Top Banner
Top 10 Database Security Threats and How to Stop Them Rob Rachwald Director of Security Strategy
62

Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Jun 30, 2018

Download

Documents

phamkiet
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Top 10 Database Security Threats and How to Stop Them

Rob Rachwald Director of Security Strategy

Page 2: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Imperva Confidential

Page 3: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Data Has Value

Page 4: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Data Has Value

Imperva Confidential

21%

20%

15% 12%

12% 11% 9%

Top 7 Attacks Discussed in Hacker Forums

dos/ddos SQL injection spam brute-force shell code zero-day html injection

Page 5: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Sources of a Data Breach

Malicious Insider 33%

Non malicious

38%

Hacker 29%

Source: 2010 Securosis-Imperva survey of more than 1100 U.S. and multinational IT security practitioners.

https://www.imperva.com/ld/data_security_survey.asp?

Page 6: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Agenda

Imperva Confidential

Top 10 Database Security Threats • Definition • Analysis • Consequence • Mitigation

Page 7: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

CONFIDENTIAL

Excessive Privilege Abuse

Page 8: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Database Top 10 Threats Excessive Privilege Abuse

Imperva Confidential

• Users (or applications) granted database access privileges in excess of “business need-to-know”

Definition

Page 9: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Database Top 10 Threats Excessive Privilege Abuse

Imperva Confidential

• Hard to obtain a true list of required privileges

• Database ACL semantics are too limited

Analysis

• Any “minor” breach becomes a major incident!

• See SQL Injection Consequence

Page 10: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Database Top 10 Threats Excessive Privilege Abuse

Imperva Confidential

Mitigation •More granular ACLs: Query ACLs

•What queries are allowed against the table by this user

•Automatic and Dynamic ACL profiling

Page 11: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Mitigation Query Access Control Lists

Imperva Confidential

Data Leakage via Database Access

•select * from classes where class_id = 101

Normal Usage

•select username, password from students

Privilege Abuse

select * from classes where class_id = ?

Page 12: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Mitigation Query Access Control Lists

Imperva Confidential

Data Leakage via Web Application

•Select * from users where username = ‘john’

and password = ‘smith’

Normal Usage

•Select * from users where username = ‘john’

and password = ‘smith’ or 1=1

Privilege Abuse

select * from students where username = ? and password = ?

Page 13: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

CONFIDENTIAL

Legitimate Privilege Abuse

Imperva Confidential

Page 14: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Database Top 10 Threats Legitimate Privilege Abuse

Imperva Confidential

• Abuse legitimate db privileges for unauthorized purposes

•Definition

Page 15: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Database Top 10 Threats Legitimate Privilege Abuse

Imperva Confidential

• Use simple and available desktop tools

• Retrieve large quantities of data • Store sensitive data locally • Make unauthorized changes

Analysis

• Data theft • Data loss • Embezzlement

Consequence

Page 16: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Database Top 10 Threats Legitimate Privilege Abuse

Mitigation • More granular ACL: Context based ACL • ACL augmented with the context of query

E.g. Client machine, client software, time-of-day

Page 17: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

CONFIDENTIAL

Privilege Elevation

Imperva Confidential

Page 18: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Database Top 10 Threats Privilege Elevation

Imperva Confidential

• Low privileged user exploits database vulnerabilities to gain administrative privileges.

Definition

Page 19: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Database Top 10 Threats Privilege Elevation

Imperva Confidential

Part 1

Page 20: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Database Top 10 Threats Privilege Elevation

Imperva Confidential

Part 2

Page 21: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Database Top 10 Threats Privilege Elevation

Imperva Confidential

Part 3

Page 22: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Database Top 10 Threats Privilege Elevation

Imperva Confidential

Part 4

Page 23: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Database Top 10 Threats Privilege Elevation

Imperva Confidential

Part 5

Page 24: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Database Top 10 Threats Privilege Elevation

Imperva Confidential

• Susceptible objects • Stored procedures and built-in

functions • SQL Statements

• Types of vulnerabilities • Buffer overflow • SQL Injection

Analysis

• Any “minor” breach becomes a major incident

• Built-in access control becomes ineffective

Consequence

Page 25: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Database Top 10 Threats Privilege Elevation

Imperva Confidential

Mitigation • More granular ACL: Query level ACLs • Automatic and dynamic ACL profiling • Monitoring access to vulnerable objects

Page 26: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

CONFIDENTIAL

Weak Audit

Imperva Confidential

« In God I trust. For everyone else, I keep

log files. »

Page 27: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Database Top 10 Threats Weak Audit

Imperva Confidential

• Audit policies that rely on built-in database mechanisms suffer a number of weaknesses

Definition

Page 28: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Database Top 10 Threats Weak Audit

Imperva Confidential

Performance degradation and DBA attention span

Knowing what matters in the mountain of audit data

Limited Granularity

Page 29: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Database Top 10 Threats Weak Audit

Imperva Confidential

Proprietary

Vulnerable to database attacks

No End to End User-Tracking

Page 30: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Database Top 10 Threats Weak Audit

Imperva Confidential

No End-to-End User Tracking

Page 31: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Database Top 10 Threats Weak Audit

Imperva Confidential

• Regulatory problems • Data is not there when you

need it

•Consequence

• Independent audit device Mitigation

Page 32: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

CONFIDENTIAL

SQL Injection

Page 33: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Database Top 10 Threats SQL Injection

Imperva Confidential

• Attacker inserts an unauthorized SQL statement through a SQL data channel

••

Definition

Page 34: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Database Top 10 Threats SQL Injection

Imperva Confidential

• Caused by non-validated input parametersAnalysis input parameters

• Access to unauthorized data • Unauthorized data

manipulation • Denial of service • Privilege elevation

Consequence

Page 35: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Database Top 10 Threats SQL Injection

Imperva Confidential

Mitigation • More granular ACL: Query level ACLs • Automatic and dynamic ACL profiling

Page 36: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

CONFIDENTIAL

Unauthorized Copies of Sensitive Data

Imperva Confidential

Page 37: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Database Top 10 Threats Unauthorized Copies of Sensitive Data

Imperva Confidential

• Sensitive data copied to new databases without any individual held responsible

Definition

Page 38: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Database Top 10 Threats Unauthorized Copies of Sensitive Data

Imperva Confidential

• Databases created without knowledge of security team

• Correct security controls not applied

Analysis

• Sensitive data “Out-of-Scope” of assessment

• Illegal access of data

Consequence

Page 39: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Database Top 10 Threats Unauthorized Copies of Sensitive Data

Imperva Confidential

Mitigation Data Discovery Data Classification

Page 40: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

CONFIDENTIAL

Exploitation of Vulnerable, Mis-Configured Databases

Imperva Confidential

Page 41: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Database Top 10 Threats Exploitation of Vulnerable, Mis-configured Databases

Imperva Confidential

• Vulnerable and unpatched databases, and databases with default accounts and configuration parameters which allow unauthorized access

Definition

Page 42: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Database Top 10 Threats Exploitation of Vulnerable, Mis-configured Databases

Imperva Confidential

• Lengthy database patching process • Default accounts and configuration

parameters • Weak account names and/ or

passwords • Weakened audit parameters

Analysis

• Access to unauthorized data • Unauthorized data manipulation • Privilege elevation • Credential theft

Consequence

Page 43: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Database Top 10 Threats Exploitation of Vulnerable, Mis-configured Databases

Imperva Confidential

Mitigation • Database assessment • Configuration assessment • Virtual patching

Page 44: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

CONFIDENTIAL

Denial of Service

Page 45: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Database Top 10 Threats Denial of Service

Imperva Confidential

• Attacks that affect the availability of information from the database to users

• Attacks that affect the availability of Definition

Page 46: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Database Top 10 Threats Denial of Service

Imperva Confidential

• Specific vulnerabilities • Resource oriented attacks Analysis

• Critical for modern day organizations

• Paralyzing the entire operation of an organization or part of it

Consequence

Page 47: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Database Top 10 Threats Denial of Service

Imperva Confidential

Mitigation • Specific mechanisms for specific vulnerabilities • Resource control mechanisms

•Timing responses •Sizing responses •Connection Control

• Problem detection •Timing latency in system

Page 48: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

CONFIDENTIAL

Database Communication Protocol Vulnerabilities

Imperva Confidential

Page 49: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Database Top 10 Threats Database Communication Protocol Vulnerabilities

Imperva Confidential

• Tampering with db related network protocol messages

•Definition

Page 50: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Database Top 10 Threats Database Communication Protocol Vulnerabilities

Imperva Confidential

• Proprietary network protocols to communicate data and commands

• Complex (and mostly obscure) protocols are prone to security vulnerabilities

•Analysis

Page 51: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

00000000 12 01 00 34 00 00 00 00 00 00 15 00 FF 01 00 1b

00000010 00 01 02 00 1c 00 0c 03 00 28 00 04 ff 08 00 01

00000020 55 00 00 00 4d 53 53 51 4c 53 65 72 76 65 72 00

00000030 a8 07 00 00

Record Size = 52 Field Size = 255

Database Top 10 Threats Database Communication Protocol Vulnerabilities

51

Page 52: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Database Top 10 Threats Database Communication Protocol Vulnerabilities

52

Page 53: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Database Top 10 Threats Database Communication Protocol Vulnerabilities

Imperva Confidential

• Unauthorized data access • Unauthorized data manipulation • Denial of service

Consequence

Page 54: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Database Top 10 Threats Database Communication Protocol Vulnerabilities

Imperva Confidential

Mitigation •Protocol validation engine (addresses even unknown vulnerabilities) •Reactive protocol validation (addresses known vulnerabilities)

Page 55: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

CONFIDENTIAL

Backup Data Exposure

Imperva Confidential

Page 56: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Database Top 10 Threats Backup Data Exposure

Imperva Confidential

• Unencrypted data on Back-up Tapes and Disk

•Definition

Page 57: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Database Top 10 Threats Backup Data Exposure

Imperva Confidential

Page 58: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Database Top 10 Threats Backup Data Exposure

Imperva Confidential

• Many recent incidents where backup media is lost or stolen Analysis

• Exposure of huge amounts of sensitive information

Consequence

Page 59: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Database Top 10 Threats Backup Data Exposure

Imperva Confidential

Mitigation •End to end encryption •Disk encryption •Database encryption •A better solution is yet to be found!

Page 60: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Database Top 10 Threats Summary

Imperva Confidential Imperva ConfidentialImperva Confidential

Page 61: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

Question & Answer

Page 62: Effective Database Security Database Top 10 Threats · Data Has Value Imperva Confidential 21% 20% 15% 12% 12% 11% 9% Top 7 Attacks Discussed in Hacker Forums dos/ddos SQL injection

More Information: www.imperva.com

Blog blog.imperva.com

iTunes/Podcasts www.imperva.com/resources/podcasts.asp

YouTube www.youtube.com/user/ImpervaChannel

Twitter twitter.com/Imperva

Linkedin www.linkedin.com/companies/Imperva

Facebook www.facebook.com/imperva