Lecture Database security and auditing - Protecting data integrity and accessibility - Chapter 8: Application Data Auditing presentation of content Create and implement Oracle triggers, create and implement SQL Server triggers, define and implement Oracle fine-grained auditing,... Mời các bạn cùng tham khảo.
Trang 1Database Security and Auditing: Protecting Data Integrity and Accessibility
Chapter 8 Application Data Auditing
Trang 2• Understand the difference between the auditing architecture of DML Action Auditing Architecture and DML changes
• Create and implement Oracle triggers
• Create and implement SQL Server triggers
• Define and implement Oracle fine-grained
auditing
Trang 3Database Security and Auditing 3
Objectives (continued)
• Create a DML statement audit trail for Oracle and SQL Server
• Generate a data manipulation history
• Implement a DML statement auditing using a repository
Trang 4Objectives (continued)
• Understand the importance and the
implementation of application errors auditing in Oracle
• Implement Oracle PL/SQL procedure
authorization
Trang 5Database Security and Auditing 5
DML Action Auditing Architecture
• Data Manipulation Language (DML): companies use auditing architecture for DML changes
• DML changes can be performed on two levels:
– Row level
– Column level
• Fine-grained auditing (FGA)
Trang 6DML Action Auditing Architecture
(continued)
Trang 7Database Security and Auditing 7
DML Action Auditing Architecture
(continued)
Trang 8Oracle Triggers
• Stored PL/SQL procedure executed whenever:
– DML operation occurs
– Specific database event occurs
• Six DML events (trigger timings): INSERT,
UPDATE, and DELETE
• Purposes:
– Audits, controlling invalid data
– Implementing business rules, generating values
Trang 9Database Security and Auditing 9
Oracle Triggers (continued)
Trang 10Oracle Triggers (continued)
• CREATE TRIGGER
• Executed in a specific order:
– STATEMENT LEVEL triggers before COLUMN LEVEL triggers
– BEFORE triggers before AFTER triggers
• USER_TRIGGERS data dictionary view: all triggers created on a table
• A table can have unlimited triggers: do not
overuse them
Trang 11Database Security and Auditing 11
Oracle Triggers (continued)
Trang 12SQL Server Triggers
• CREATE TRIGGER DDL statement: creates a trigger
• Trigger condition:
– Prevents a trigger from firing
– UPDATE() and COLUMNS_UPDATE() functions
• Logical tables:
– DELETED contains original data
– INSERTED contains new data
Trang 13Database Security and Auditing 13
SQL Server Triggers (continued)
• Restrictions—Transact-SQL statements not allowed:
– ALTER and CREATE DATABASE
– DISK INIT and DISK RESIZE
– DROP DATABASE and LOAD DATABASE
– LOAD LOG
– RECONFIGURE
– RESTORE DATABASE
– RESTORE LOG
Trang 14Implementation of an Historical Model
with SQL Server
• Create a history table:
– Same structure as original table
– HISTORY_ID column
• Create a trigger: inserts original row into the
HISTORY table
Trang 15Database Security and Auditing 15
Fine-grained Auditing (FGA) with
Trang 16Fine-grained Auditing (FGA) with
Trang 17Database Security and Auditing 17
Fine-grained Auditing (FGA) with
Trang 18DML Action Auditing with Oracle
• Record data changes on the table:
– Name of the person making the change
– Date of the change
– Time of the change
• Before or after value of the columns are not recorded
Trang 19Database Security and Auditing 19
DML Action Auditing with Oracle
(continued)
Trang 20DML Action Auditing with Oracle
– Create the auditing table
– Create a sequence object
– Create the trigger that will record DML
operations
– Test your implementation
Trang 21Database Security and Auditing 21
History Auditing Model Implementation
Using Oracle
• Historical data auditing is simple to implement; main components are TRIGGER objects and
TABLE objects
• Keeps record of:
– Date and time the copy of the record was
captured
– Type of operation applied to the record
Trang 22History Auditing Model Implementation
Using Oracle (continued)
• Steps:
– Use any user other than SYSTEM or SYS; with privileges to create tables, sequences, and
triggers
– Create history table
– Create the trigger to track changes and record all the values of the columns
– Test your implementation
Trang 23Database Security and Auditing 23
DML Auditing Using Repository with
Oracle (Simple 1)
• Simple Auditing Model 1
• Flag users, tables, or columns for auditing
• Requires less database administrative skills:
– Application administrators can do it
– User interface is built in top of the repository
• Auditing flags are flexible
• Does not record before or after column values; only registers type of DML operations
Trang 24DML Auditing Using Repository with
Oracle (Simple 1) (continued)
Trang 25Database Security and Auditing 25
DML Auditing Using Repository with
Oracle (Simple 1) (continued)
• Steps:
– Use any user other than SYSTEM or SYS
– Create triggers
– Create sequence object
– Build tables to use for applications
– Populate application tables
Trang 26DML Auditing Using Repository with
Oracle (Simple 1) (continued)
• Steps (continued):
– Populate auditing repository with metadata
– Create the stored package to be used with the trigger
– Create triggers for application tables
– Test your implementation
Trang 27Database Security and Auditing 27
DML Auditing Using Repository with
Oracle (Simple 2)
• Simple Auditing Model 2: requires a higher level
of expertise in PL/SQL
• Stores two types of data:
– Audit data: value before or after a DML
statement
– Audit table: name of the tables to be audited
Trang 28DML Auditing Using Repository with
Oracle (Simple 2) (continued)
Trang 29Database Security and Auditing 29
DML Auditing Using Repository with
Oracle (Simple 2) (continued)
• Steps:
– Use any user other than SYSTEM or SYS; with privileges to create tables, and triggers
– Create the auditing repository
– Establish a foreign key in AUDIT_DATA table referencing AUDIT_TABLE table
– Create a sequence object
– Create the application schema
Trang 30DML Auditing Using Repository with
Oracle (Simple 2) (continued)
• Steps (continued):
– Add data to tables
– A stored PL/SQL package will be used for
auditing within the triggers
– Create triggers for audited tables
– Add auditing metadata
– Test your implementation
Trang 31Database Security and Auditing 31
Auditing Application Errors with Oracle
• Application errors must be recorded for further analysis
• Business requirements mandate to keep an
audit trail of all application errors
• Materials:
– Repository consisting of one table
– Methodology for your application
Trang 32Auditing Application Errors with Oracle
(continued)
• Steps:
– Select any user other than SYSTEM or SYS;
with privileges to create tables, and procedures
– Populate tables
– Create the ERROR table
– Create a stored package to perform the
UPDATE statement
– Test your implementation: perform and update
Trang 33Database Security and Auditing 33
Trang 34Oracle PL/SQL Procedure Authorization (continued)
• Steps:
– Create a new user
– Select a user with CREATE TABLE and
PROCEDURE privileges
– Populate tables
– Create stored procedure to select rows in a table
– Grant EXECUTE privileges on new procedure
– Log on as the new user and query the table
Trang 35Database Security and Auditing 35
Summary
• Two approaches for DML auditing:
– Set up an audit trail for DML activities
– Register all column values before or after the DML statement (column-level auditing)
• Fine-grained auditing (Oracle)
Trang 36Summary (continued)
• Triggers are executed in order
• USER_TRIGGERS data dictionary view: shows all triggers
• SQL Server 2000:
– CREATE TRIGGER DDL statement
– Conditional functions: UPDATE() and
COLUMNS_UPDATED()
• FGA allows generation of audit trail of DML
Trang 37Database Security and Auditing 37