Database Hardening Essay

2015 Words5 Pages

Introduction

Databases have become one of the most power pillars within organizations, regardless of size, industry, or geographical location. Databases are used for the sole purpose of storing and retrieving pertinent information, that in many cases deliver a vital blow to operations in any organization, and for this sole reason, hardware and software make database security a paramount feature that must not be overlooked.
Database security issues cover a wide spectrum; however, this paper will discuss database issues as related to database applications mainly using Oracle’s database application. Embedded security features accompany many database applications; however, often times these features are not properly enabled, therefore, security …show more content…

The term “hardening” is often used to describe the removal of database vulnerabilities, but the term can also apply to computer systems hardware too. In the relationship to data, hardening there is a three step process that is used to evaluate the degree of hardening applied in hardening or securing a database. The primary stages of hardening a database consist of locking down access to resources, disabling unnecessary functions, and applying the principle of least …show more content…

In her article, The 10 Most Common Database Vulnerabilities, Ericka Chickowski (2010) explains that unnecessary enabled database feature rank number four out of ten, of the most vulnerable exposures of entrance into database breaches. The outbox configuration path for database applications vary from application-to-application thus it is not a one size fits all type configuration path that can be assumed by DBA’s, but a clear understanding of what is necessary versus unwanted must be carved out prior to beginning and installation. Planning and understanding what is desired in the operation of database can reduce risk of zero-day attacks, but it can also simplify database patch management, which leads me to the final element of the three primary database hardening

Open Document