8. Database Security
8. Database Security
1
NAQIB ULLAH KHAN | Lecturer Computer Science GPGC Bannu
INFORMATION SECURITY BSCS 8TH
HIPAA or regional privacy laws like the European Union's General Data Protection
Regulation (GDPR) could be a major problem with fines in worst cases in excess of many
million dollars for each violation.
Costs for repairing breaches and notifying consumers about them: Alongside
notifying customers of a breach, the company that has been breached is required to cover
the investigation and forensic services such as crisis management, triage repairs to the
affected systems, and much more.
2
NAQIB ULLAH KHAN | Lecturer Computer Science GPGC Bannu
INFORMATION SECURITY BSCS 8TH
3
NAQIB ULLAH KHAN | Lecturer Computer Science GPGC Bannu
INFORMATION SECURITY BSCS 8TH
devices connecting to the network housing the database should be physically secure (in the hands
of the right user only) and subject to security controls at all times.
Encryption
ALL data—including data in the database, and credential data—should be protected with best-
in-class encryption while at rest and in transit. All encryption keys should be handled in
accordance with best-practice guidelines.
Database software security
Always use the latest version of your database management software, and apply all patches as
soon as they are issued.
Application/web server security
Any application or web server that interacts with the database can be a channel for attack and
should be subject to ongoing security testing and best practice management.
Backup security
All backups, copies, or images of the database must be subject to the same (or equally stringent)
security controls as the database itself.
Auditing
Record all logins to the database server and operating system, and log all operations performed
on sensitive data as well. Database security standard audits should be performed regularly.
4
NAQIB ULLAH KHAN | Lecturer Computer Science GPGC Bannu