DAM Default Security Policies
Security Policies Details:
Security policies enables us to monitor any security violation occurs against defined conditions like
predefined ADC database signatures, DB protocol policies. Based on Security policies we can define
block action for that activity. Example if someone tries to exploit DB vulnerabilities then we can set
the action as Block for the same.
Security Policies give us real time Alerts on Management Console as well as we can send these alerts
to Email, SIEM tool.
a. Network Protocol Validation
This policy enables us to trigger security violation based on if any Protocol validation fails.
Example: Bad IP option length, Bad source IP Address, Invalid IP flag, TCP Bad state, TCP -
Invalid Data Length in Header
b. DB Service Custom
1. FISMA - Unauthorized data access
FISMA: The Federal Information Security Management Act (FISMA) is United States
legislation that defines a comprehensive framework to protect government information,
operations and assets against natural or man-made threats. FISMA was signed into law part
of the Electronic Government Act of 2002
This Policy enable us to monitor and protect unauthorized data access based on classified
object i.e. sensitive information stored in specific table group.
2. FISMA - Unauthorized data modification
This Policy enable us to monitor and protect unauthorized data modification based on
classified object i.e. sensitive information stored in specific table group.
3. Failed Login Attempts
This policy enables us to monitor or block user login if more than 5 failed login attempts
occurs within specified time period. By Default, this policy is enabled.
c. HIPPA compliance based security policy:
The Health Insurance Portability and Accountability Act (HIPAA) sets the standard for
sensitive patient data protection. Companies that deal with protected health information
(PHI) must have physical, network, and process security measures in place and follow them
to ensure HIPAA Compliance.
1. HIPAA - Unauthorized data access
This Policy enable us to monitor and protect unauthorized data access based on classified
object i.e. sensitive information stored in specific table group.
2. HIPAA - Attempt to backup database
This Policy enable us to monitor and protect if someone tries to perform backup database
activities.
3. HIPAA - Unauthorized data modification
This Policy enable us to monitor and protect unauthorized data modification based on
classified object i.e. sensitive information stored in specific table group
d. PCI compliance based Policies:
The Payment Card Industry Data Security Standard is an information security standard for
organizations that handle branded credit cards from the major card schemes. The PCI
Standard is mandated by the card brands and administered by the Payment Card Industry
Security Standards Council.
1. PCI - Violation to a cardholder information table
This policy monitors & block the activity if someone tries to retrieve the card holder
information based on unauthorized sensitive query.
2. PCI - Attempted users and privileges management privileged operations by non-
privileged user
Monitors & block the Users and Privileges Management Commands like creating user,
assigning permission to users, revoking permissions or modifying permissions, altering
roles, profiles, system privileges if performed by non DBA users.
3. PCI - Violations caused by admin
This policy trigger alerts or Block if there is any violation occurs by admin users like
access to back listed tables, Excessive attempts of Database logins, unauthorized
sensitive query and so on.
4. PCI - Existence alerts of Track data
This policy trigger alerts or Block activities like if there are activities to track payment
card track data detection.
5. PCI - Unauthorized access to cardholder information
This policy monitors & block the activity if someone tries to retrieve the card holder
information based on unauthorized sensitive query
6. PCI - Violations to a cardholder information table
This policy monitors & block the activity if someone tries to retrieve the card holder
information based on unauthorized table/operation access.
7. PCI - Failed privileged operations on users and privileges management
This Policy triggers alerts there is SQL exception occurs on privileged operation
performed by privilege users.
8. PCI - Usage of default user accounts
This Policy trigger alerts and block access when non DBA users tries to access the
database
9. PCI - Violations of privileged commands
This policy trigger alerts or block if there is attempt to execute privilege operation
e. SOX Compliance based Policies
In 2002, the United States Congress passed the Sarbanes-Oxley Act (SOX) to protect
shareholders and the general public from accounting errors and fraudulent practices in
enterprises, and to improve the accuracy of corporate disclosures.
1. SOX - Direct changes to data dictionary
This policy trigger alert when there is insert, update, delete query performed on sensitive
tables.
2. SOX - Manual data changes
This policy trigger alerts & block, when there is insert, update, delete query performed on
financial data stored on specific table group.
3. SOX - Data changes by administrator
This policy trigger alert when there is insert, update, delete query performed on sensitive
tables by DBA users.
4. SOX - Unauthorized data changes
This policy trigger alerts & block, when there is insert, update, delete query performed on
financial data stored on specific table group by unauthorized users, source application,
unauthorized sensitive tables.
f. DB Protocol Validation
1. SQL protocol Policy:
This policy helps to generate alert or block activity regarding protocol validation like
Extremely Long SQL Request, SQL protocol - invalid authentication, SQL protocol -
unauthorized operation
2. Oracle SQL Protocol Policy
This policy trigger alert when a bad query was detected as part of a login attempt, only alter
session queries are allowed to be part of a login attempt.
3. SQL Correlation Policy
This policy invokes a violation about excessive login attempt to the database if: from the
same host (IP address) one or more users fail to login, exceeding a user configured
threshold of failed login attempts, at a timeframe of two minutes. This alert may indicate
a brute force attack on the database login mechanism.
OR
invoke a violation about excessive login attempt to the database if: a specific database
user fails to login in the middle of an open session with the database, exceeding a user
configured threshold of failed login attempts, at a timeframe of two minutes, from the
same IP. This alert may indicate a brute force attack on the database login mechanism.
OR
SecureSphere detected a database operation that contains raw track data from
magnetic cards. The PCI standard requires that raw track data is not stored in the
database. This alert denotes a violation of PCI requirements.
4. SQL Protocol Signatures
Recommended Policy for Database Applications – Legacy & Recommended
Signatures Policy for Database Applications
This trigger alert or block activities when there is any exploit happens against predefined
database signature based on patterns and regular expression.
g. Profile Policy
SQL Profile Policy: Trigger alert when there is access to black listed tables,
Attempt to Execute Privileged Operation, Unauthorized Database and Schema, Unauthorized
Host, Unauthorized Query, Unauthorized Source IP Address, Unauthorized Source Application
and so on.
h. DB Service Custom:
1. GDPR - Access to sensitive data
The General Data Protection Regulation 2016/679 is a regulation in EU law on data
protection and privacy for all individuals within the European Union and the European
Economic Area. It also addresses the export of personal data outside the EU and EEA
areas.
Trigger alert and block all activities when there is access to sensitive data like account
number, phone number, address, email id etc.
2. Oracle - Attempt to Create Wrapped Object
Trigger alert and block activity when there is any attempt to create Wrapped objects
query.
3. Oracle - PL/SQL Code Tampering
This policy will trigger alert and block on performing operation insert, delete and update
on PL/SQL code table.
4. Oracle - Attempt to Execute Database Export
This policy will trigger alert or block on using unauthorized source application to export
database.
5. Unauthorized Privileged Operation – Deprecated
This policy trigger alert or block activity when DBA users tries to perform privilege
operation on black listed tables
6. Firewall Policy
This policy trigger alert or block when there is access to DB through non applicative ports
at network layer.