HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 2.129 Controlling access to database information

S 2.129 Controlling access to database information

Initiation responsibility: Head of IT Section, IT Security Management

Implementation responsibility: Administrators

A number of measures are required to effectively protect the confidentiality and integrity of data in a database. In addition to measures for controlling access to a database system, described in S 2.128 Controlling access to a database system, the following measures are essentially needed for controlling access to database information:

Examples:

  1. In MS Access, different access rights can be granted for the database itself (open/execute, exclusive, administer) as well as for the tables and queries (read data, update data, delete data, add data). These rights can be assigned to various users and user groups. In MS Access, the groups named "administrators" and "users" have been configured by default; the "users" group contains the "read data" and "update data" rights for tables and queries, and the "open/execute" rights for databases. To allow a detailed control of access rights, it is possible to define separate groups which can be assigned different rights. This can be done in the menu titled Extras under the items Access rights and User and group accounts.
  1. In an Oracle database, a group named "Department_1" can be created with the following instruction:
  1. An example of a stored procedure under Oracle with PL/SQL statements is provided in the following:

Additional controls:


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
July 1999
home