首页> 外文期刊>Information Systems Control Journal >Database Security, Compliance and Audit
【24h】

Database Security, Compliance and Audit

机译:数据库安全性,合规性和审计

获取原文
获取原文并翻译 | 示例
获取外文期刊封面目录资料

摘要

To summarize, access protection begins with understanding who accesses the data, for what purposes and with what permission. The set of controls relevant to database access management is broad and complex, and touches many areas of the business and technology. The way to solve a set of problems as large and complex as information access protection is to establish priorities and begin solving the most significant problems first, one at a time, within an overall plan to provide and maintain a reasonable level of risk and substantial compliance with requirements. At the core of business controls over information is the need to protect data access to ensure accountability, privacy and data integrity. The simple goal is to ensure only authorized individuals have access and all access is monitored. To limit access to only people whose jobs require it, access protection must apply to identifying the sensitive data elements; the methods for managing user credentials and access rights; and the records of who accessed what, when and what they did with it. A single source for recording all access to the database is an efficient approach to controls, assurance and auditing, and can be significantly less demanding than the effort needed to manage or audit controls based in multiple locations. When controls are centralized in a single source, they facilitate the ability to verify compatibility across multiple operational areas. One may hear that the DBMS controls cannot be activated because they impact performance too severely. And, while that may be true, the alternative controls described above can provide a reliable centralized access control and can do it efficiently without negatively impacting system performance.
机译:总而言之,访问保护始于了解谁访问数据,出于什么目的和获得什么许可。与数据库访问管理相关的控件集广泛而复杂,涉及业务和技术的许多领域。解决一系列问题(如信息访问保护)的方法是在总体计划中确定优先级并首先一次解决最重要的问题,以提供并保持合理的风险水平和实质性合规性与要求。对信息进行业务控制的核心是需要保护数据访问,以确保责任制,隐私和数据完整性。简单的目标是确保只有授权人员才能访问,并且所有访问都受到监控。为了将访问权限限制为仅对其工作有此要求的人员,访问保护必须应用于识别敏感数据元素;管理用户凭证和访问权限的方法;以及谁访问了哪些内容,何时以及执行了哪些操作的记录。记录所有对数据库访问的单一来源是控制,保证和审计的有效方法,并且比在多个位置管理或审计控制所需的工作量要少得多。当控件集中在一个源中时,它们将有助于验证跨多个操作区域的兼容性。可能有人听说无法激活DBMS控件,因为它们对性能的影响太大。并且,尽管这可能是正确的,但是上述替代控件可以提供可靠的集中式访问控制,并且可以高效地执行它,而不会负面影响系统性能。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号