HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 2.126 Creation of a database security concept

S 2.126 Creation of a database security concept

Initiation responsibility: Head of IT Section, IT Security Management

Implementation responsibility: IT Security Management

The long-term keeping of centralised data is of crucial importance for the information management at authorities and corporations. For this reason, it is essential to create a database concept. Such a concept defines the preparations necessary for putting the database into operation, and should always include a database security concept which focuses on the operation of the database.

Inadequate protection of data might result in a loss of confidentiality, availability or integrity. To prevent this, it is absolutely necessary to prepare a detailed database security concept.

To ensure the security of a database, a suitable database management system (DBMS) needs to be employed. To offer effective protection, the database management system needs to meet the following requirements: The DBMS must be

Direct access to the database (e.g. via SQL interpreters such as SQL*Plus) must only be possible for administrative users, in order to prevent manipulation of the data and database objects (e.g. tables and indices). Modifications to database objects must always be controlled via special IDs. For this purpose, the database management system must incorporate a suitable access control and login concept (refer to S 2.129 Controlling Access to Database Information and S 2.128 Controlling Access to a Database System). User IDs which can only perform data modifications via an application must not be granted direct access to the database, while IDs for managing database objects must be granted direct, controlled access.

A database security concept must also settle the following important issues:

Suitable personnel must be available for planning and operating the database system. The time required to run a database system is not to be underestimated. Experience has shown that an analysis of the accumulated log data alone is very time consuming. The database administrator must possess a detailed knowledge of the installed database management software and must be trained appropriately to use it.

Additional controls:


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
July 1999
home