Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 13 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
13
Dung lượng
1,26 MB
Nội dung
SANSInstituteProductReview:
Oracle Audit Vault
March 2012
A SANS Whitepaper
Written by: Tanya Baccam
Product Review:OracleAuditVault PAGE 2
Auditing PAGE 2
Reporting PAGE 4
Alerting PAGE 9
Sponsored by Oracle
Introduction
The number, scale and severity of successful data theft and espionage attacks rose considerably last year,
according to Verizon’s 2011 Data Breach Investigations Report.
1
While 92 percent of these attacks are executed
from outside the enterprise, many attacks made their way into databases, accounting for the majority of
nancial losses over the history of the report. Loss of records due to insider or outsider breach can have a
huge impact on organizations. The average organizational cost of a data breach is $7.2 million, or $214 per
compromised record, according to the most recent Ponemon Annual Study: U.S. Cost of Data Breach.
2
When breaches are related to customer personal data, there is no doubt that an investigation is needed to
apprise regulators, law enforcement and aected consumers. In the case of espionage against private and
government enterprises, investigations are an ongoing part of doing business. Such investigations help close
up vulnerabilities and improve overall security of operations.
When those investigations get down to the database level, how can auditors and responders determine what
databases were impacted, what access and commands were used, and what applications were utilized within
the database? Equally important, how can organizations be alerted to this activity occurring within their
databases in time to take action and prevent an attack from being successful?
This paper is a review of OracleAudit Vault, which provides database log centralization, management, alerting
and reporting across multiple databases. With OracleAudit Vault, investigators and auditors can gather
information about who accessed data, what applications were accessed, what was changed, and more. This
centralization makes it easier to identify and contain potential compromises before they occur, as well as
create reports for compliance and forensics. OracleAuditVault can be set to send alerts, which are critical for a
fast response to stop risky behavior and attacks, and provide out-of-the-box compliance reports and methods
of detecting unauthorized activities.
SANS Analyst Program 1
SANS InstituteProductReview:OracleAudit Vault
1
www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2011_en_xg.pdf
2
www.symantec.com/about/news/release/article.jsp?prid=20110308_01
Product Review:OracleAudit Vault
Most organizations utilize multiple database types and versions that are dicult and time-consuming to audit
and report on individually. OracleAuditVault acts as a secure, centralized database audit trail repository. It
is able to collect audit trails from a variety of databases, including Microsoft SQL Server 2000, 2005, and 2008;
IBM DB2 UDB 8.2 through 9.5 and Sybase ASE 12.5.4 through 15.0.x as well as Oracle databases. These audit
trails can be automatically consolidated and reported on for audit and compliance purposes as well as for
early threat detection. With unied reporting against their disparate databases, organizations can get more
accurate reports and alerts without trying to manually tie events together across database systems.
Oracle AuditVault uses collectors designed to collect data for the database audit trail, operating system audit
trail, and redo logs for Oracle to gather logs from multiple databases. OracleAuditVault centrally and securely
consolidates the audit data, making it easier to search and manage data drawn from multiple databases. The
ability to search and manage audit data from multiple databases can be used for alerting, notifying, following
trends, and for more comprehensive audit/compliance functionality. For example, a secure repository for logs
not only meets specic compliance needs, but also oers more scalability for searching and reporting.
In this functional review of the OracleAuditVault product, we used Oracle Database 11g to generate the audit
data to be collected by OracleAudit Vault, then conducted the review in three phases: Auditing, Reporting,
and Alerting.
Auditing
In centralizing the audit data, database audit trails are stored in OracleAudit Vault, which provides a
secure repository on a separate server. Leaving audit data on the originating system leaves the data open
to alteration. Keeping the repository securely separated from the system is critical to most compliance
requirements that dictate that data cannot be altered. By storing the data in OracleAudit Vault, administrators
can be restricted from the data completely, or simply provided a read-only role so they cannot change the
data inside the repository.
Oracle AuditVault leverages Oracle Database Vault and Oracle Advanced Security to strictly control access
and prevent tampering with the audit data. OracleAuditVault includes Oracle Partitioning to enhance
manageability and performance and can, optionally, be deployed with Oracle Real Application Clusters (RAC)
and Oracle Data Guard for additional scalability and high-availability deployments. OracleAuditVault can also
be deployed on Oracle Exadata and the Oracle Database Appliance.
SANS Analyst Program 2
SANS InstituteProductReview:OracleAudit Vault
Product Review:OracleAuditVault (CONTINUED)
In the rst part of this review, we tested the Audit Policy features against a single Oracle Database 11g. This
involved clicking on the Audit Policy tab and then selecting the database being audited. We retrieved the
policy by clicking the Audit Settings radio button, which provided the link for the database and a summary of
what audit was occurring, as shown in Figure 1.
Figure 1: Summary of Audit Settings
Audit settings were easy to review. They enable users to easily obtain an understanding of what was being
audited and sent to Audit Vault. The In Use column notes the number of active settings from the database
sending records to Audit Vault. The Needed column notes the number of required audit settings the auditor
has specied. And, the Problem column notes the number of audit settings that require attention from the
auditor. Users can follow each of the links to get additional details about how the audit was set up.
SANS Analyst Program 3
SANS InstituteProductReview:OracleAudit Vault
Product Review:OracleAuditVault (CONTINUED)
Reporting
Next, we evaluated the default reports provided. Reports on access, database account management, system
management, entitlement, exceptions, alerts and more are provided by default with Audit Vault. OracleAudit
Vault’s default report options are shown in Figure 2. By clicking on the links, we were able to review the log
reports, which provided basic audit information that might be required of any centralized logging solution
immediately.
Figure 2: Default Reports Provided by Audit Vault
SANS Analyst Program 4
SANS InstituteProductReview:OracleAudit Vault
Product Review:OracleAuditVault (CONTINUED)
Next, we tested what detail the reports would show. For example, to audit specic statements that might
indicate employee abuse, we issued the following queries in the database:
t
update oe.orders set order_total=54 where order_id=2458
tselect count (*) from HR.employees where salary>10000
The results appeared in the Data Access report showing all queries that matched the specied parameters, as
summarized in Figure 3.
Figure 3: Data Access Report under the Audit Reports Tab
SANS Analyst Program 5
SANS InstituteProductReview:OracleAudit Vault
Product Review:OracleAuditVault (CONTINUED)
Oracle AuditVault can be used to query for specic data in order to identify signs of malicious intent or policy
violations. By clicking on the individual records, we could read each of the queries in order to understand
what data had been queried by which users. Figure 4 shows an example of what appears to be an employee
querying for specic employee salary information.
Figure 4: Observing the SELECT Query
The SQL Text in Figure 4 specied the query that was conducted. In this particular case, the user (SYSTEM) had
queried for a count of the employees that make over $10,000. Security personnel can use a number of the
reports to query the audit data being created. By centralizing all the data in a single location, it makes it easier
to investigate and identify potentially suspicious activity. We could also create customized queries based
on specic organizational data concerns such as who is viewing credit cards, Social Security numbers and
other such sensitive data. Of course, all of this is dependent on how auditing is set up in the source database,
because AuditVault reects data that is sent to it.
SANS Analyst Program 6
SANS InstituteProductReview:OracleAudit Vault
Product Review:OracleAuditVault (CONTINUED)
Another type of access report provided is Entitlement reports. Entitlement reports are important for
organizations wanting to protect regulated data and intellectual property from those with privileged user
access to administer systems. We retrieved the entitlement information from our database by going to the
Audit Policy tab and selecting the User Entitlement option for the appropriate Audit Store. Then we clicked
the Retrieve button, as shown in Figure 5.
Figure 5: Retrieving Entitlement Reports Data
SANS Analyst Program 7
SANS InstituteProductReview:OracleAudit Vault
Product Review:OracleAuditVault (CONTINUED)
Once the entitlement information was retrieved, we needed to view the specic data via the Entitlement
reports. We found multiple built-in Entitlement reports for objects, users and systems that cover privileged
user accounts, roles, proles, privileges and more. In this case, we selected the User Privileges report and then
clicked Go. The data was displayed in AuditVault as shown in Figure 6.
Figure 6: Privileged Users Entitlement Report
The Entitlement reports were simply reporting on the data from the databases related to privileges in use
when the snapshot was obtained. Reports can be automatically scheduled and generated for management
and compliance purposes. Auditors can be alerted when reports are available and an attestation process set
in motion for review and approval.
SANS Analyst Program 8
SANS InstituteProductReview:OracleAudit Vault
Product Review:OracleAuditVault (CONTINUED)
Alerting
Reports also provide data on login/logo, startup/shut down, failures, audit settings, changes, system events
and user activity, among other data revealed by database logs. These, and other access and system events,
provide valuable security intelligence that can be fed into OracleAuditVault alert reports, which can be
classied based on level of severity.
Reports can also create an alert in realtime as the data is analyzed. To review this feature, we created an
individual alert whenever a new user was added to the system. To set up the alert, we went to the Audit Policy
tab, chose Alerts, and clicked Create. Figures 7 and 8 show how the alert was congured.
Figure 7: Setting up an Alert
The alert was titled CREATE_USER, and the severity was set to Warning. We selected the audit source type
(ORCLDB) and the specic database to alert on. Each of the alerts can also be placed in a category, so we used
the Account Management category.
The audit event was set to occur when the CREATE USER activity occurs. Additionally, this was done for both
Success and Failure activities.
SANS Analyst Program 9
SANS InstituteProductReview:OracleAudit Vault
[...]... to a given organization Alerts could also be sent via e-mail or even SMS text messages SANS Analyst Program 10 SANSInstituteProductReview:OracleAuditVault Conclusion OracleAuditVault automates the collection and consolidation of database audit data into a central, secure repository so that investigators and auditors can gather information and report on who accessed the data, what applications... occurring SANS Analyst Program 11 SANSInstituteProductReview:OracleAuditVault About the Author Tanya Baccam is a SANS senior instructor as well as a SANS courseware author She is the current author for the SANS Security 509: Securing Oracle Databases course Tanya works for Baccam Consulting, where she provides many security consulting services for clients, including system audits, vulnerability and risk... accessed, and what actions were taken OracleAuditVault can quickly and automatically detect unauthorized activities that violate security and governance policies, thereby stopping perpetrators from covering their tracks Overall, OracleAuditVault was easy to use for analyzing the Oracle Database 11g audit data with which it was reviewed By using the reports provided by Audit Vault, organizations can quickly... database audits, and web application audits Today much of her time is spent on the security of databases and applications within organizations Tanya has also played an integral role in developing multiple business applications She currently holds the CPA, GCFW, GCIH, CISSP, CISM, CISA, and OCP DBA certifications SANS would like to thank its sponsors: SANS Analyst Program 12 SANSInstituteProductReview: Oracle. .. smoother audit processes OracleAuditVault takes a deep approach to collecting and centralizing log data on a variety of database types and schemas As observed during this review, the combined auditing, alerting and reporting in realtime can help address security events quicker This is important to auditors and responders as well security personnel charged with preventing breaches from occurring SANS. . .Product Review:OracleAuditVault (CONTINUED) Once the alert was saved and properly set up, two accounts were created in the database Once the accounts had been created, we went to the Audit Reports tab and selected All Alerts to see whether the alerts had been created The alerts included the... applications She currently holds the CPA, GCFW, GCIH, CISSP, CISM, CISA, and OCP DBA certifications SANS would like to thank its sponsors: SANS Analyst Program 12 SANSInstituteProductReview:OracleAuditVault . the Audit Reports Tab
SANS Analyst Program 5
SANS Institute Product Review: Oracle Audit Vault
Product Review: Oracle Audit Vault (CONTINUED)
Oracle Audit. occurring.
SANS Analyst Program 11
SANS Institute Product Review: Oracle Audit Vault
SANS Analyst Program 12
SANS Institute Product Review: Oracle Audit Vault
About