HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 4.69 Regular checks of database security

S 4.69 Regular checks of database security

Initiation responsibility: Head of IT Section, IT Security Management

Implementation responsibility: Administrators

The database administrator should check the security of the database system at regular intervals, but at least once a month. All of the checks listed below should be performed; checks marked with (*) can usually be automated with appropriate scripts:

Note:

System tables are used to manage the database itself. The items managed in these tables include the individual database objects, database IDs, access rights and allocations of files to storage media. The system tables are generated by the database management system during the creation of the database. In principle, the contents of these tables can be modified with the access rights granted to the database IDs of the administrators. If the data of the system tables is modified with UPDATE-, INSERT- or DELETE instructions, there is a high risk that the database will be destroyed. For this reason, rights to modify the system tables should not be granted. Even read-access should be restricted, as all the information in the database can be viewed via the system tables.

Additional controls:


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
July 1999
home