It Auditing: Using Controls to Protect Information Assets [IT AUDITING -OS N/D]

The set of knowledge around database security is not nearly as vast as the knowledge around network or operating system security. There is, however, enough detail to effectively get the job done.

Below is a list of books written to assist in securing and understanding security in databases. If you do need to run an audit, it is recommended you review one of these books that apply to your specific database platform.

There are many online technical guides as well. The advantages of these guides are that they are often free, more update to date, and can be accessed from anywhere. Of course, they are also typically incomplete and not nearly as comprehensive as the books just listed.

You also can gain practical, hands-on experience by attending a training course on database security. Below is a list of the more popular training courses:

The majority of database vulnerabilities discovered and fixed can be credited to a relatively small subset of security researchers. While some groups, including many of the database vendors, view this work as "malicious," security researchers have done the database security market a huge service, and to top it all off, they have done it free of charge. The database vendors themselves have gone as far as to threaten law suits and revoke partnership agreements, and they have been particularly vocal about telling customers about how security researchers are "evil." The silver lining is that these security researchers are real watchdogs in the community. A good number of the really simple security vulnerabilities have been eliminated or at least reduced because of the work of these security researchers. Of course, the vendors have been dragged into securing and fixing their databases kicking and screaming the whole way.

The most prominent database security research teams include

These websites serve as the most definitive source of vulnerability information on databases. If you have a question about a particular vulnerability, search these locations, and you're likely to find an answer.

As always, never forget the most up-to-date source of database security–Google. Simply search on any term of interest such as "Oracle Exploits" or "Auditing MySQL." Google provides a great list of resources to explore to help you do your job.

Категории