Data warehouse security involves determining security requirements early, documenting them, and considering how user access, data loads, movements and auditing will be impacted. Security adds performance overhead so auditing should be limited and network transfers require precautions to protect confidentiality and integrity during data movement.
Data warehouse security involves determining security requirements early, documenting them, and considering how user access, data loads, movements and auditing will be impacted. Security adds performance overhead so auditing should be limited and network transfers require precautions to protect confidentiality and integrity during data movement.
Data warehouse security involves determining security requirements early, documenting them, and considering how user access, data loads, movements and auditing will be impacted. Security adds performance overhead so auditing should be limited and network transfers require precautions to protect confidentiality and integrity during data movement.
The implementation of data warehouses (DWs) for the
huge databases has become one of the major needs of the current times. Large organizations having different small databases need a proper integration of their small databases and development of data warehouses. A data warehouse (DW) is a collection of corporate information and data derived from operational systems and external data sources. A data warehouse is designed to support business decisions by allowing data consolidation, analysis and reporting at different aggregate levels. Data is populated into the DW through the processes of extraction, transformation and loading. Security Requirements
Adding security features affect the performance of
the data warehouse, therefore it is important to determine the security requirements as early as possible. It is difficult to add security features after the data warehouse has gone live. The following activities get affected by security measures − User access Data load Data movement Audit Requirements
Auditing is a subset of security, a costly activity. Auditing
can cause heavy overheads on the system. To complete an audit in time, we require more hardware and therefore, it is recommended that wherever possible, auditing should be switched off. Basically the following activities are interesting for auditing Connections
Disconnections
Access to data Change of data
Deletion of Data Documentation
The audit and security requirements need to be
properly documented. This will be treated as a part of justification. This document can contain all the information gathered from − Data classification User classification Network requirements Data movement and storage requirements All auditable actions Network Requirements
Network Requirements. Network requirements are a
further important part of security requirements. For the transfer of data from the source system (usually an operational system) into a data warehouse they must mostly be transmitted over a network. For such a data transfer precautions must be taken, in order to retain the confidentiality and integrity of the data Data Movement
There exist potential security implications while
moving the data. Suppose we need to transfer some restricted data as a flat file to be loaded. When the data is loaded into the data warehouse THANK YOU