Social media posts ▪ Physical, physiological or genetic information ▪ Medical information ▪ Location ▪ Bank details ▪ IP address ▪ Cookies
  • 14. © 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 14 THE DATA ASPECTS OF REGULATIONS
  • 15. © 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 15 DATA STANDARDS VS SECURITY STANDARDS ▪ Data Standards “WHAT” • What information needs to be protected/audited • What you should do if your data is breached ▪ Security Standards “HOW” • How you should configure your network • How you should configure your systems (i.e. SQL Server, Oracle)
  • 16. © 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 16 WHAT THE REGULATIONS LOOK FOR ▪ Reporting (And Maintaining) Audit Data ▪ Tracking User Access ▪ Protecting The Data From The Bad Guys (And Watch for Data Breaches) ▪ Planning And Having Good Processes And Response Plans ▪ Assessing Your Risks
  • 17. © 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 17 CIS ▪ Tracking • Capture Logins and Failed Logins
  • 18. © 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 18 DISA STIG ▪ Reporting • Generate audit records for DoD-defined auditable events • Generate audit records when privileges and permissions retrieved • Initiate session auditing upon startup • Audit records for events identified by type, location and subject • Capture the audit information in a centralized place ▪ Tracking • Capture, record and log all content related to a user session • Protect audit information from unauthorized read access, modification or deletion ▪ Planning • Alert support staff in real time for any failure events
  • 19. © 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 19 FISMA/NIST ▪ Tracking • Audit access ▪ Protecting • Monitor, report and respond to incidents ▪ Planning • Create an audit process and certification • Plan for contingency • Manage your configurations ▪ Assessing • Assess your risks • Confirm system and information integrity
  • 20. © 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 20 FERPA ▪ Tracking • Document who has access to student information • Confirm that the instructors or officials only access records for legitimate purposes • Authorized representatives may have access to education records in connection with an audit ▪ Planning • Student transfers must be handled appropriately
  • 21. © 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 21 GDPR ▪ Reporting • Provide audit details about how that data is processed and who interacted with it ▪ Tracking • Know who has access to PII data ▪ Protecting • Notify the supervising authority of a breach within 72 hours ▪ Planning • Identify PII Data • Process data lawfully, fairly and in a way that users understand • Limit the collection of data to only what is necessary ▪ Assessing • Conduct impact assessments for higher risk areas
  • 22. © 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 22 HIPAA ▪ Tracking • Monitor log-in attempts ▪ Protecting • Protect, detect, contain and correct security violations • Detect breaches and notify impacted individuals ▪ Planning • Implement security measures to reduce risks and vulnerabilities • Implement procedures to regularly review audit logs, access reports and security incidents • Implement procedures to terminate access
  • 23. © 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 23 NERC - CIP ▪ Reporting • Log events for identification of and after-the-fact investigations of Cyber Security Incidents ▪ Tracking • Log failed and successful logins
  • 24. © 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 24 PCI DSS ▪ Reporting • Implement automated audit trails for all database events • Retain audit trail history for at least a year ▪ Tracking • Assign a unique identifier for each person who has access • Actions taken on critical data must be traced to known authorized users • Track and monitor all access to the network • Immediately revoke access for terminated users ▪ Protecting • Change vendor supplied defaults and disable unnecessary default accounts • Encrypt the data • Secure audit trails so they can not be altered ▪ Planning • Develop configuration standards
  • 25. © 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 25 SOX ▪ Reporting • Report on effectiveness of company’s internal controls and procedures • Report on who changed permissions • Report on who changed the financial data ▪ Tracking • Report on who accessed the financial data
  • 26. © 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 26 LET’S TALK A LITTLE ABOUT DATA BREACH
  • 27. “ © 2019 IDERA, Inc. All rights reserved. 2 Almost 15 Billion Records have been lost or stolen since 2013. Only 4% were secure breaches where encryption was used and the stolen data was useless. Breachlevelindex.com
  • 28. “ © 2019 IDERA, Inc. All rights reserved. 2 Over 6.3 million data records are lost or stolen every day. Breachlevelindex.com
  • 29. © 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 29 WHAT ARE THE ODDS? ▪ 1 in 960,000 – odds of being struck by lightning ▪ 1 in 220 – odds of dating a millionaire ▪ 1 in 4 – odds of experiencing a data breach https://securityintelligence.com/know-the-odds-the-cost-of-a-data-breach-in-2017/
  • 30. © 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 30 2018 COST PER DATA BREACH ▪ The average cost for each lost or stolen record containing sensitive and confidential information was $148 (a 4.8% increase from the year before) ▪ The average size of a data breach was 26,000 records ▪ $148 x 26,000 ~ $3.86 M (increased 6.4% over 2018) https://www.ibm.com/security/data-breach
  • 31. “ © 2019 IDERA, Inc. All rights reserved. 3 Hospitals spend 64% more annually on advertising for the two years following a breach https://healthitsecurity.com/news/hospitals-spend-64-more-on-advertising-after-a-data-breach
  • 32. “ © 2019 IDERA, Inc. All rights reserved. 3 Companies that contained a breach in less than 30 days saved more than $1 million compared to those that took more than 30 days (the average time to contain a breach is 69 days) https://www.ibm.com/downloads/cas/861MNWN2
  • 33. “ © 2019 IDERA, Inc. All rights reserved. 3 A mega breach of 1 million records has an average total cost of $40 million https://www.ibm.com/downloads/cas/861MNWN2
  • 34. “ © 2019 IDERA, Inc. All rights reserved. 3 A mega breach of 50 million records has an average total cost of $350 million https://www.ibm.com/downloads/cas/861MNWN2
  • 35. © 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 35 SHOCKING, RIGHT??
  • 36. © 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 36 WE’RE HERE TO HELP
  • 37. © 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 37 HOW CAN YOU MEET THE REQUIREMENTS ▪ Reporting (And Maintaining) Audit Data ▪ Tracking User Access ▪ Protecting The Data From The Bad Guys (And Watch for Data Breaches) ▪ Planning And Having Good Processes And Response Plans ▪ Assessing Your Risks
  • 38. © 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 38 SQL SERVER FEATURES FOR COMPLIANCE ▪ Reporting • SQL Server Audit • Temporal Tables ▪ Tracking • Object Level Permissions • Role-Based Security ▪ Protection • Authentication Protocols • Firewalls • Dynamic Data Masking • Transport Level Security (TLS) • Encryption Protocols (TDE, Always Encrypted, Always On)
  • 39. © 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 39 ORACLE FEATURES FOR COMPLIANCE ▪ Reporting • Auditing ▪ Tracking • Access Control • Separation of Duties ▪ Protection • Encryption • Security Monitoring and Alerting • Data Masking and Data Redaction ▪ Assessing • Risk Assessments
  • 40. © 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 40 WHAT CAN TOOLS LIKE SQL COMPLIANCE MANAGER DO? ▪ Reporting • Capture Activity On Database (DDL And DML) • Track The Behavior Of Privileged Users • Track Who Is Accessing Your Sensitive Data • Track Who Has Changed Your Data And What Has It Changed To • Track Security And Administrative Changes • Track User-Defined Events • Audit Systems Tables, Stored Procedures, Views, Indexes, Etc. ▪ Tracking • Capture Logins, Logouts, Failed Logins ▪ Protecting • Determine How Much Data Was Accessed In A Breach
  • 41. © 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 41 SQL COMPLIANCE MANAGER - REGULATION GUIDELINE WIZARD
  • 42. © 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 42 SQL COMPLIANCE MANAGER - CONFIGURATION
  • 43. © 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 43 SQL COMPLIANCE MANAGER – PRIVILEGED USER SETUP
  • 44. © 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 44 SQL COMPLIANCE MANAGER – SENSITIVE COLUMNS
  • 45. © 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 45 SQL COMPLIANCE MANAGER – BEFORE AFTER DATA (BAD) TRACKING
  • 46. © 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 46 SQL COMPLIANCE MANAGER – USER ACTIVITY HISTORY REPORT
  • 47. © 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 47 SQL COMPLIANCE MANAGER – USER LOGIN HISTORY
  • 48. © 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 48 SQL COMPLIANCE MANAGER – REGULATORY COMPLIANCE CHECK REPORT
  • 49. © 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 49 IDERA PRODUCTS CAN HELP YOU WITH: ▪ Reporting (And Maintaining) Audit Data • SQL Compliance Manager ▪ Tracking User Access • SQL Compliance Manager ▪ Protecting The Data From The Bad Guys (And Watch for Data Breaches) • SQL Compliance Manager • SQL Secure ▪ Planning And Having Good Processes And Response Plans • SQL Compliance Manager • SQL Secure • ER/Studio Business Architect ▪ Assessing Your Risks • SQL Compliance Manager • SQL Secure
  • 50. © 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 50 IN CONCLUSION ▪ Cloud Compliance is slightly different than On-Prem Compliance ▪ There are a ton of regulations to comply with ▪ Data breach continues to be a growing problem ▪ Regulations require organizations to: • Report audit data • Track user access • Protect data from the bad guys • Have good processes and response plans • Understand what your risks are ▪ The right tools can help to simplify and automate the auditing process
  • 51. © 2016 IDERA, Inc. All rights reserved. Proprietary and confidential.© 2019 IDERA, Inc. All rights reserved. 5151 THANKS! Any questions? You can find me at: @Brushaber_IDERA on Twitter