Tips on Implementing Database Auditing to Address Security & Compliance Requirements 

Tips on Implementing Database Auditing to Address Security & Compliance Requirements 

Cover

Implementing Database Security and Auditing (Elsevier Digital Press) is the definitive guide for information security professionals, DBAs and auditors.

Authored by database security expert, IBM Distinguished Engineer, and Guardium CTO Ron Ben Natan, this 413-page book contains hundreds of practical tips and examples for protecting sensitive information and passing audits smoothly.

To sample the valuable information available in this book, you can now download Chapter 12, “Auditing Categories”.  In this chapter, you’ll learn which audit logging trails you need to address key security and compliance requirements, including audit trails for:

  • Database logins and logouts
  • Client information (IP, hostname, source application)
  • Usage outside normal hours
  • Schema changes (DDL activity)
  • Database errors
  • Changes to stored procedures and triggers
  • Changes to privileges and other security attributes
  • Access to sensitive objects (SELECTs)
Vendor:
IBM
Posted:
03 Dec 2010
Published:
03 Dec 2010
Format:
PDF
Length:
28 Page(s)
Type:
Book
Language:
English
Already a Bitpipe member? Login here

Download this Book!

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy