SlideShare a Scribd company logo
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |
Modern Data Security
with MySQL
Vittorio Cioe
MySQL Sr. Sales Consultant
vittorio.cioe@oracle.com
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Safe Harbor Statement
The following is intended to outline our general product direction. It is intended for
information purposes only, and may not be incorporated into any contract. It is not a
commitment to deliver any material, code, or functionality, and should not be relied upon
in making purchasing decisions. The development, release, and timing of any features or
functionality described for Oracle’s products remains at the sole discretion of Oracle.
2
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Copyright @ 2018 Oracle and/or its affiliates. All rights reserved.
Agenda
• Modern data security
• MySQL Security Capabilities
• MySQL and GDPR
• Conclusion
Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
Modern Data Security
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Some time ago: trust based data security
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
...and the future
came...
data
are
everywhere
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Now: need for embedded data security
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Complexity grows -> Risk Grows
8
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Data Security Cycle
9
ASSESS PREVENT DETECT
Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
MySQL
Security Capabilities
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Assess Security Risks
11
Discover
Personal
Data
Scan
Security
Configuration
Privilege
Analysis
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
MySQL Enterprise Monitor
• Enforce MySQL Security Best Practices
– Identifies Vulnerabilities
– Assesses current setup against security hardening policies
• Monitoring & Alerting
– User Monitoring
– Password Monitoring
– Schema Change Monitoring
– Backup Monitoring
– Configuration Management
– Configuration Tuning Advice
• Centralized User Management
12
"I definitely recommend the MySQL Enterprise
Monitor to DBAs who don't have a ton of
MySQL experience. It makes monitoring
MySQL security, performance and availability
very easy to understand and to act on.”
Sandi Barr
Sr. Software Engineer
Schneider Electric
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Assess MySQL Authorization
• Administrative Privileges
• Database Privileges
• Session Limits and Object Privileges
• User privileges
– Creating, altering and deleting databases
– Creating, altering and deleting tables
– Execute INSERT, SELECT, UPDATE, DELETE queries
– Create, execute, or delete stored procedures and with what rights
– Create or delete indexes
13
Security Privilege Management in MySQL Workbench
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
MySQL Enterprise Authentication
14
• Integrate with Centralized Authentication Infrastructure
– Centralized Account Management
– Password Policy Management
– Groups & Roles
• PAM (Pluggable Authentication Modules)
– Standard interface (Unix, LDAP, Kerberos, others)
– Windows
• Access native Windows service - Use to Authenticate users using Windows
Active Directory or to a native host
Integrates MySQL with existing
security infrastructures
Integrates MySQL with existing
security infrastructures
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
MySQL Enterprise Authentication: PAM
• Standard Interface
Unix/Linux
• Proxy Users
15
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
MySQL Enterprise Authentication: Windows
• Windows Active Directory
• Windows Native Services
16
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
MySQL Enterprise Authentication: LDAP (new!!)
• Standard Interface
LDAP Authentication
• Proxy Users
17
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Assess your data and data model using MySQL Workbench
18
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Protect from live threats
19
Protect from
SQL injection
Store Data
Encrypted
Enforce
security roles
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
MySQL Enterprise Firewall: Overview
20
Inbound
SQL Traffic
Web
Applications
SQL Injection Attack
Via Brower
ALLOW
BLOCK
DETECT
11
22
33
Instance
MySQL Enterprise FirewallInternet
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
MySQL Enterprise Firewall
• Block SQL Injection Attacks
– Allow: SQL Statements that match Whitelist
– Block: SQL statements that are not on Whitelist
• Intrusion Detection System
– Detect: SQL statements that are not on Whitelist
• SQL Statements execute and alert administrators
21
Select * from employee where id=22
Select * from employee where id=22 or 1=1
Block✖
Allow✔
White List
Applications
Detect & Alert
Intrusion Detection
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
MySQL Enterprise Firewall
• Real Time Protection
– Queries analyzed and matched against White List
• Blocks SQL Injection Attacks
– Positive Security Model
• Block Suspicious Traffic
– Out of Policy Transactions detected & blocked
• Learns White List
– Automated creation of approved list of SQL command patterns on a per user basis
• Transparent
– No changes to application required
22
MySQL Enterprise Firewall monitoring
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
MySQL Database
Encrypted
Tablespace
Files
Protected
Key
Hacker /
Dishonest OS User
Accesses
Files Directly
Information
Access Blocked
By Encryption
MySQL TDE – Protects against Attacks on Database Files
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Key Vault
MySQL Enterprise Transparent Data Encryption
2 Tier Architecture
MySQL Database
Tablespace Keys
MySQL
Server
Plugin &
Services
Infrastructure
InnoDB
Client
Keyring
plugins
• Master Key
• Stored outside the database
• Oracle Key Vault
• SafeNet KeySecure
• KMIP Compliant Key Vault
• Tablespace Key
• Protected by master key
Master Key
Plain Text
Encrypted 2
Encrypted 1
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Key Vault High-Level Architecture
Standby
Administration
Console, Alerts,
Reports
Secure Backups
= Credential Files/Other
Wallets
=
Password/phrases
Keystores
= Certificates
Databases
Servers
Middleware
25
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
MySQL 8.0: Atomicity in Privileges
• Privilege Tables now 100% InnoDB
• User Management DDLs Atomic
– CREATE USER
– ALTER USER
– RENAME USER
– DROP USER
– GRANT
– REVOKE
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
• Fully Function, Flexible, Properly Architected Roles
• Create and Drop Roles, Grant to Roles
• Grant Roles to Roles, Grant Roles to Users
• Limit Hosts that can use roles, Define Default Roles
• Decide what roles are applicable during a session
• And even visualize Roles with SQL function ROLES_GRAPHML()
MySQL 8.0: Security Roles
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Detect suspicious events
28
Audit live
events
Watch live
queries
Disaster
Recovery
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
MySQL Enterprise Audit - Work Flow
29
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Focus on MySQL EE Audit
• GDPR
– Mandates recording or auditing of the activities on the Personal Data
– Recommends records must be maintained centrally
• Under the responsibility of the Controller.
– Processors and third-parties must not be able to tamper or destroy the audit records.
– In addition to book-keeping, auditing helps in forensic analysis in case of a breach.
• MySQL Enterprise Audit Audit data can be
– Maintained in Oracle Audit Value – certified
– Outputs standard XML or JSON that easily integrate with various 3rd
party solutions
– Supports encryption
– Can direct security logs to write-once storage
30
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Review Audit Data With Workbench EE
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Enterprise Query Analyzer
• Real-time query performance
• Visual correlation graphs
• Find & fix expensive queries
• Detailed query statistics
• Query Response Time index (QRTi)
“With the MySQL Query Analyzer, we were able to identify and analyze
problematic SQL code, and triple our database performance. More
importantly, we were able to accomplish this in three days, rather than
taking weeks.”
Keith Souhrada
Software Development Engineer
Big Fish Games
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
MySQL Enterprise Backup
• Online, non-locking backup and recovery
– Complete MySQL instance backup (data and config)
– Partial backup and restore
• Direct Cloud storage backups
– Oracle Storage Cloud, S3, etc.
• Incremental backups
• Point-in-time recovery
• Advanced compressed and encryption
• Backup to tape (SBT)
• Optimistic backups
• Cross-Platform (Windows, Linux, Unix)
Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
InnoDB Cluster
34
App Servers with
MySQL Router
MySQL Group Replication
MySQL Shell
Setup, Manage,
Orchestrate
“High Availability becomes a core
first class feature of MySQL!”
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Additional Security Controls
Hashing, Signing, Encryption Functions
– Symmetric Encryption – AES
– Hashing – SHA-2, SHA-1
– Asymmetric Public Key Encryption (RSA)
– Asymmetric Private Key Decryption (RSA)
– Generate Public/Private Key (RSA, DSA, DH)
– Derive Symmetric Keys from Public and Private Key pairs (DH)
– Digitally Sign Data (RSA, DSA)
– Verify Data Signature (RSA, DSA)
– Validation Data Authenticity (RSA, DSA)
Confidential – Oracle Internal 35
Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
MySQL and GDPR
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
EU General Data Protection Regulation (GDPR)
• Data privacy as a fundamental right
• Defines Data protection responsibilities, baselines, principles
• Provides Enforcement Powers
Focus is on 3 Areas
• Assessment – Processes, Profiles, Data Sensitivity, Ricks
• Prevention – Encryption, Anonymization, Access Controls, Separation of Duties
• Detection – Auditing, Activity monitoring, Alerting, Reporting
37
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
GDPR and MySQL
• We can’t be entirely prescriptive
• We have many things that can be applied towards attaining compliance
– Assessment: MySQL Enterprise Monitor, MySQL Workbench EE, MySQL Security Best
Practices Guidelines
– Prevention: MySQL Transparent Data Encryption, MySQL Enterprise Firewall, DBA
configurable IP whitelisting, Connection Limits, In transit data encryption, Granular
access controls
– Detection: MySQL Enterprise Firewall, MySQL Enterprise Audit, MySQL Workbench
EE, MySQL Enterprise Monitor
38
Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
Conclusion
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
40
Takeaway:
MySQL Enterprise
Security Architecture
 Workbench
• Model
• Data
• Audit Data
• User Management
  Enterprise Monitor
• Identifies Vulnerabilities
• Security hardening policies
• Monitoring & Alerting
• User Monitoring
• Password Monitoring
• Schema Change Monitoring
• Backup Monitoring
 Data Encryption
• TDE
• Encryption
• PKI
 Firewall
 Key Vault
 Enterprise Authentication
• SSO - LDAP, AD, PAM
 Network Encryption
 Enterprise Audit
• Powerful Rules Engine
 Audit Vault
 Strong Authentication
 Access Controls
 Assess
 Prevent
 Detect
 Recover
 Enterprise Backup
• Encrypted
 HA
• Innodb Cluster
 Thread Pool
• Attack minimization
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
References
Confidential – Oracle Internal 41
• Home page EU GDPR
– http://www.eugdpr.org/
• MySQL Enterprise
– https://www.mysql.com/products/enterprise/
• MySQL PCI DSS
– https://www.mysql.com/it/why-mysql/white-papers/mysql-pci-data-security-complia
nce/
• MySQL Security Best Practices
– https://www.mysql.com/it/why-mysql/presentations/mysql-security-best-practices/
Modern Data Security with MySQL

More Related Content

PDF
MySQL Cloud Service
PDF
InnoDb Vs NDB Cluster
PDF
MySQL Manchester TT - Security
PDF
MySQL Manchester TT - MySQL Enterprise Edition
PDF
Oracle Enterprise Manager for MySQL
PDF
Presentation database security audit vault & database firewall
PPTX
Oracle Key Vault Overview
PDF
Oracle Key Vault Data Subsetting and Masking
MySQL Cloud Service
InnoDb Vs NDB Cluster
MySQL Manchester TT - Security
MySQL Manchester TT - MySQL Enterprise Edition
Oracle Enterprise Manager for MySQL
Presentation database security audit vault & database firewall
Oracle Key Vault Overview
Oracle Key Vault Data Subsetting and Masking

What's hot (20)

PPTX
Robust easy affordable disaster recovery for MySQL Data
PPT
MySQL in Oracle environment : Quick start guide for Oracle DBA (Part 1)
PDF
My sql en la nube conoce las mejores prácticas en administración y operación_...
PPTX
Azure key vault - Brisbane User Group
PPTX
Azure Low Lands 2019 - Building secure cloud applications with Azure Key Vault
PPTX
MySQL London Tech Tour March 2015 - Embedded Database of Choice
PPTX
MySQL in oracle_environments(Part 2): MySQL Enterprise Monitor & Oracle Enter...
PDF
ISC2 Secure Summit EMEA - Top Microsoft Azure security fails and how to avoid...
PPTX
Windows Azure Security Features And Functionality
PPTX
Managing your secrets in a cloud environment
PPTX
Azure key vault
PPTX
SQL Server 2016 New Security Features
PPTX
Global Azure Bootcamp 2017 - Azure Key Vault
PPTX
Improving Application Security With Azure
PDF
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
PDF
Oracle database 12c data masking and subsetting guide
PPTX
Will Your Cloud Be Compliant? OpenStack Security
PPTX
BGOUG 2014: Developing Using MySQL
PPTX
Azure security basics
PDF
Az 900 Session 3 Security, privacy, compliance, trust, pricing, SLA and Lifec...
Robust easy affordable disaster recovery for MySQL Data
MySQL in Oracle environment : Quick start guide for Oracle DBA (Part 1)
My sql en la nube conoce las mejores prácticas en administración y operación_...
Azure key vault - Brisbane User Group
Azure Low Lands 2019 - Building secure cloud applications with Azure Key Vault
MySQL London Tech Tour March 2015 - Embedded Database of Choice
MySQL in oracle_environments(Part 2): MySQL Enterprise Monitor & Oracle Enter...
ISC2 Secure Summit EMEA - Top Microsoft Azure security fails and how to avoid...
Windows Azure Security Features And Functionality
Managing your secrets in a cloud environment
Azure key vault
SQL Server 2016 New Security Features
Global Azure Bootcamp 2017 - Azure Key Vault
Improving Application Security With Azure
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Oracle database 12c data masking and subsetting guide
Will Your Cloud Be Compliant? OpenStack Security
BGOUG 2014: Developing Using MySQL
Azure security basics
Az 900 Session 3 Security, privacy, compliance, trust, pricing, SLA and Lifec...
Ad

Similar to Modern Data Security with MySQL (20)

PDF
MySQL Day Paris 2016 - MySQL Enterprise Edition
PDF
MySQL Security
PDF
MySQL Security
PPTX
MySQL Tech Tour 2015 - 5.7 Security
PPTX
DevTalks.ro 2019 What's New in MySQL 8.0 Security
PDF
MySQL Security & GDPR
PDF
Mysql security 5.7
PDF
Mysql Enterprise Edition Feature and Tools
PDF
MySQL Enterprise Edition - Complete Guide (2019)
PPTX
Percona Live Europe 2018: What's New in MySQL 8.0 Security
ODP
MySQL Enterprise Portfolio
PDF
MySQL 8.0 - Security Features
PDF
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
PDF
MySQL Enterprise Edition Overview
PDF
MySQL for Oracle DBAs
PDF
From Nice to Have to Mission Critical: MySQL Enterprise Edition
PPTX
Pl17: MySQL 8.0: security
PPTX
MySQL enterprise edition
PDF
MySQL 20 años: pasado, presente y futuro; conoce las nuevas características d...
PDF
How Partners Can Tap into a New Revenue Stream w/MySQL EE
MySQL Day Paris 2016 - MySQL Enterprise Edition
MySQL Security
MySQL Security
MySQL Tech Tour 2015 - 5.7 Security
DevTalks.ro 2019 What's New in MySQL 8.0 Security
MySQL Security & GDPR
Mysql security 5.7
Mysql Enterprise Edition Feature and Tools
MySQL Enterprise Edition - Complete Guide (2019)
Percona Live Europe 2018: What's New in MySQL 8.0 Security
MySQL Enterprise Portfolio
MySQL 8.0 - Security Features
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
MySQL Enterprise Edition Overview
MySQL for Oracle DBAs
From Nice to Have to Mission Critical: MySQL Enterprise Edition
Pl17: MySQL 8.0: security
MySQL enterprise edition
MySQL 20 años: pasado, presente y futuro; conoce las nuevas características d...
How Partners Can Tap into a New Revenue Stream w/MySQL EE
Ad

More from Vittorio Cioe (10)

PDF
MySQL Document Store (Oracle Code Warsaw 2018)
PDF
MySQL InnoDB Cluster: High Availability Made Easy!
PDF
MySQL 8.0
PDF
MySQL Cloud Service
PDF
MySQL Enterprise Monitor
PDF
MySQL NDB Cluster
PDF
MySQL InnoDB Cluster
PDF
Next Gen Applications
PDF
Introduction to MySQL Enterprise
PDF
State of the dolphin
MySQL Document Store (Oracle Code Warsaw 2018)
MySQL InnoDB Cluster: High Availability Made Easy!
MySQL 8.0
MySQL Cloud Service
MySQL Enterprise Monitor
MySQL NDB Cluster
MySQL InnoDB Cluster
Next Gen Applications
Introduction to MySQL Enterprise
State of the dolphin

Recently uploaded (20)

PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
KodekX | Application Modernization Development
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Approach and Philosophy of On baking technology
PDF
Machine learning based COVID-19 study performance prediction
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Encapsulation theory and applications.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPT
Teaching material agriculture food technology
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Empathic Computing: Creating Shared Understanding
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
KodekX | Application Modernization Development
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Approach and Philosophy of On baking technology
Machine learning based COVID-19 study performance prediction
The AUB Centre for AI in Media Proposal.docx
Encapsulation theory and applications.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Teaching material agriculture food technology
Advanced methodologies resolving dimensionality complications for autism neur...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
sap open course for s4hana steps from ECC to s4
Empathic Computing: Creating Shared Understanding
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Per capita expenditure prediction using model stacking based on satellite ima...

Modern Data Security with MySQL

  • 1. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | Modern Data Security with MySQL Vittorio Cioe MySQL Sr. Sales Consultant vittorio.cioe@oracle.com
  • 2. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle. 2
  • 3. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Copyright @ 2018 Oracle and/or its affiliates. All rights reserved. Agenda • Modern data security • MySQL Security Capabilities • MySQL and GDPR • Conclusion
  • 4. Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | Modern Data Security
  • 5. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Some time ago: trust based data security
  • 6. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | ...and the future came... data are everywhere
  • 7. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Now: need for embedded data security
  • 8. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Complexity grows -> Risk Grows 8
  • 9. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Data Security Cycle 9 ASSESS PREVENT DETECT
  • 10. Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | MySQL Security Capabilities
  • 11. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Assess Security Risks 11 Discover Personal Data Scan Security Configuration Privilege Analysis
  • 12. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | MySQL Enterprise Monitor • Enforce MySQL Security Best Practices – Identifies Vulnerabilities – Assesses current setup against security hardening policies • Monitoring & Alerting – User Monitoring – Password Monitoring – Schema Change Monitoring – Backup Monitoring – Configuration Management – Configuration Tuning Advice • Centralized User Management 12 "I definitely recommend the MySQL Enterprise Monitor to DBAs who don't have a ton of MySQL experience. It makes monitoring MySQL security, performance and availability very easy to understand and to act on.” Sandi Barr Sr. Software Engineer Schneider Electric
  • 13. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Assess MySQL Authorization • Administrative Privileges • Database Privileges • Session Limits and Object Privileges • User privileges – Creating, altering and deleting databases – Creating, altering and deleting tables – Execute INSERT, SELECT, UPDATE, DELETE queries – Create, execute, or delete stored procedures and with what rights – Create or delete indexes 13 Security Privilege Management in MySQL Workbench
  • 14. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | MySQL Enterprise Authentication 14 • Integrate with Centralized Authentication Infrastructure – Centralized Account Management – Password Policy Management – Groups & Roles • PAM (Pluggable Authentication Modules) – Standard interface (Unix, LDAP, Kerberos, others) – Windows • Access native Windows service - Use to Authenticate users using Windows Active Directory or to a native host Integrates MySQL with existing security infrastructures Integrates MySQL with existing security infrastructures
  • 15. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | MySQL Enterprise Authentication: PAM • Standard Interface Unix/Linux • Proxy Users 15
  • 16. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | MySQL Enterprise Authentication: Windows • Windows Active Directory • Windows Native Services 16
  • 17. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | MySQL Enterprise Authentication: LDAP (new!!) • Standard Interface LDAP Authentication • Proxy Users 17
  • 18. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Assess your data and data model using MySQL Workbench 18
  • 19. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Protect from live threats 19 Protect from SQL injection Store Data Encrypted Enforce security roles
  • 20. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | MySQL Enterprise Firewall: Overview 20 Inbound SQL Traffic Web Applications SQL Injection Attack Via Brower ALLOW BLOCK DETECT 11 22 33 Instance MySQL Enterprise FirewallInternet
  • 21. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | MySQL Enterprise Firewall • Block SQL Injection Attacks – Allow: SQL Statements that match Whitelist – Block: SQL statements that are not on Whitelist • Intrusion Detection System – Detect: SQL statements that are not on Whitelist • SQL Statements execute and alert administrators 21 Select * from employee where id=22 Select * from employee where id=22 or 1=1 Block✖ Allow✔ White List Applications Detect & Alert Intrusion Detection
  • 22. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | MySQL Enterprise Firewall • Real Time Protection – Queries analyzed and matched against White List • Blocks SQL Injection Attacks – Positive Security Model • Block Suspicious Traffic – Out of Policy Transactions detected & blocked • Learns White List – Automated creation of approved list of SQL command patterns on a per user basis • Transparent – No changes to application required 22 MySQL Enterprise Firewall monitoring
  • 23. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | MySQL Database Encrypted Tablespace Files Protected Key Hacker / Dishonest OS User Accesses Files Directly Information Access Blocked By Encryption MySQL TDE – Protects against Attacks on Database Files
  • 24. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Key Vault MySQL Enterprise Transparent Data Encryption 2 Tier Architecture MySQL Database Tablespace Keys MySQL Server Plugin & Services Infrastructure InnoDB Client Keyring plugins • Master Key • Stored outside the database • Oracle Key Vault • SafeNet KeySecure • KMIP Compliant Key Vault • Tablespace Key • Protected by master key Master Key Plain Text Encrypted 2 Encrypted 1
  • 25. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Key Vault High-Level Architecture Standby Administration Console, Alerts, Reports Secure Backups = Credential Files/Other Wallets = Password/phrases Keystores = Certificates Databases Servers Middleware 25
  • 26. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | MySQL 8.0: Atomicity in Privileges • Privilege Tables now 100% InnoDB • User Management DDLs Atomic – CREATE USER – ALTER USER – RENAME USER – DROP USER – GRANT – REVOKE
  • 27. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | • Fully Function, Flexible, Properly Architected Roles • Create and Drop Roles, Grant to Roles • Grant Roles to Roles, Grant Roles to Users • Limit Hosts that can use roles, Define Default Roles • Decide what roles are applicable during a session • And even visualize Roles with SQL function ROLES_GRAPHML() MySQL 8.0: Security Roles
  • 28. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Detect suspicious events 28 Audit live events Watch live queries Disaster Recovery
  • 29. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | MySQL Enterprise Audit - Work Flow 29
  • 30. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Focus on MySQL EE Audit • GDPR – Mandates recording or auditing of the activities on the Personal Data – Recommends records must be maintained centrally • Under the responsibility of the Controller. – Processors and third-parties must not be able to tamper or destroy the audit records. – In addition to book-keeping, auditing helps in forensic analysis in case of a breach. • MySQL Enterprise Audit Audit data can be – Maintained in Oracle Audit Value – certified – Outputs standard XML or JSON that easily integrate with various 3rd party solutions – Supports encryption – Can direct security logs to write-once storage 30
  • 31. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Review Audit Data With Workbench EE
  • 32. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Enterprise Query Analyzer • Real-time query performance • Visual correlation graphs • Find & fix expensive queries • Detailed query statistics • Query Response Time index (QRTi) “With the MySQL Query Analyzer, we were able to identify and analyze problematic SQL code, and triple our database performance. More importantly, we were able to accomplish this in three days, rather than taking weeks.” Keith Souhrada Software Development Engineer Big Fish Games
  • 33. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | MySQL Enterprise Backup • Online, non-locking backup and recovery – Complete MySQL instance backup (data and config) – Partial backup and restore • Direct Cloud storage backups – Oracle Storage Cloud, S3, etc. • Incremental backups • Point-in-time recovery • Advanced compressed and encryption • Backup to tape (SBT) • Optimistic backups • Cross-Platform (Windows, Linux, Unix)
  • 34. Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | InnoDB Cluster 34 App Servers with MySQL Router MySQL Group Replication MySQL Shell Setup, Manage, Orchestrate “High Availability becomes a core first class feature of MySQL!”
  • 35. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Additional Security Controls Hashing, Signing, Encryption Functions – Symmetric Encryption – AES – Hashing – SHA-2, SHA-1 – Asymmetric Public Key Encryption (RSA) – Asymmetric Private Key Decryption (RSA) – Generate Public/Private Key (RSA, DSA, DH) – Derive Symmetric Keys from Public and Private Key pairs (DH) – Digitally Sign Data (RSA, DSA) – Verify Data Signature (RSA, DSA) – Validation Data Authenticity (RSA, DSA) Confidential – Oracle Internal 35
  • 36. Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | MySQL and GDPR
  • 37. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | EU General Data Protection Regulation (GDPR) • Data privacy as a fundamental right • Defines Data protection responsibilities, baselines, principles • Provides Enforcement Powers Focus is on 3 Areas • Assessment – Processes, Profiles, Data Sensitivity, Ricks • Prevention – Encryption, Anonymization, Access Controls, Separation of Duties • Detection – Auditing, Activity monitoring, Alerting, Reporting 37
  • 38. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | GDPR and MySQL • We can’t be entirely prescriptive • We have many things that can be applied towards attaining compliance – Assessment: MySQL Enterprise Monitor, MySQL Workbench EE, MySQL Security Best Practices Guidelines – Prevention: MySQL Transparent Data Encryption, MySQL Enterprise Firewall, DBA configurable IP whitelisting, Connection Limits, In transit data encryption, Granular access controls – Detection: MySQL Enterprise Firewall, MySQL Enterprise Audit, MySQL Workbench EE, MySQL Enterprise Monitor 38
  • 39. Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | Conclusion
  • 40. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | 40 Takeaway: MySQL Enterprise Security Architecture  Workbench • Model • Data • Audit Data • User Management   Enterprise Monitor • Identifies Vulnerabilities • Security hardening policies • Monitoring & Alerting • User Monitoring • Password Monitoring • Schema Change Monitoring • Backup Monitoring  Data Encryption • TDE • Encryption • PKI  Firewall  Key Vault  Enterprise Authentication • SSO - LDAP, AD, PAM  Network Encryption  Enterprise Audit • Powerful Rules Engine  Audit Vault  Strong Authentication  Access Controls  Assess  Prevent  Detect  Recover  Enterprise Backup • Encrypted  HA • Innodb Cluster  Thread Pool • Attack minimization
  • 41. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | References Confidential – Oracle Internal 41 • Home page EU GDPR – http://www.eugdpr.org/ • MySQL Enterprise – https://www.mysql.com/products/enterprise/ • MySQL PCI DSS – https://www.mysql.com/it/why-mysql/white-papers/mysql-pci-data-security-complia nce/ • MySQL Security Best Practices – https://www.mysql.com/it/why-mysql/presentations/mysql-security-best-practices/