DocumentCode :
3262483
Title :
Policy-Based Enforcement of Database Security Configuration through Autonomic Capabilities
Author :
Jabbour, Ghassan ´Gus´ ; Menasee, D.A.
Author_Institution :
George Mason Univ., Fairfax
fYear :
2008
fDate :
16-21 March 2008
Firstpage :
188
Lastpage :
197
Abstract :
Significant emphasis has been placed recently on the hardening of databases and on regular audits of such systems by independent auditors and certified Information Systems Security Officers (ISSO). Data centers hosting sensitive data and mission-critical systems, especially centers that belong to governmental agencies, have been under tremendous pressure to secure their databases in compliance with several security guidelines. Such requirements mandate that each system passes a strict security scan before it is deemed suitable to go into operational mode and that it be subjected to regular audits thereafter. This in turn has been putting tremendous pressure on database administrators who, in many cases, are already overwhelmed by the tasks of installing, properly maintaining, and configuring their systems in a way that provides optimal performance. However, it is becoming extremely challenging, time consuming, and resource intensive to address security demands under tight budgets and timelines. Therefore, it would be advantageous to implement autonomic features into database systems to address some aspects of this challenge. This paper presents a framework that embeds autonomic capabilities into database systems to provide self- protection features in case of unauthorized, inadvertent, or intentional change in security parameters. This is achieved by embedding into the database the capability to compare each security configuration parameter change attempt (or request) with an embedded predefined security policy before allowing or rejecting the change. The paper demonstrates how the proposed framework can be implemented in an Oracle 10g Release 2 database.
Keywords :
database management systems; safety-critical software; security of data; Information Systems Security Officers; Oracle 10g Release 2 database; data centers; database administrators; database security configuration; database systems; embedded predefined security policy; governmental agency; mission-critical systems; policy-based enforcement; security configuration parameter; security guidelines; sensitive data; Condition monitoring; Data engineering; Data security; Database systems; Guidelines; Information security; National security; Resource management; Terrorism; Transaction databases;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Autonomic and Autonomous Systems, 2008. ICAS 2008. Fourth International Conference on
Conference_Location :
Gosier
Print_ISBN :
0-7695-3093-1
Type :
conf
DOI :
10.1109/ICAS.2008.49
Filename :
4488344
Link To Document :
بازگشت