SlideShare a Scribd company logo
MySQL Enterprise Edition
Achieve the Highest Levels of Security
Olivier Dasini
MySQL Principal Solutions Architect
olivier.dasini@oracle.com
@freshdaz
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Safe Harbor Statement
The following is intended to outline our general product direction. It is
intended for information purposes only, and may not be incorporated
into any contract. It is not a commitment to deliver any material, code,
or functionality, and should not be relied upon in making purchasing
decisions. The development, release, and timing of any features or
functionality described for Oracle’s products remains at the sole
discretion of Oracle.
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
MySQL Security
3
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Data Breaches
429 Million identities exposed in 2015.
75%
Web sites with vulnerabilities. 15% of all
websites had a critical vulnerability.
9
In 2015, a record of nine mega-
breaches were reported.
One worlds largest 191M.
(Mega-breach = more than 10 million records.)
Mobile Vulnerabilities on the rise – up 214%
Infection by SQL Injection still strong.
Malware attacks on databases
Oracle Confidential – Internal/Restricted/Highly
Restricted
4
Source: Internet Security Threat Report 2016, Symantec
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
DBAs are responsible for Database Security
• Ensure only users who should get access, can get access
• Limit what users and applications can do
• Limit from where users and applications can access data
• Watch what is happening, and when it happened
• Make sure to back things up securely
• Minimize attack surface
• Ensure encryption keys are protected and managed
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
DBAs must meet
Security and Regulatory Compliance
• Regulations
– PCI – DSS: Payment Card Data
– HIPAA: Privacy of Health Data
– Sarbanes Oxley: Accuracy of Financial Data
– EU Data Protection Directive: Protection of Personal Data
●
General Data Protection Regulation (GDPR)
●
https://en.wikipedia.org/wiki/General_Data_Protection_Regulation
– Data Protection Act (UK): Protection of Personal Data
• Requirements
– Continuous Monitoring (Users, Schema, Backups, etc)
– Data Protection (Encryption, Privilege Management, etc.)
– Data Retention (Backups, User Activity, etc.)
– Data Auditing (User activity, etc.)
6
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
MySQL Enterprise Edition
• MySQL Enterprise TDE
– Data-at-Rest Encryption
– Key Management / Security
• MySQL Enterprise Encryption
– Public/Private Key Cryptography
– Asymmetric Encryption
– Digital Signatures, Data Validation
• MySQL Enterprise Firewall
– Block SQL Injection Attacks
– Intrusion Detection
• MySQL Enterprise Audit
– User Activity Auditing, Regulatory Compliance
7
• MySQL Enterprise Monitor
– Changes in Database Configurations, Users
Permissions, Database Schema, Passwords
• MySQL Enterprise Backup
– Securing Backups, AES 256 encryption
• MySQL Enterprise Authentication
– External Authentication Modules
– Microsoft AD, Linux PAMs
https://www.youtube.com/watch?v=ypQh9H9Rf9w
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
MySQL Enterprise Transparent Data Encryption
• Improves Security
– Added Layer– enforces access controls
– Simple to use and manage
• Meets Security and Regulatory Requirements
– Fit for cases where encryption is required
• Healthcare, FiServ, Government, etc.
• Secures and Manages Keys
– Supports Standard KMIP 1.2 protocols
– Supports Oracle Key Vault and other Key Stores
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |
MySQL Enterprise Transparent Data Encryption
Goals
9
• Data at Rest Encryption
– Tablespaces, Disks, Storage, OS File system
• Transparent to applications and users
– No application code, schema or data type changes
• Transparent to DBAs
– Keys are hidden from DBAs, no configuration changes
• Requires Key Management
– Protection, rotation, storage, recovery
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | 10
MySQL Transparent Data Encryption
Encrypted
Tablespace Files
Tablespace Key
Malicious OS User / Hacker
Accesses Files Directly
Information Access Blocked
By Encryption
Master Key
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
MySQL Enterprise Audit
• Auditing for Security & Compliance
– FIPS, HIPAA, PCI-DSS, SOX, DISA STIG, …
• MySQL built-in logging infrastructure:
– general log, error log
• MySQL Enterprise Audit
– Granularity made for auditing
– Can be modified live
– Contains additional details
– Compatible with Oracle Audit Vault.
https://dev.mysql.com/doc/refman/5.7/en/audit-log.html
Adds regulatory compliance to
MySQL applications (HIPAA,
Sarbanes-Oxley, PCI, etc.)
Adds regulatory compliance to
MySQL applications (HIPAA,
Sarbanes-Oxley, PCI, etc.)
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |
MySQL Enterprise Audit Work Flow
12
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
MySQL Enterprise Firewall
• Real Time Protection
– Queries analyzed and matched against White List
• Blocks SQL Injection Attacks
– Positive Security Model
• Block Suspicious Traffic
– Out of Policy Transactions detected & blocked
• Learns White List
– Automated creation of approved list of SQL command patterns on a per user basis
• Transparent
– No changes to application required
13
MySQL Enterprise Firewall monitoring
Protection from SQL Injection Attacks
- #1 Web Application Vulnerability
- 77% of Web Sites had vulnerabilities
https://dev.mysql.com/doc/refman/5.7/en/firewall.html
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
MySQL Enterprise Firewall: Operating Modes
14
ALLOW
In Whitelist
Blocks SQL Attacks
Allows “Matching” SQL
Table
Table
Table
BLOCK
NOT In Whitelist
BLOCK and ALERT
DETECT (IDS)
NOT In Whitelist
ALLOW and ALERT
Table
Table
Table
ALLOW – Execute SQL
- SQL Matches Whitelist
BLOCK – Block the request
- Not in Whitelist
DETECT – Execute SQL & Alert
- Not in Whitelist
11
22
33
Table
Table
Table
Allows SQL & Alerts
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
MySQL Enterprise Backup
• Online, non-locking backup and recovery
– Complete MySQL instance backup (data and config)
– Partial backup and restore
• Direct Cloud storage backups (S3, etc.)
• Incremental backups
• Point-in-time recovery
• Advanced compressed and encryption
• Backup to tape (SBT)
• Backup validation
• Optimistic backups
• Cross-Platform (Windows, Linux, Unix)
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
MySQL Enterprise Monitor
• Start monitoring MySQL in 10 minutes
• Real-time MySQL performance and
availability monitoring
• Visually find & fix problem queries
• Disk monitoring for capacity planning
• Cloud friendly architecture
– No agents required
• Role based access controls
16
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |
MySQL Enterprise Monitor: Backup
• Monitor backup usage and health
– Across your entire datacenter
• Drill into backup job details
– Allowing for easy backup recovery
• Supports all backup types
• Alerting on significant events
– Poor backup performance
– Backup job failures
– Out of date backups
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |
MySQL Enterprise Monitor: Security
• Enforce MySQL Security Best Practices
– Identifies vulnerabilities
– Assesses current setup against security hardening
policies
• Monitoring and Alerting
– User accounts and passwords
– Firewall usage, effectiveness, and red flags
– Backups and data loss security
– Schema changes and tracking
– Configuration changes and tuning advice
• Centralized Secure User Management
18
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |
MySQL Enterprise Encryption
• MySQL encryption functions
– Symmetric encryption AES256 (All Editions)
– Public-key / asymmetric cryptography – RSA
• Key management functions
– Generate public and private keys
– Key exchange methods: DH
• Sign and verify data functions
– Cryptographic hashing for digital signing, verification, & validation – RSA,DSA
19
http://dev.mysql.com/doc/refman/5.7/en/enterprise-encryption.html
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
MySQL Enterprise Encryption
Encryption/Decryption within MySQL
Sensitive Data Sensitive Data
Private / Public Key Pairs
- Generate using MySQL Enterprise Encryption Functions
- Use externally generated (e.g. OpenSSL)
Encryption
Public Key
Decryption
Private Key
Encrypted
Data
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
MySQL Enterprise Encryption
App Encrypts/MySQL Decrypts
21
Encryption
Public Key
Decryption
Private Key
Encrypted
Data
Sensitive Data
Applications
Sensitive Data
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
MySQL Enterprise Encryption
App Encrypts / MySQL Stores / MySQL Decrypts
22
Encryption
Public Key
Decryption
Private Key
Encrypted
Data
Sensitive Data Sensitive Data
ApplicationsApplications
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |
MySQL Enterprise Authentication
• Built in Authentication
– user table stores users and encrypted passwords
• X.509
– Server authenticates client certificates
• MySQL Native, SHA 256 Password plugin
– Native uses SHA1 or plugin with SHA-256 hashing and per user salting for user account passwords.
• MySQL Enterprise Authentication
– Microsoft Active Directory
– Linux PAMs (Pluggable Authentication Modules)
• Support LDAP and more
• Custom Authentication
Integrates MySQL with
existing security
infrastructures and SOPs
Integrates MySQL with
existing security
infrastructures and SOPs
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |
MySQL Enterprise Authentication
• PAM (Pluggable Authentication Modules)
– Access external authentication methods
– Standard interface (Unix, LDAP, Kerberos, others)
– Proxied and non-proxied users
• Windows
– Access native Windows services
– Authenticate users already logged into Windows
(Windows Active Directory)
• Pluggable Authentication API
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
MySQL Enterprise Edition
• MySQL Enterprise TDE
– Data-at-Rest Encryption
– Key Management / Security
• MySQL Enterprise Encryption
– Public/Private Key Cryptography
– Asymmetric Encryption
– Digital Signatures, Data Validation
• MySQL Enterprise Firewall
– Block SQL Injection Attacks
– Intrusion Detection
• MySQL Enterprise Audit
– User Activity Auditing, Regulatory Compliance
25
• MySQL Enterprise Monitor
– Changes in Database Configurations, Users
Permissions, Database Schema, Passwords
• MySQL Enterprise Backup
– Securing Backups, AES 256 encryption
• MySQL Enterprise Authentication
– External Authentication Modules
– Microsoft AD, Linux PAMs
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Thank you!
MySQL Day Paris 2016 - MySQL Enterprise Edition

More Related Content

PDF
MySQL Day Paris 2016 - MySQL as a Document Store
PDF
MySQL Day Paris 2016 - Introducing Oracle MySQL Cloud Service
PDF
MySQL Document Store
PDF
MySQL Day Paris 2016 - MySQL HA: InnoDB Cluster and NDB Cluster
PDF
MySQL InnoDB Cluster - Meetup Oracle MySQL / AFUP Paris
PDF
MySQL InnoDB Cluster - A complete High Availability solution for MySQL
PDF
MySQL Day Paris 2016 - State Of The Dolphin
PDF
MySQL for Software-as-a-Service (SaaS)
MySQL Day Paris 2016 - MySQL as a Document Store
MySQL Day Paris 2016 - Introducing Oracle MySQL Cloud Service
MySQL Document Store
MySQL Day Paris 2016 - MySQL HA: InnoDB Cluster and NDB Cluster
MySQL InnoDB Cluster - Meetup Oracle MySQL / AFUP Paris
MySQL InnoDB Cluster - A complete High Availability solution for MySQL
MySQL Day Paris 2016 - State Of The Dolphin
MySQL for Software-as-a-Service (SaaS)

What's hot (20)

PDF
MySQL Cloud Service Deep Dive
PDF
MySQL 5.7 InnoDB Cluster (Jan 2018)
PDF
MySQL Document Store - A Document Store with all the benefts of a Transactona...
PDF
MySQL High Availability -- InnoDB Clusters
PDF
MySQL InnoDB Cluster and NDB Cluster
PDF
Case Study: MySQL migration from latin1 to UTF-8
PDF
InnoDb Vs NDB Cluster
PPSX
MySQL @ the University Of Nottingham
PDF
MySQL 8.0 - What's New ?
PDF
NoSQL and MySQL: News about JSON
PDF
Unlocking Big Data Insights with MySQL
PDF
MySQL Community and Commercial Edition
PDF
MySQL Day Paris 2018 - MySQL InnoDB Cluster; A complete High Availability sol...
PDF
MySQL for Oracle DBAs
PDF
MySQL 5.7: What's New, Nov. 2015
PDF
MySQL Security
PDF
MySQL Day Paris 2018 - MySQL JSON Document Store
PDF
Introduction to MySQL
PDF
MySQL Cloud Service
PDF
MySQL NoSQL Document Store
MySQL Cloud Service Deep Dive
MySQL 5.7 InnoDB Cluster (Jan 2018)
MySQL Document Store - A Document Store with all the benefts of a Transactona...
MySQL High Availability -- InnoDB Clusters
MySQL InnoDB Cluster and NDB Cluster
Case Study: MySQL migration from latin1 to UTF-8
InnoDb Vs NDB Cluster
MySQL @ the University Of Nottingham
MySQL 8.0 - What's New ?
NoSQL and MySQL: News about JSON
Unlocking Big Data Insights with MySQL
MySQL Community and Commercial Edition
MySQL Day Paris 2018 - MySQL InnoDB Cluster; A complete High Availability sol...
MySQL for Oracle DBAs
MySQL 5.7: What's New, Nov. 2015
MySQL Security
MySQL Day Paris 2018 - MySQL JSON Document Store
Introduction to MySQL
MySQL Cloud Service
MySQL NoSQL Document Store
Ad

Viewers also liked (20)

PDF
MySQL 5.7 & JSON - Nouvelles opportunités pour les dévelopeurs
PDF
Haute disponibilité my sql avec group réplication
PDF
Étude de cas : migration MySQL Latin 1 vers UTF-8
PDF
Optimisation de MySQL
PDF
MHA : MySQL haute dispo, chez Viadeo par Olivier Dasini
PDF
Architectures haute disponibilité avec MySQL
PDF
Les nouveautés de MySQL 5.1
PDF
2016 MySQL State of the Dolphin
PDF
MySQL Enterprise Edition Overview
PDF
Mysql security 5.7
PDF
MariaDB - Fast, Easy & Strong - Get Started Tutorial
PPTX
BGOUG15: JSON support in MySQL 5.7
PDF
Moins on code, mieux on se porte !
PPTX
2016 oSC MySQL Firewall
PDF
devops Days Belgium Ghent 2016
PDF
Upgrade to MySQL 5.6 without downtime
PDF
SHOWDOWN: Threat Stack vs. Red Hat AuditD
PDF
Protecting confidential files using SE-Linux
PPT
Open Audit
MySQL 5.7 & JSON - Nouvelles opportunités pour les dévelopeurs
Haute disponibilité my sql avec group réplication
Étude de cas : migration MySQL Latin 1 vers UTF-8
Optimisation de MySQL
MHA : MySQL haute dispo, chez Viadeo par Olivier Dasini
Architectures haute disponibilité avec MySQL
Les nouveautés de MySQL 5.1
2016 MySQL State of the Dolphin
MySQL Enterprise Edition Overview
Mysql security 5.7
MariaDB - Fast, Easy & Strong - Get Started Tutorial
BGOUG15: JSON support in MySQL 5.7
Moins on code, mieux on se porte !
2016 oSC MySQL Firewall
devops Days Belgium Ghent 2016
Upgrade to MySQL 5.6 without downtime
SHOWDOWN: Threat Stack vs. Red Hat AuditD
Protecting confidential files using SE-Linux
Open Audit
Ad

Similar to MySQL Day Paris 2016 - MySQL Enterprise Edition (20)

PDF
MySQL Security
PDF
Modern Data Security with MySQL
PPTX
MySQL Tech Tour 2015 - 5.7 Security
PDF
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
PPTX
DevTalks.ro 2019 What's New in MySQL 8.0 Security
PDF
Mysql Enterprise Edition Feature and Tools
PDF
MySQL 8.0 - Security Features
PPTX
Percona Live Europe 2018: What's New in MySQL 8.0 Security
PDF
MySQL Enterprise Edition - Complete Guide (2019)
PPTX
Pl17: MySQL 8.0: security
PPTX
2014 OpenSuse Conf: Protect your MySQL Server
PDF
How Partners Can Tap into a New Revenue Stream w/MySQL EE
ODP
MySQL Enterprise Portfolio
PDF
MySQL Database Service - 100% Developed, Managed and Supported by the MySQL Team
PDF
TLV - MySQL Security overview
PDF
MySQL 20 años: pasado, presente y futuro; conoce las nuevas características d...
PDF
MySQL Security in a Cloudy World
PDF
MySQL Day Paris 2018 - Introduction & The State of the Dolphin
PDF
MySQL Security & GDPR
PDF
Mysql user-camp-march-11th-2016
MySQL Security
Modern Data Security with MySQL
MySQL Tech Tour 2015 - 5.7 Security
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
DevTalks.ro 2019 What's New in MySQL 8.0 Security
Mysql Enterprise Edition Feature and Tools
MySQL 8.0 - Security Features
Percona Live Europe 2018: What's New in MySQL 8.0 Security
MySQL Enterprise Edition - Complete Guide (2019)
Pl17: MySQL 8.0: security
2014 OpenSuse Conf: Protect your MySQL Server
How Partners Can Tap into a New Revenue Stream w/MySQL EE
MySQL Enterprise Portfolio
MySQL Database Service - 100% Developed, Managed and Supported by the MySQL Team
TLV - MySQL Security overview
MySQL 20 años: pasado, presente y futuro; conoce las nuevas características d...
MySQL Security in a Cloudy World
MySQL Day Paris 2018 - Introduction & The State of the Dolphin
MySQL Security & GDPR
Mysql user-camp-march-11th-2016

More from Olivier DASINI (15)

PDF
MySQL High Availability Solutions - Avoid loss of service by reducing the r...
PDF
MySQL Document Store for Modern Applications
PDF
MySQL Performance Best Practices
PDF
MySQL 8.0.22 - New Features Summary
PDF
Upgrade from MySQL 5.7 to MySQL 8.0
PDF
MySQL 8.0.21 - New Features Summary
PDF
MySQL 8.0.19 - New Features Summary
PDF
MySQL 8.0.18 - New Features Summary
PDF
MySQL 8.0.17 - New Features Summary
PDF
MySQL 8.0.16 New Features Summary
PDF
MySQL Day Paris 2018 - Upgrade from MySQL 5.7 to MySQL 8.0
PDF
MySQL Day Paris 2018 - What’s New in MySQL 8.0 ?
PDF
MySQL 8.0, what's new ? - Forum PHP 2018
PDF
MySQL JSON Document Store - A Document Store with all the benefits of a Trans...
PDF
What's New in MySQL 5.7
MySQL High Availability Solutions - Avoid loss of service by reducing the r...
MySQL Document Store for Modern Applications
MySQL Performance Best Practices
MySQL 8.0.22 - New Features Summary
Upgrade from MySQL 5.7 to MySQL 8.0
MySQL 8.0.21 - New Features Summary
MySQL 8.0.19 - New Features Summary
MySQL 8.0.18 - New Features Summary
MySQL 8.0.17 - New Features Summary
MySQL 8.0.16 New Features Summary
MySQL Day Paris 2018 - Upgrade from MySQL 5.7 to MySQL 8.0
MySQL Day Paris 2018 - What’s New in MySQL 8.0 ?
MySQL 8.0, what's new ? - Forum PHP 2018
MySQL JSON Document Store - A Document Store with all the benefits of a Trans...
What's New in MySQL 5.7

Recently uploaded (20)

PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Encapsulation theory and applications.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Big Data Technologies - Introduction.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Empathic Computing: Creating Shared Understanding
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Spectroscopy.pptx food analysis technology
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Agricultural_Statistics_at_a_Glance_2022_0.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Encapsulation theory and applications.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Review of recent advances in non-invasive hemoglobin estimation
Big Data Technologies - Introduction.pptx
Network Security Unit 5.pdf for BCA BBA.
Empathic Computing: Creating Shared Understanding
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Spectral efficient network and resource selection model in 5G networks
Spectroscopy.pptx food analysis technology
NewMind AI Weekly Chronicles - August'25 Week I
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
20250228 LYD VKU AI Blended-Learning.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Per capita expenditure prediction using model stacking based on satellite ima...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025

MySQL Day Paris 2016 - MySQL Enterprise Edition

  • 1. MySQL Enterprise Edition Achieve the Highest Levels of Security Olivier Dasini MySQL Principal Solutions Architect olivier.dasini@oracle.com @freshdaz
  • 2. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle.
  • 3. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | MySQL Security 3
  • 4. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | Data Breaches 429 Million identities exposed in 2015. 75% Web sites with vulnerabilities. 15% of all websites had a critical vulnerability. 9 In 2015, a record of nine mega- breaches were reported. One worlds largest 191M. (Mega-breach = more than 10 million records.) Mobile Vulnerabilities on the rise – up 214% Infection by SQL Injection still strong. Malware attacks on databases Oracle Confidential – Internal/Restricted/Highly Restricted 4 Source: Internet Security Threat Report 2016, Symantec
  • 5. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | DBAs are responsible for Database Security • Ensure only users who should get access, can get access • Limit what users and applications can do • Limit from where users and applications can access data • Watch what is happening, and when it happened • Make sure to back things up securely • Minimize attack surface • Ensure encryption keys are protected and managed
  • 6. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | DBAs must meet Security and Regulatory Compliance • Regulations – PCI – DSS: Payment Card Data – HIPAA: Privacy of Health Data – Sarbanes Oxley: Accuracy of Financial Data – EU Data Protection Directive: Protection of Personal Data ● General Data Protection Regulation (GDPR) ● https://en.wikipedia.org/wiki/General_Data_Protection_Regulation – Data Protection Act (UK): Protection of Personal Data • Requirements – Continuous Monitoring (Users, Schema, Backups, etc) – Data Protection (Encryption, Privilege Management, etc.) – Data Retention (Backups, User Activity, etc.) – Data Auditing (User activity, etc.) 6
  • 7. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | MySQL Enterprise Edition • MySQL Enterprise TDE – Data-at-Rest Encryption – Key Management / Security • MySQL Enterprise Encryption – Public/Private Key Cryptography – Asymmetric Encryption – Digital Signatures, Data Validation • MySQL Enterprise Firewall – Block SQL Injection Attacks – Intrusion Detection • MySQL Enterprise Audit – User Activity Auditing, Regulatory Compliance 7 • MySQL Enterprise Monitor – Changes in Database Configurations, Users Permissions, Database Schema, Passwords • MySQL Enterprise Backup – Securing Backups, AES 256 encryption • MySQL Enterprise Authentication – External Authentication Modules – Microsoft AD, Linux PAMs https://www.youtube.com/watch?v=ypQh9H9Rf9w
  • 8. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | MySQL Enterprise Transparent Data Encryption • Improves Security – Added Layer– enforces access controls – Simple to use and manage • Meets Security and Regulatory Requirements – Fit for cases where encryption is required • Healthcare, FiServ, Government, etc. • Secures and Manages Keys – Supports Standard KMIP 1.2 protocols – Supports Oracle Key Vault and other Key Stores
  • 9. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | MySQL Enterprise Transparent Data Encryption Goals 9 • Data at Rest Encryption – Tablespaces, Disks, Storage, OS File system • Transparent to applications and users – No application code, schema or data type changes • Transparent to DBAs – Keys are hidden from DBAs, no configuration changes • Requires Key Management – Protection, rotation, storage, recovery
  • 10. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | 10 MySQL Transparent Data Encryption Encrypted Tablespace Files Tablespace Key Malicious OS User / Hacker Accesses Files Directly Information Access Blocked By Encryption Master Key
  • 11. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | MySQL Enterprise Audit • Auditing for Security & Compliance – FIPS, HIPAA, PCI-DSS, SOX, DISA STIG, … • MySQL built-in logging infrastructure: – general log, error log • MySQL Enterprise Audit – Granularity made for auditing – Can be modified live – Contains additional details – Compatible with Oracle Audit Vault. https://dev.mysql.com/doc/refman/5.7/en/audit-log.html Adds regulatory compliance to MySQL applications (HIPAA, Sarbanes-Oxley, PCI, etc.) Adds regulatory compliance to MySQL applications (HIPAA, Sarbanes-Oxley, PCI, etc.)
  • 12. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | MySQL Enterprise Audit Work Flow 12
  • 13. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | MySQL Enterprise Firewall • Real Time Protection – Queries analyzed and matched against White List • Blocks SQL Injection Attacks – Positive Security Model • Block Suspicious Traffic – Out of Policy Transactions detected & blocked • Learns White List – Automated creation of approved list of SQL command patterns on a per user basis • Transparent – No changes to application required 13 MySQL Enterprise Firewall monitoring Protection from SQL Injection Attacks - #1 Web Application Vulnerability - 77% of Web Sites had vulnerabilities https://dev.mysql.com/doc/refman/5.7/en/firewall.html
  • 14. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | MySQL Enterprise Firewall: Operating Modes 14 ALLOW In Whitelist Blocks SQL Attacks Allows “Matching” SQL Table Table Table BLOCK NOT In Whitelist BLOCK and ALERT DETECT (IDS) NOT In Whitelist ALLOW and ALERT Table Table Table ALLOW – Execute SQL - SQL Matches Whitelist BLOCK – Block the request - Not in Whitelist DETECT – Execute SQL & Alert - Not in Whitelist 11 22 33 Table Table Table Allows SQL & Alerts
  • 15. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | MySQL Enterprise Backup • Online, non-locking backup and recovery – Complete MySQL instance backup (data and config) – Partial backup and restore • Direct Cloud storage backups (S3, etc.) • Incremental backups • Point-in-time recovery • Advanced compressed and encryption • Backup to tape (SBT) • Backup validation • Optimistic backups • Cross-Platform (Windows, Linux, Unix)
  • 16. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | MySQL Enterprise Monitor • Start monitoring MySQL in 10 minutes • Real-time MySQL performance and availability monitoring • Visually find & fix problem queries • Disk monitoring for capacity planning • Cloud friendly architecture – No agents required • Role based access controls 16
  • 17. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | MySQL Enterprise Monitor: Backup • Monitor backup usage and health – Across your entire datacenter • Drill into backup job details – Allowing for easy backup recovery • Supports all backup types • Alerting on significant events – Poor backup performance – Backup job failures – Out of date backups
  • 18. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | MySQL Enterprise Monitor: Security • Enforce MySQL Security Best Practices – Identifies vulnerabilities – Assesses current setup against security hardening policies • Monitoring and Alerting – User accounts and passwords – Firewall usage, effectiveness, and red flags – Backups and data loss security – Schema changes and tracking – Configuration changes and tuning advice • Centralized Secure User Management 18
  • 19. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | MySQL Enterprise Encryption • MySQL encryption functions – Symmetric encryption AES256 (All Editions) – Public-key / asymmetric cryptography – RSA • Key management functions – Generate public and private keys – Key exchange methods: DH • Sign and verify data functions – Cryptographic hashing for digital signing, verification, & validation – RSA,DSA 19 http://dev.mysql.com/doc/refman/5.7/en/enterprise-encryption.html
  • 20. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | MySQL Enterprise Encryption Encryption/Decryption within MySQL Sensitive Data Sensitive Data Private / Public Key Pairs - Generate using MySQL Enterprise Encryption Functions - Use externally generated (e.g. OpenSSL) Encryption Public Key Decryption Private Key Encrypted Data
  • 21. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | MySQL Enterprise Encryption App Encrypts/MySQL Decrypts 21 Encryption Public Key Decryption Private Key Encrypted Data Sensitive Data Applications Sensitive Data
  • 22. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | MySQL Enterprise Encryption App Encrypts / MySQL Stores / MySQL Decrypts 22 Encryption Public Key Decryption Private Key Encrypted Data Sensitive Data Sensitive Data ApplicationsApplications
  • 23. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | MySQL Enterprise Authentication • Built in Authentication – user table stores users and encrypted passwords • X.509 – Server authenticates client certificates • MySQL Native, SHA 256 Password plugin – Native uses SHA1 or plugin with SHA-256 hashing and per user salting for user account passwords. • MySQL Enterprise Authentication – Microsoft Active Directory – Linux PAMs (Pluggable Authentication Modules) • Support LDAP and more • Custom Authentication Integrates MySQL with existing security infrastructures and SOPs Integrates MySQL with existing security infrastructures and SOPs
  • 24. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | MySQL Enterprise Authentication • PAM (Pluggable Authentication Modules) – Access external authentication methods – Standard interface (Unix, LDAP, Kerberos, others) – Proxied and non-proxied users • Windows – Access native Windows services – Authenticate users already logged into Windows (Windows Active Directory) • Pluggable Authentication API
  • 25. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | MySQL Enterprise Edition • MySQL Enterprise TDE – Data-at-Rest Encryption – Key Management / Security • MySQL Enterprise Encryption – Public/Private Key Cryptography – Asymmetric Encryption – Digital Signatures, Data Validation • MySQL Enterprise Firewall – Block SQL Injection Attacks – Intrusion Detection • MySQL Enterprise Audit – User Activity Auditing, Regulatory Compliance 25 • MySQL Enterprise Monitor – Changes in Database Configurations, Users Permissions, Database Schema, Passwords • MySQL Enterprise Backup – Securing Backups, AES 256 encryption • MySQL Enterprise Authentication – External Authentication Modules – Microsoft AD, Linux PAMs
  • 26. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | Thank you!