You are on page 1of 78

Joe DiPietro – Center of Excellence lead

Kathy Zeidenstein – Guardium Evangelist


21 Feb 2013

IBM InfoSphere Guardium Tech Talk:


Guardium 101

Information Management

© 2013 IBM Corporation


Information Management – InfoSphere Guardium

What we’ll cover today

ƒ What is Guardium and what problems does it address?


ƒ Overview of some capabilities
ƒ Architectural overview and policy primer
ƒ Deployment topologies
ƒ Guardium team and projects
ƒ Whirlwind tour of the UI
ƒ Administration/automation (CLI and API)
ƒ Where to find more information

2 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Information Management – InfoSphere Guardium

Data is the key target for security breaches…..


… and Database Servers Are the Primary Source of Breached Data

ƒ Database servers contain your clients’


most valuable information
– Financial records

WHY?
– Customer information
– Credit card and other account records
– Personally identifiable information
– Patient records
ƒ High volumes of structured data
ƒ Easy to access

2012 Data Breach Report from Verizon Business RISK Team


http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf

“Go where the money is… and go


there often.” - Willie Sutton
3 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Information Management – InfoSphere Guardium

Typical home grown solutions are costly and ineffective

Native
Database Manual
Logging remediation
Native dispatch
Database and tracking
Logging • Pearl/UNIX Scripts/C++
• Scrape and parse the data
• Move to central repository

Native
Database Create Manual
Logging reports review

Native
Database • Significant labor cost to review data and maintain process
Logging • High performance impact on DBMS from native logging
• Not real time
• Does not meet auditor requirements for Separation of Duties
• Audit trail is not secure
• Inconsistent policies enterprise-wide

4 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Information Management – InfoSphere Guardium
50,000 Foot Overview
Constraints Data Security & Risk (DSR) Goals
•Reduced cost across the lifecycle
•Higher quality
•Improved understanding
•Lowered risk
•Improved compliance Increase
Define Life-cycle Protection
Metrics
Classify
Data Growth &
Acquisitions Find Monitor
$
Cost
Enforce DSR Analyze
Increased Risk

Harden Audit
Assess Empower
users
Outsourced &
Contractor Access
Measure
Results
Challenges
Stay out of
Time to $ the papers…
understanding Where is Unauthorized Security Rising
sensitive data? Changes
Threats Costs
5 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Information Management – InfoSphere Guardium

Historical perspective: What is Guardium?

ƒ Guardium, the company, was founded in 2002


–Innovated a non-invasive solution for
continuous database auditing
ƒ Guardium was acquired by IBM in 2009
ƒ The ‘Guardium’ name was extended to other products
in the IBM Information Management portfolio that focus
on data security and protection (that’s how good it is!)

The ‘original’ Guardium InfoSphere Guardium Data Activity Monitoring


and our focus for InfoSphere Guardium Vulnerability Assessment
today’s talk InfoSphere Guardium Data Encryption
InfoSphere Guardium Data Redaction

6 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Information Management – InfoSphere Guardium

And where does it fit?

InfoSphere Information Governance

7 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Information Management – InfoSphere Guardium

What we’ll cover today

ƒ What is Guardium and what problems does it address?


ƒ Overview of some capabilities
ƒ Architectural overview and policy primer
ƒ Deployment topologies
ƒ Guardium team and projects
ƒ Whirlwind tour of the UI
ƒ Administration/automation (CLI and API)
ƒ Where to find more information

8 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Information Management – InfoSphere Guardium

Products and capabilities

InfoSphere Guardium Data InfoSphere Guardium


Activity Monitoring (DAM) Vulnerability Assessment (VA)
For data security & compliance Best practice & secure configuration
• Data discovery and classification • Configuration assessment

• Real-time activity monitoring • Vulnerability assessments

• Application end-user identification • Vulnerability reports

• Security alerts and audit reports • Suggested remediation steps

• Compliance workflow • Data Protection Subscription

• Blocking unauthorized access •Configuration audit system (CAS)


Hardware, virtual or
• Masking sensitive data software appliances •Entitlement reporting (VA Advanced)

Central Management & Aggregation


Manage and use large deployments as a single federated system
9 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Information Management – InfoSphere Guardium

Discovery and Classification Included with DAM


Find cardholder data Included with VA

Guardium Agentless
Network Scan
10.10.9.*
No Agent
ƒ Database Discovery
ƒ Classifier (Sensitive Data Discovery)
ƒ Vulnerability Assessment (VA)
ƒ Entitlement reports

Agent Required
ƒ Auditing
ƒ Real time alerting
ƒ Blocking
ƒ Dynamic Data Masking (DDM)
© 2013 IBM Corporation
Information Management – InfoSphere Guardium

Discovery and Classification


Find cardholder data

When sensitive data is discovered:


•Alert and log
•Automatically update security
policies
Actions •Automatically update compliance
reports

© 2013 IBM Corporation


Information Management – InfoSphere Guardium

Discovery and Classification


Find cardholder data

Guardium Agentless
Network Scan
10.10.9.*

Table and column of


location of sensitive data

12 © 2013 IBM Corporation


Information Management – InfoSphere Guardium

Vulnerability and Configuration Assessment Architecture


Included with VA
ƒ Based on industry standards: DISA STIG and CIS Benchmark
ƒ Extensive library of pre-built tests for all supported platforms
ƒ Customizable tests to address your specific corporate security policies
– Via custom scripts, SQL queries, environment variables, etc.

ƒ Combination of tests ensures comprehensive coverage:


1.Database settings
2.Operating system
3.Observed behavior Tests
• Permissions
DB Tier • Roles
(Oracle, SQL • Configurations
Server, DB2,
Informix, Sybase, • Versions
MySQL, Netezza,
Teradata)
• Custom tests
Database
User Activity
OS Tier • Configuration files
(Windows, • Environment variables
Solaris, AIX, HP- • Registry settings
UX, Linux, z/OS)
• Custom tests

13 © 2013 IBM Corporation


Information Management – InfoSphere Guardium

Guardium Assessment Results

Overall score

Are you
making
Detailed progress?
scoring matrix

Recommendations
on how to fix the
failure

14 © 2013 IBM Corporation


Information Management – InfoSphere Guardium

Continuous Database Activity Monitoring Included with DAM

• PCI and SOX accelerators included with DAM (guidance, reports, and
more)
• Application monitoring (SAP, EBS, Siebel, Peoplesoft, Cognos, etc)
15
• Authorized application access only © 2013 IBM Corporation
Information Management – InfoSphere Guardium

Fine-Grained Policies with Real-Time Alerts Included with DAM

EmployeeTable
SELECT

Application Database
Server Server
10.10.9.244 10.10.9.56

Heterogeneous
support including
System z and
IBM i data servers

16 © 2013 IBM Corporation


Information Management – InfoSphere Guardium

S-GATE: Blocking Access Included with DAM


Advanced
“DBMS software does not protect data from administrators, so DBAs today have the ability to
view or steal confidential data stored in a database.” Forrester, “Database Security: Market Overview,” Feb. 2009

Application Servers
SQL
Privileged
Users Oracle, DB2,
Issue SQL MySQL, Sybase,
etc.
S-GATE
S-GATE
Hold SQL

Outsourced DBA Connection terminated

Check Policy
On Appliance
Policy Violation:
Drop Connection

Session Terminated
17 © 2013 IBM Corporation
Information Management – InfoSphere Guardium

Mask Unauthorized Access To Sensitive Information Included with DAM


Cross-DBMS Dynamic Data Masking (DDM) Advanced
9 Cross-DBMS policies
Application Servers
SQL 9 Mask sensitive data
Oracle, DB2,
Unauthorized MySQL, 9 No database changes
Users Sybase, etc.
9 No application changes
Issue SQL
S-TAP
S-TAP Actual data
stored in the
Outsourced DBA database

Redact and Mask


Sensitive Data

User view of the data in the database

18 © 2013 IBM Corporation


Information Management – InfoSphere Guardium

InfoSphere Guardium Data Encryption


Clear Text Block-Level MetaClear

File Name: Jsmith.doc fAiwD7nb$ Name: Jsmith.doc


System Created: 6/4/99 Nkxchsu^j2 Created: 6/4/99

Metadata
Modified: 8/15/02 3nSJis*jmSL Modified: 8/15/02

Name: J Smith dfjdNk%(Amg dfjdNk%(Amg


CCN:60115793892 8nGmwlNskd 9f 8nGmwlNskd 9f
File Data Exp Date: 04/04 Nd&9Dm*Ndd
xIu2Ks0BKsjd
Nd&9Dm*Ndd
Bal: $5,145,789 xIu2Ks0BKsjd
SSN: 514-73-8970 Nac0&6mKcoS Nac0&6mKcoS
qCio9M*sdopF qCio9M*sdopF
File File File File
Data Data Data Data

• Protects Sensitive Information Without Disrupting Data Management


• High-Performance Encryption
• Root Access Control
• Data Access as an Intended Privilege

© 2013 IBM Corporation


Information Management – InfoSphere Guardium

Entitlement Reporting: Included with VA


Reducing the Cost of Managing User Rights Advanced
ƒ Provides a simple means of aggregating and
understanding entitlement information
–Scans and collects information on a
scheduled basis, including group and role
information
ƒ Out-of-the box reports for common views
–Report writer for custom views
ƒ Integrated with all other modules including
workflow, etc.

Eliminates resource intensive and error prone process


of manually examining each database and stepping
through roles
© 2013 IBM Corporation
Information Management – InfoSphere Guardium

DB2 Entitlement Reports

© 2013 IBM Corporation


Information Management – InfoSphere Guardium

Heterogeneous Database Entitlement Reports – Oracle Sample Reports

© 2013 IBM Corporation


Information Management – InfoSphere Guardium

Audit Process Overview Included with DAM


Included with VA
ƒ Create a process to review entitlement reports and new connections to the database
ƒ Use separation of duties to validate the process

Entitlement Report can be


used to identify “new”
connections to the database

© 2013 IBM Corporation


Information Management – InfoSphere Guardium

Audit Process Overview

Business Owner approves or rejects Guardium Admin only makes changes


new connections to database for “authorized” connections

Business Owner Information Security Guardium Admin


(PCI Role) (InfoSec Role) (Admin Role)
Information Security confirms
Business Owner recommendation

If there are no new connections, report will


be empty and automatically approved…
(ie. Don’t waste anyone’s time)

© 2013 IBM Corporation


Information Management – InfoSphere Guardium

Audit Process Trail Created For Authorization Process

Here are the


connections
that need to be
approved.

© 2013 IBM Corporation


Information Management – InfoSphere Guardium

Audit Process Trail Created For Authorization Process

Reviewer can
add comments.

© 2013 IBM Corporation


Information Management – InfoSphere Guardium

Use Guardium API linkage with Reports to Automatically Add Connections

Four
connections
added to
group
© 2013 IBM Corporation
Information Management – InfoSphere Guardium

What we’ll cover today

ƒ What is Guardium and what problems does it address?


ƒ Overview of some capabilities
ƒ Architectural overview and policy primer
ƒ Deployment topologies
ƒ Guardium team and projects
ƒ Whirlwind tour of the UI
ƒ Administration/automation (CLI and API)
ƒ Where to find more information

28 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Information Management – InfoSphere Guardium

InfoSphere Guardium Architecture Application Servers


(SAP, Oracle EBS,
Custom Apps, etc)

Role Based GUI


Provides access to
audit data
(Information Security,
Auditors, DBA, etc)
S-TAP – Software Tap
(Light weight probe which
Guardium
copies information to the appliance) Appliance
Secure Audit
Records

Agent Required ƒ Support Separation of Duties


ƒ Auditing ƒ Collect and normalize data for
ƒ Real time alerting efficient storage
ƒ Blocking
ƒ Dynamic Data Masking (DDM) ƒ Single repository for all audit data
ƒ Data is immediately available and
highly secure

29 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Information Management – InfoSphere Guardium

What Can Be Audited?


Key Message
ƒ Information is based on a database session
Typical Database
Session ƒ Understand what needs to be audited

Database Server
Activity from the DB client Activity from the DB
to the DB server Server to the DB Client

Client/Server network Failed Login What needs to be audited?


connections Messages ƒ Session information
Session starts (log in) SQL Errors ƒ User information
SQL Requests ƒ SQL statements
Result sets
(commands)
ƒ Responses
Session ends (log out) – Failed Events
– Result Sets

Database Client

30 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Information Management – InfoSphere Guardium

Capture and Parsing Overview Information is copied


and sent to appliance
Select name, cardid Guardium
from Creditcard
Collector
S-TAP
Analysis
engine Parse SQL Select name, cardid
Database
Statements from Creditcard
Server
Select name, cardid
from Creditcard Read Only
Hardened Repository
(no direct access)
Sessions Commands

Joe Select

Joe Database
SQL Columns/Fields
Client Objects
Select name, cardid name
How do you get access from Creditcard Creditcard cardid
to this information?
31 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Information Management – InfoSphere Guardium

Reports/Query Builder
Entities and Attributes
Query builder for reports
Read Only
Hardened Repository
(no direct access)
Sessions Commands Exceptions
Returned Entities and
Data
attributes

SQL Columns/Fields
Objects

Parsed, analyzed,
logged in repository
Traffic is filtered at
Network Packet different stages
1.1.1.1 23345 10.12.1.12 1433 select name, cardid from Creditcard; based on policy
rules
32 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Information Management – InfoSphere Guardium

Policy Primer - Accessing the Policy Builder

33 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Information Management – InfoSphere Guardium

3 Types of Policy Rules

Exception (SQL Errors and more)


3
Result Set

2
SQL Query 1
Database Server

There are three types of rules:


1. An access rule applies to client requests
2. An extrusion rule evaluates data returned by the server
3. An exception rule evaluates exceptions returned by the server

34 © 2013 IBM Corporation


Information Management – InfoSphere Guardium

SAP PCI Policy Overview

35 © 2013 IBM Corporation


Information Management – InfoSphere Guardium

One Unauthorized Access Violates 4 Security Rules

36 © 2013 IBM Corporation


Information Management – InfoSphere Guardium

Quiz question!

What are the three types of policy rules? Pick


the best answer from below:
1. Masking, extrusion, access
2. Access, PCI, compliance
3. Access, exception, extrusion
4. None of the above

37 © 2013 IBM Corporation


Information Management – InfoSphere Guardium

What we’ll cover today

ƒ What is Guardium and what problems does it address?


ƒ Overview of some capabilities
ƒ Architectural overview and policy primer
ƒ Deployment topologies
ƒ Guardium team and projects
ƒ Whirlwind tour of the UI
ƒ Administration/automation (CLI and API)
ƒ Where to find more information

38 21 Feb 2013 © 2013 IBM Corporation


IBM InfoSphere Guardium Tech Talk
Information Management – InfoSphere Guardium

Deployment flexibility and scalability


Central Manager (CM) contains central
location for policies and definitions for
Standalone unit the entire federated system
Collector Central Manager and
Aggregator (“Manager unit”)
Central Manager

Aggregator Aggregator
Collectors
(“Managed units”)

Collectors Collectors

“Aggregation”=Nightly audit
data uploaded from Collectors
Central Manager provides
Built in redundancy for audit “Enterprise Views”
data (collector and aggregator)

39 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Information Management – InfoSphere Guardium

Central Manager Included with CM/AGG


Admin Console -> System
Need same shared secret to register

40 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Information Management – InfoSphere Guardium

Central Manager Included with CM/AGG


Admin Console -> System
Need same shared secret to register

Install Policy
Patch Distribution
Registration
etc
41 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Information Management – InfoSphere Guardium

Included with CM/AGG

42 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Information Management – InfoSphere Guardium

Enterprise S-TAP View Included with CM/AGG

43 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Information Management – InfoSphere Guardium

Scale from small to VERY large

ƒ Enterprise Architecture with


dynamic scalability
ƒ Non-invasive/disruptive,
cross-platform architecture
ƒ No environment changes

Integration with:
•LDAP
•SIEM
•Change Mgt
•Archiving
•and more…

44 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Information Management – InfoSphere Guardium

Failover, Load Balancing, and “Grid”

1. Basic 3. Load Balancing

2. Failover

45 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Information Management – InfoSphere Guardium

Failover, Load Balancing, and “Grid”

1. Basic 3. Load Balancing

Same
collector
settings
2. Failover 4. Grid for all
s-taps

sqlguard_ip=virtual IP
sqlguard_port=16016
primary=1

Test with Load


Balancers from
F5 & Cisco

46 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Information Management – InfoSphere Guardium

Failover, Load Balancing, and “Grid”


http://www.f5.com/pdf/deployment-guides/ibm-guardium-dg.pdf
1. Basic 3. Load Balancing

Same
collector
settings
2. Failover 4. Grid for all
s-taps

sqlguard_ip=virtual IP
sqlguard_port=16016
primary=1

Test with Load


Balancers from
F5 & Cisco

47 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Information Management – InfoSphere Guardium

Quiz question!

If you need to create corporate audit reports


as well as manage a large number of
Collectors, which configuration do you
need? Pick BEST answer:
1. Central Manager directly managing Collectors
2. Aggregator connected to Collectors
3. A web application to roll up your reports
4. A Central Manager and one or more
Aggregators

© 2013 IBM Corporation


Information Management – InfoSphere Guardium

What we’ll cover today

ƒ What is Guardium and what problems does it address?


ƒ Overview of some capabilities
ƒ Architectural overview and policy primer
ƒ Deployment topologies
ƒ Guardium team and projects
ƒ Whirlwind tour of the UI
ƒ Administration/automation (CLI and API)
ƒ Where to find more information?

49 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Information Management – InfoSphere Guardium

Roles and responsibilities – The TEAM

Access Provide DBA level


control understanding and
review
Guardium
Access Manager Database
Advisor

Data Provide application


collection and level understanding
reporting and review
Guardium Admin Application
Advisor

System health Identify requirements


for compliance

Guardium System Compliance


Administrator Advisor

50 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Information Management – InfoSphere Guardium

Getting started on a monitoring project

0.
0. Education
Education and
and 1.
1. Installation
Installation 2.
2. Appliance
Appliance
training
training Planning
Planning Installation
Installation

‰ Project Manager ‰ Project Manager


‰ DBA Advisor ‰ Network Administrator
‰ Security ‰ Guardium Administrator
‰ Auditor
‰ Network Admin
‰ System Admin
‰ Guardium administrator

3.
3. S-TAP
S-TAP agent
agent 4.
4. Monitoring
Monitoring 5.
5. Guardium
Guardium
Installation
Installation Requirements
Requirements Operations
Operations

‰ Guardium Administrator ‰ Those responsible for ‰ IT infrastructure


‰ DBA Advisor monitoring, security and ‰ Guardium SysAdmin
‰ Database server system review of the logged data. ‰ Disk storage Admin
administrator This typically includes:
‰ Information Security
‰ Audit
‰ DBA Advisor
‰ Data Stewards/Architects

51 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Information Management – InfoSphere Guardium

What we’ll cover today

ƒ What is Guardium and what problems does it address?


ƒ Overview of some capabilities
ƒ Architectural overview and policy primer
ƒ Deployment topologies
ƒ Guardium team and projects
ƒ Whirlwind tour of the UI
ƒ Administration/automation (CLI and API)
ƒ Where to find more information?

52 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Information Management – InfoSphere Guardium

Default user view Search,


Map and
Navigate Help
tabs
Navigate
menus

Portlets

53 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Information Management – InfoSphere Guardium

Default user view – Quick Start


One-page quick start to generate and install a policy, define
vulnerability tests (if licensed) and define an audit process.

Portlets

54 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Information Management – InfoSphere Guardium

Default user view – Quick Start


Governance, risk and compliance heat map

Double-click for
detailed reports

55 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Information Management – InfoSphere Guardium

Default user view VA and


configuration
Build policies, DB discovery and access (if
reports classification licensed)
Create audit process
workflows…

Create policies,
alerts and see policy
violations

56 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Information Management – InfoSphere Guardium

Tip: Use Portal Map or Portal Search to quickly find what you need
Map

Search

Someone’s custom portlet

57 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Information Management – InfoSphere Guardium

Help System

The Appendices
Help book has
useful reference
info such as APIs,
entities and
attributes, etc

Download a
help pdf for
offline reading

58 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Information Management – InfoSphere Guardium

Default admin user view


Create groups,
policies,
workflows…. Reports for daily Policy violations and
monitoring alerts here
Configuration

Double-click
for tabular
report

59 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Information Management – InfoSphere Guardium

Default access manager


Add users Configure
and roles data-level
security

ƒ Granularity and flexibility in roles


ƒ Ability to create your own roles
ƒ Ability to create user hierarchies to ensure
automatic filtering of results based on user’s
database

60 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Information Management – InfoSphere Guardium

What we’ll cover today

ƒ What is Guardium and what problems does it address?


ƒ Overview of some capabilities
ƒ Architectural overview and policy primer
ƒ Deployment topologies
ƒ Guardium team and projects
ƒ Whirlwind tour of the UI
ƒ Administration/automation (CLI and API)
ƒ Where to find more information

61 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Information Management – InfoSphere Guardium

Command Line Interface (CLI) and APIs (GuardAPI)

ƒ Command line interface used for configuration, troubleshooting and


management of Guardium System
ƒ The extensive set of GuardAPIs can be used by a user with either admin
or CLI Role for automation of repetitive tasks or for ongoing maintenance
– Creating datasources, adding user/members to groups, connection profiling, entitlement
report automation and more
– Many are invokable from reports in the UI!

ƒ GuardAPIs are documented in the Appendices help book or from the Cli
–To see a list of all grdapi commands, enter:
CLI> grdapi
–To see the parameters for a particular command:
CLI> grdapi list_entry_location --help=true

62 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Information Management – InfoSphere Guardium

APIs enable automation and ease maintenance


Example: Add a member to a group from a report

Invoke API
to add
member to
This example shows how you can use group
the API to add an ‘authorized’
MapReduce job to a group so it won’t
appear in this report anymore.

63 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Information Management – InfoSphere Guardium

APIs enable automation and ease maintenance


Example: Add a member to a group from a script
-- Create group and members of the group
grdapi create_group desc=SensitiveObjectsMonitored type=objects appid=Public
owner=admin
grdapi create_member_to_group_by_desc desc=SensitiveObjectsMonitored
member=creditcard
grdapi create_member_to_group_by_desc desc="Cardholder Objects" member=creditcard
grdapi create_member_to_group_by_desc desc="Authorized Client IPs"
member="10.10.9.56"
grdapi create_member_to_group_by_desc desc="Authorized Client IPs"
member="10.10.9.251"

This example shows how you can use


the API to quickly get up and running
with groups for PCI compliance.

64 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Information Management – InfoSphere Guardium

What we’ll cover today

ƒ What is Guardium and what problems does it address?


ƒ Overview of some capabilities
ƒ Architectural overview and policy primer
ƒ Deployment topologies
ƒ Guardium team and projects
ƒ Whirlwind tour of the UI
ƒ Administration/automation (CLI and API)
ƒ Where to find more information

65 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Information Management – InfoSphere Guardium

Information and training

ƒ InfoSphere Guardium YouTube Channel – includes overviews and technical demos


ƒ InfoSphere Guardium newsletter
ƒ developerWorks forum (very active)
ƒ Guardium DAM User Group on Linked-In (very active)
ƒ Community on developerWorks (includes content and links to a myriad of sources, articles, etc)
ƒ Guardium Info Center (Installation, System Z S-TAPs and some how-tos, more to come)
ƒ Technical training courses (classroom and self-paced)
ƒ Business Partner bootcamps

Hands on! Ask your IBM sales rep about


upcoming Proof of Technologies. For example:
March 12, KC, MO
March 19, Tulsa, OK

66 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Information Management – InfoSphere Guardium

Next Guardium Tech Talk

Next tech talk: Roadmap to a successful V9 upgrade


Speakers: Vlad Langman and Abdiel Santos
Date &Time: Wednesday March 14, 2013
11:30 AM Eastern
Register here: http://bit.ly/Vkc8g2

ƒ Link to more information about this and upcoming tech talks can be found on the InfoSpere
Guardium developerWorks community: http://ibm.co/Wh9x0o
ƒ Please submit a comment on this page for ideas for tech talk topics.

67 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Information Management – InfoSphere Guardium

Dziękuję
Polish
Traditional Chinese
Thai

Gracias Spanish

Merci
French

Russian

Arabic

Obrigado
Brazilian Portuguese
Danke
German

Tack
Swedish

Simplified Chinese

Japanese
Grazie
Italian

68 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Backup

Information Management

© 2013 IBM Corporation


Information Management – InfoSphere Guardium

Discovering Sensitive Data in Databases


• Discover database instances on network
• Catalog Search: Search the database
catalog for table or column name
– Example: Search for tables where
column name is like “%card%”
• Search by Permission: Search for the types
of access that have been granted to users
or roles
• Search for Data: Match specific values or
patterns in the data
– Example: Search for objects matching
guardium://CREDIT_CARD (a built-in
pattern defining various credit card
patterns)
• Search for Unstructured Data: Match
specific values or patterns in an
unstructured data file (CSV, Text, HTTP,
70 HTTPS, Samba) © 2013 IBM Corporation
Information Management – InfoSphere Guardium

Identifying Fraud at the Application Layer

Joe Marc

ƒ Issue: Application server uses generic service account to access DB


– Doesn’t identify who initiated transaction (connection
pooling)
ƒ Solution: Guardium tracks access to application user associated with
specific SQL commands
– Out-of-the-box support for all major enterprise applications
(Oracle EBS, PeopleSoft, SAP, Siebel, Business Objects,
User Cognos…) and custom applications (WebSphere,
WebLogic, ….)
– Deterministic vs. time-based “best guess”
– No changes to applications
Application Database
Server Server

71 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Information Management – InfoSphere Guardium

Enforcing Change Controls + Integrating with Change Management


Systems
Identify
unauthorized
Tag DBA actions changes (red)
with ticket ID or changes with
invalid ticket IDs
Compare observed
changes to
approved changes

72 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Information Management – InfoSphere Guardium

Monitoring Data Leakage from High-Value Databases


Should my customer service rep view 99 records in an hour?

Is this
normal?

What exactly
did Joe see?

73 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Information Management – InfoSphere Guardium

Tracking privileged users who switch accounts Privileged


User
1. Joe logs in to User activity

Linux
2. He switches to
the Oracle
shell account
3. Logs into
Oracle as
system
4. Gives himself a
big bonus! What InfoSphere Guardium shows you:

74 21 Feb 2013 IBM InfoSphere Guardium Tech Talk © 2013 IBM Corporation
Information Management – InfoSphere Guardium

Query Based Test Results


ƒ Test the database to validate that all triggers are actually owned by the table owner
ƒ SQL = Select count(*) from all_triggers where owner<> table_owner
ƒ If the count exceeds a threshold of 7 items, fail the test

75 © 2013 IBM Corporation


Information Management – InfoSphere Guardium

SAP PreDefined PCI Policy Rule (Access Rule)


Track - PCI CardHolder Data

76 © 2013 IBM Corporation


Information Management – InfoSphere Guardium

Unauthorized Users Accessing Credit Cards -- Guardium Verifies


Credit Card Validity With Luhn Algorithm

© 2013 IBM Corporation


Information Management – InfoSphere Guardium

PCI Track Data…


Guardium Tracks PCI “Track Data”

ƒ DO NOT store the full contents of


any track from the magnetic stripe
ƒ DO NOT store the card-validation
code (three-digit or four-digit value
printed on the front or back of a
payment card (e.g., CVV2 and
CVC2 data))
ƒ DO NOT store the PIN Verification
Value (PVV)

78 © 2013 IBM Corporation

You might also like