Top technologies / solutions available for Database Security include the following:

  1. Encryption controls.
  2. Integrity controls.
  3. Data Leakage Prevention (DLP) solutions
  4. Access Controls
  5. Auditing Controls
  6. Backup Solutions.

(Read more:  BYOD Security: From Defining the Requirements to Choosing a Vendor)

Pros - Cons of the different type of available technology / Solutions

  • Encryption& Integrity Controls:

Pros:

Ensures confidentiality and integrity of data.

Cons:

Could be a bottleneck for data availability.

Could be an overhead for DB administration.

  • Data Leakage Prevention (DLP) solutions

Pros:

Facilitates controlled movement of data.

Cons:

Not matured enough to handle large databases.

Generates lots of false positives.

(Read more:  My Key Learning While Implementing Database Security)

  • Access Controls

Pros:

Provides role based access.

Authentication mechanism.

Cons:

Excessive privilege to single person.

Abuse of privilege by authorized person.

Privilege elevation.

Sharing of credentials.

  • Auditing Controls

Pros:

Helps in database activity monitoring.

Cons:

Too many logs difficult to handle.

Backup & retention of the logs add on to the cost.

  • Backup Solutions

Pros:

Provides assurance regarding availability of data.

Tiered backup ensures cost effective solution.

Cons:

Large databases require huge backup infrastructure adding to maintenance and administrative cost.

(Watch more : Top Myths of IPV-6 Security)

Choosing the right technology

 CISO should perform a risk & cost-benefit analysis before choosing any technology for database security. Most of the solutions would not be very cost-effective. It should also be ensured that availability of the data is not hampered through implementation of any controls. Further, the license cost and the administrative costpost implementation should be checked for any database security solution. 

-By Priyadarshi Patnaik, Manager-IT, Maruthi Suzuki India Limited

More:  Want to become a speaker and address the security community?  Click here    

E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform