Tips on Implementing Database Auditing to Address Security & Compliance Requirements 

Tips on Implementing Database Auditing to Address Security & Compliance Requirements 

Cover

Implementing Database Security and Auditing (Elsevier Digital Press) is the definitive guide for information security professionals, DBAs and auditors.

Authored by database security expert, IBM Distinguished Engineer, and Guardium CTO Ron Ben Natan, this 413-page book contains hundreds of practical tips and examples for protecting sensitive information and passing audits smoothly.

To sample the valuable information available in this book, you can now download Chapter 12, “Auditing Categories”.  In this chapter, you’ll learn which audit logging trails you need to address key security and compliance requirements, including audit trails for:

  • Database logins and logouts
  • Client information (IP, hostname, source application)
  • Usage outside normal hours
  • Schema changes (DDL activity)
  • Database errors
  • Changes to stored procedures and triggers
  • Changes to privileges and other security attributes
  • Access to sensitive objects (SELECTs)
Vendor:
IBM
Posted:
03 Dec 2010
Published:
03 Dec 2010
Format:
PDF
Length:
28 Page(s)
Type:
Book
Language:
English
Already a Bitpipe member? Login here

Download this Book!

By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.