Cryptography in the Database 209
Ben Rothke writes "Noted security guru Marcus Ranum has observed that "these days, with the kind of plug-ins that come in your typical browser, combined with all the bizarre undocumented protocols used by new Internet applications; makes it highly unlikely that a firewall is doing anything more complex than a thin layer of policy atop routing. As such, the applications behind the firewall are now more critical to security than the firewall itself. Which should scare the holey moley out of you."" Read on for Ben's review.
Cryptography in the Database : The Last Line of Defense | |
author | Kevin Kenan |
pages | 312 |
publisher | Addison-Wesley |
rating | 9 |
reviewer | Ben Rothke |
ISBN | 0321320735 |
summary | Excellent reference for those that are serious about securing their corporate databases |
Taking Ranum's observation to the next level, it is not only the applications that need to be secured, but databases also. The theme of Cryptography in the Database - The Last Line of Defense is that databases, being the main repository for critical consumer and business data, are often not given the adequate level of security that they deserve.
Large databases often contain terabytes of data. This data often contains R&D, client, customer data and more, that if compromised, could wreak havoc on an organization; both from a public relations perspective, in addition to a regulatory perspective. In a large customer driven organization, a database breach can wreak havoc on tens of thousands of customer records. With all of that, companies will spend large amounts of money on the security appliance of the month, but often let their databases sit unprotected.
Cryptography in the Database is a valuable book in that it shows how a formal methodology is required to adequately protect large corporate databases. The emphasis of the book is on designing and integrating a cryptosystem into the database to protect it against the various threats that are specifically launched against corporate database systems.
The books 4 parts contain 21 chapters. Part one is brief overview of the need for database security, along with related threats to database, and also covers the basic concepts of cryptography and encryption.
Part two provides a comprehensive synopsis on the cryptographic infrastructure necessary to secure corporate databases. Chapter 3 goes into details on how to set up an effective key management scheme. Such a scheme is crucial as the author notes that all it takes is the loss of a single 128-bit key, and gigabytes of data can become inaccessible.
Part two also creates a sample cryptographic architecture that is flexible and modular so that it is easily adaptable to various situations. The author notes that such systems can be difficult to manage if they become overly complex, and the challenge is to find the right balance between security and complexity on one side, and usability on the other. Creating an effective cryptographic database infrastructure. is not an elementary task given the different requirements of security and functionality.
Chapter 3 details the various entities that go into a complete cryptographic architecture, including the cryptographic engine, and the various controls around the crypto keys. The chapter provides a good overview of the key life cycle. Historically, controls around the key life cycle are crucial. One of the ways the Allies were able to break the German Enigma cipher machine during World War II was that the German's reused their crypto keys, which obviates much of the security that cryptography can provide. Had the German's not done that, the outcome of the war may have been dramatically different.
Part 3 details the issues that need to go into the entire cryptography project. Kenan notes that for security to be effective, it must be dealt with at the commencement of a project and must permeate the overall design and seep into every line of code. Also, in the long term, developing a culture of security depends on looking at security as an opportunity to provide extra value. Where security fails is when it is viewed merely as a series of checklists that are meant to get in the way.
Chapter 9 shows how data flow diagrams can be used by a database analyst to better understand how a system works. These data flow diagrams are valuable as that they show the various inputs into the system and where potential failures can crop up.
Part 4 provides various Java code examples of the cryptographic infrastructure that were detailed in the previous 12 chapters. The example code is meant to show how to implement the primary functionality of the various components that the book describes.
One of the popular terms in security today is data at rest, which refers to all data in storage. Businesses, government agencies, and others need to deal with attacks on data at rest, which more often then not will be found on databases.
After reading Cryptography in the Database, the reader can understand why database cryptography must be implemented in a methodological fashion, since incorrectly implemented cryptography can often be worse than no cryptography at all. With that, database administrators, architects and others who have input into the design of database security are highly advised to read Cryptography in the Database.
Databases are far too critical to an organization to be left unsecured, or incorrectly secured. The database is indeed the last line of defense in an organization. Books such as this are thusly vital to ensure that the last line of defense is not easily breached.
You can purchase Cryptography in the Database from bn.com. Slashdot welcomes readers' book reviews -- to see your own review here, read the book review guidelines, then visit the submission page.
Money Talks (Score:5, Insightful)
So maybe to most companies, extreme-security is a gamble they are willing to take, or they simply don't value customer data as much as customers do.
We have seen so many cases of stolen university [slashdot.org] data [slashdot.org], or even credit card details [slashdot.org], but when have we heard a Press Release saying "no worries, the data is crypto-protected with this how-many-bit technology".
you won't hear it (Score:3, Interesting)
Re:Money Talks (Score:2, Insightful)
Because what good is 4096-bit encryption when the application, the weak link, has to know the key to decode it? Proper application/network/security design solves this problem, and while encryption might be a part of it any idiot who says "no worries, its protected by ROT-13 (or whatever) encryption" reveals himself to be that idiot.
Re:Money Talks (Score:5, Insightful)
as a real world example. we developped an application which i was asked to beta test (im the sysadmin, i dont do software devel). within 5 minutes i had hacked the application, had full access to the database and every users' passwords.
when i pointed out the app was flawed, their answer was "that's ok, we'll add encryption to the database before releasing it". in this case the whole design was flawed, encryption in the database would have stopped me for 10 minutes instead of 5. to this day they still haven't fixed it (thankfully, they haven't sold it yet either)
moral of the story: design your apps properly. don't rely on the buzzword du jour. encryption is a tool, not a panacea. and good security is HARD to design.
and more importantly, database encryption is mostly snake oil. usually if a hacker get to your database, he found your application first, and he has the key to decrypt your super-secure-2048bit-encrypted-database. it will slow him down for a few more minutes, that's all
Doubly hard for Databases (Score:5, Interesting)
A better solution (and one that PostgreSQL uses) is to use SSL to secure the connection and thus encrypt the traffic to and from the server. Yes, if you compromise the database server, you get the data anyway, but in the other approach, if you compromise the key management server, you might get far more than the data. Note that PostgreSQL also supports client-side certificates which, while not perfect, provide an added layer of security (cient-side SSL is a host authentication mechanism, not a user authentication mechanism so normal login requirements still apply-- basically now you have 2-factor authentication).
The second vital area is that of access control. Encrypting your data doesn't do you any good if you don't adequately lock down access. Shared database accounts? No. Use one account per *user* and use groups/roles for access control.
Finally, encrypting some data in the database might be required by some applications (for example, if you store credit card transactions in your database so you can later reverse a charge, the PCI-DSS requires that the number is encrypted in storage). But encrypting most data will simply prevent your relational model from working properly.
Re:Doubly hard for Databases (Score:2, Informative)
Don't misunderstand me, SSL *IS* a useful part of a secure design, but it's only a part and is in no way a security solution in and of itself.
A more optimal solution is one which encrypts sensitive
Re:Doubly hard for Databases (Score:3, Informative)
In general, mixing relational databases and encryption opens up more problems than it solves. In many cases these can be solved (i.e. one hopes that the credit card number is not being used as a key
Re:Doubly hard for Databases (Score:2)
In the simplest case, that means not storing information that isn't required; what the database doesn't know it can't reveal. e.g. why did the SpreadFirefox.com crack reveal phone numbers? Why are universities' computers haemmoraging SSN's and dates of birth? Just don't store them unless they're specifically required.
For ot
Re:Doubly hard for Databases (Score:3, Insightful)
Then there's data which will only ever be accessed or changed by the user themselves, so why not encrypt it with their password (which isn't stored in the database either) -- it might be inconvenient not being able to "just go in and fix stuff" if the user forgets their password, but sometimes it's worth it for when the database gets cracked and you can say for sure that no information was revealed.
These approaches only work when used sparingly and only for information that doesn't need to be presented diff
Re:Money Talks (Score:3, Insightful)
Firewalls, proper network design, proper user and access credentialing, proper system maintenance, even proper hardware decomissioning techniques, all
Must agree altogether (Score:5, Interesting)
Re:Must agree altogether (Score:5, Interesting)
Re:Must agree altogether (Score:4, Interesting)
Sometime in 2002, I found a security hole in the implementation of a particular Credit Card processing company's online processing software while implementing an interface between it and an application I was tending to.
It was the very worst type of security hole - one that would let me order whatever I like from any of their customers without paying a thin dime, without doing anything exotic at all. (EG: File->Save Page; Edit the html file, use it to submit a post with altered values)
I sent in a simple summary of the security issue found, and included sample code and explicit instructions for what to do and when to recreate the issue, in its entirety. And, I sent it to every email address I could find or think up for this company, along with my contact information and expressed my desire and willingness to assist their engineers. I even detailed a way to completely close the security hole with a minimum of fuss.
Nothing happened for some 6 months. (!)
Then, I got a phone call, from somebody who didn't identify himself. He identified me, in a most nervous and rattling fashion. He went on and on about how it "wasn't a security hole", and "nobody works likee that", and how "nobody would exploit it" and even told me what I might be thinking! I said nothing - this guy scared the hell out of me, even though I made perfectly clear my intentions. He went on and on, for perhaps 10-15 minutes, and I was silent the whole time. He never once asked me a question, other than to identify me!
Finally, he hung up, and that was it. I've never heard or seen anything since, and I've had the same email addresses and contact info. I have never publicly revealed the company involved, and don't intend to. If they get screwed by the security hole, they clearly deserve it.
But I sure as hell refuse to do business with them!
Re:Must agree altogether (Score:3, Insightful)
It is the job of the people getting paid (management) to hire competent developers to protect the data of consumers of products made by the company owned by shareholders. If these people fail in their duty, the company should lose enough money to make the shareholders hopping mad and terminate and sue the management team.
The shit has to hit the fan before things get better.
Re:Must agree altogether (Score:2)
Re:Must agree altogether (Score:2)
i know of an online store that will still let you edit the URL to change the final billing amount
I know of a certain online bookstore that would let you do hand edit the rating you gave book reviews (since fixed) without doing any validation.
Unix Shell Scripts (Score:2)
Re:Must agree altogether (Score:2)
Money (Score:3, Informative)
When you're sold an enterprise server for an enterprise app with a $1250 per-seat (much less named users) fee and you have 5,000 concurrent users, that's $6.25 million. You can buy the same server with five or ten user licenses for $40k. Provided the application is secure enough, the cost v. benefit of having per seat licenses just doesn't pan out. Cut another way,
Re:Must agree altogether (Score:2)
Re:Must agree altogether (Score:3, Informative)
Write a PERL script that listens for connections and fakes the authentication routine. Point your app at the host running the script. Have the script record the authentication credentials the app uses.
Re:Must agree altogether (Score:3, Informative)
I work for a database company and I can assure you that there are several methods of access identification and internal encryption in the database (security in case the datafiles are stolen) etc.
But security is never a single thing but the sum of several layers of measures which combined give the best acceptable security level. Note! This is not the same as the best possible security level, such a level is not functional.
Re:Must agree altogether (Score:2)
No, the purpose of the database is to make it possible for authorized users to access data.
The app of course can do whatever it wants when it comes to security.
Which is why the app server is a target. You didn't eliminate your security problem, you just moved it. You moved it to a host that is exposed to the entire world (for Internet apps). Hope you did your homework.
Oh, but wait, you don't c
I might be wrong here but... (Score:3, Informative)
Re:I might be wrong here but... (Score:2)
I'm sure that all those enterprise DB users will very, very shortly convert all their DBs to Reiserf4.
Re:I might be wrong here but... (Score:2)
Ha ha ha ha. You're a very funny man.
This has been a concern of mine for a while! (Score:3, Interesting)
Re:This has been a concern of mine for a while! (Score:3, Insightful)
You don't. If someone has access (user or physical) you have no real defense. You have to trust the people you give access to and hope that the repucussions of wrong doing keep them honest.
Re:This has been a concern of mine for a while! (Score:2)
I'll put specific names where you've only talked generally. At work, I have a brand new Windows XP Pro machine. It had a built-in firewall which is designed to prevent internet access (in or out) w
Re:This has been a concern of mine for a while! (Score:2)
At work, I have a brand new Windows XP Pro machine. It had a built-in firewall which is designed to prevent internet access (in or out) without specific permission from me, the user and Administrator of that computer.
You don't have a firewall, you have a program that attempts to implement a network policy on your PC. As you found out, it can be compromised.
SE Linux can stop insiders (Score:2)
With SE Linux, you can prevent an app from accessing both secret info and the Internet. An employee may get access to both, but interprocess communication is restricted in a way that blocks leaking the info.
Some extra words to Google for: "Mandatory Access Control"
Re:SE Linux can stop insiders (Score:2)
Oh?!
Hmmmmmmmmm...
Must get rid of that bizley.
Re:This has been a concern of mine for a while! (Score:2)
Scare the holey moley? (Score:2, Interesting)
What's more, someone who actually knows something about security (whether it's computer security or not) should not have to resort to that kind of attention-w
Re:Scare the holey moley? (Score:3, Informative)
Re:Scare the holey moley? (Score:2, Insightful)
Apparently, "slavemowgli" believes that you cannot use humorous or colorful language if you want to be taken seriously.
Calling attention to a common problem is hardly sensationalism. For it to be sensationalism, it would require exaggerations, and unsubstantiated claims. Something like, "Unencrypted databases make firewalls and other network protections completely irrelevant [overstatement], and will cost industry more in the next few years than all the phishing and spyware in the world [unsubstantiat
Re:Now where did I leave my holey moley? (Score:2)
$10,000.00 american, or you will never see it again!
Border security (Score:5, Insightful)
Most companies that handle credit cards in modest amounts are required by their providers to use application-aware systems like Teros, which inspect every detail of every transaction across the border at the highest levels - providing a redundant check in the form of a policy controlling things like what cookies and querystring values can accompany a request for a particular path, and looking for things like cookies appearing that you didn't set, or form values being submitted that weren't in the HTML form you sent out...
Re:Border security (Score:2)
Re:Border security (Score:2)
An application firewall is the answer IMO, it's all about defense in depth.
Re:Border security (Score:2)
Re:Border security (Score:2)
I don't know what level you are. You may have lesser requirements if you don't have that much volume...
You
Re:Border security (Score:2, Informative)
Re:Border security (Score:2)
Re:Border security (Score:2)
Re:Border security (Score:2)
Damn, I wish I could revise my post.
Re:Border security (Score:2)
Re:Border security (Score:2)
You probably know this, but I can imagine there are people who woul
where is the "encrypting the monitor" book? (Score:4, Funny)
hey, you heard it here first
Re:where is the "encrypting the monitor" book? (Score:2)
Punish Companies Monetarily (Score:4, Insightful)
Re:Punish Companies Monetarily (Score:2)
What you want is juries given the power to charge whatever they see fit, with the company being completely liable, then you'll see companies quaking in their boots, actually taking steps to insure security, with crimina
middle ground (Score:2)
I can appreciate your attempt to reign in the GP perspective of punishing companies over security breaches. Like you wisely wrote, no usable security system is 100% invincible.
There is a middle ground in this debate, though, and I believe that is fining companies over negligent security practices. After a breach and theft of consumer data, an independent security audit can identify if the damage to consumers was the result of a corporate negligence towards security. In that case, they would be susceptib
Re:hmm... from a former comunist country? (Score:2)
Well, I don't know of any bank vault or safe that is 100% unbreachable, but it doesn't stop banks from buying them. And their financial loss could be extreeme if the vault is breached.
Battlestar Galactica solution (Score:3, Interesting)
There was that one episode....
Re:Battlestar Galactica solution (Score:3, Informative)
Re:Battlestar Galactica solution (Score:3, Informative)
Network Security's Achiles' Heel (Score:3, Insightful)
Re:Network Security's Achiles' Heel (Score:2)
The solution is to move away from algorithmic software and adopt a non-algorithmic, signal-based, synchronous software model.
Will we get synergy with that?
This book is potentially dangerous (Score:5, Insightful)
Point of fact, you don't implement crypto yourself. That is the most horrid mis take that anyone can make. Let the security professionals implement it, and just use it. They are far more paranoid that you are and are far better to do this specialised way of coding.
Security is a feild in which you must have a good level of mastery of many different areas otherwise you are a liability. If you don't got that, then don't implement a system. Use one that someone else has written.
IMO, this book will make too many people think that they are good enough to do what they can't do. I can only imagine how many insecure system will be developed because of it.
Re:This book is potentially dangerous (Score:2)
It is entirely possible to, say, use the Blowfish algorithm to encrypt all of the data in a specific table without being an expert in cryptography.
Unfortunately, the review didn't go into enough detail to say this for certain, but I expect
Re:This book is potentially dangerous (Score:2)
Using your example, it is indeed entirely possible to use Blowfish to encrypt all the data in a table. But, if you do it in a naieve way, the protection afforded by the (perfectly good choice of) primitive will be reduced or lost entirely.
The GP poster was probably more worried about this kind of error. Read Bruce
Re:This book is potentially dangerous (Score:2)
I can see your point. However, the level of expertise required to implement security at this level doesn't rise to the level of expertise required to implement a completely new crytographic algorithm (while, to me, it looked like the original poster was implying that
Re:This book is potentially dangerous (Score:2)
If an application can access data on the backend, so can a thief who either breaks in through that application, or who manages to gain login access to the machine, because THE APPLICATION NEEDS THE CRYPTOGRAPHIC KEY. All the encryption in the world is useless if the key is known by Alice, Charlie, AND Bruce.
The only valid use I can think of for encrypting information that goes into the database is a public key system. For example, let's sa
Re:This book is potentially dangerous (Score:2)
I'll still stand by my statement that it should be possible to present a techni
Holey moley! (Score:2)
Crypto-Database? (Score:2)
Hint: Quit putting your key in the code (Score:2)
That will be $200, thank you.
Better idea. (Score:2)
That'll be $350 and two karma points, thanks.
Re:Crypto-Database? (Score:2)
Secure customer processing (Score:2)
With regard to databases, one means of preventing illicit data retrieval is to implement a one-way directional data filter. In a business setting, this can be achieved by removing the (server-side) TX wires from the Ethernet cable.
Re:Secure customer processing (Score:2, Interesting)
Even if data transfer is one way you still need the other way because of how TCP/IP works with acknowledgements and retransmit requests. Your idea of removing wires would break all network communication.
Re:Secure customer processing (Score:2)
I do wonder how to figure out whether the data was written successfully, however.
Re:Secure customer processing (Score:2)
Re:Secure customer processing (Score:2)
Role playing is a good way to discuss this suggestion. I'll play the role of your ethernet switch, and you be the server...
YOU: Here I am, server A! Ready for packets
ME: (silence)
YOU: Not the chatty type, ay! OK.
ME: (silenece; then suddenly) OK, I've got a packet for machine A! Machine A's not on my list, which one of you is it?
YOU: I'm right here!
ME: I'm looking for machine A!
YOU: I'M RIGH
Why it Doesn't get Done (Score:3, Interesting)
Sorry, but it needn't be that hard to do, given the right tools; the author is really scaring off the troops fm even attempting it.
You need to design against what's widely accepted as the most usual scenario, intrusion by an insider. Requirements shd include not less than the following:
Protect against data visibility even in the worst case, a massive physical compromise of the entire database.
Compromised access to any single record must not lead directly to compromised access to any other record.
I did field-level encryption against these requirements at a major federal agency, and the result got blessed by the security troops there.
What I've seen happen is that there's two different cultures working here: When you ask the application guys what they're doing re database security/encryption, they'll too often reply " It's a network problem, so go talk to those guys. " Ask the network guys what they're doing re the same thing, they'll too often reply " That's an application problem, so go talk to the application troops. "This hurdle needs to be cleared if there's any hope for progress.
Re:Why it Doesn't get Done (Score:2)
It is both... so ROT13 at each level.
Simple security solution (Score:4, Insightful)
2) Invent a generic TCP/IP tunneling protocol over HTTP (like SOAP); call it TP.
3) Tunnel all your network traffic through TP.
4) Problem solved!
The beauty of this system is that you can run TP over TP as many times as you wish, adding as many layers of security as you feel necessary to keep you from shitting your pants over the big bad hackers who are pwnz0ring j00r data.
Re:Simple security solution (Score:2)
Master Key and Indexes (Score:3, Insightful)
This master key must then be highly guarded. If it is kept on the machine, it is subject to pillage just like any other compromised machine and the encryption does no good. If it isn't, then whenever the database service is restarted the key must be fetched.
The current forms of database protections -- views & user rights -- limit the data available to the various users. These are usually not properly implemented and can provide a great deal of protection in shared databases.
-Charles
Re:Master Key and Indexes (Score:2)
Which makes sense in terms of the popular example of a credit card number. For a credit card tender, you would probably store your internal transaction number, a point of service location identifier, date/time, transaction type (sale, refund, etc) credit card processor transaction reference number, and the credit card number.
Why in this scenario does credit card number need to be indexed? You'll normally
Re:Master Key and Indexes (Score:2)
I work on a daily basis with databases that average 50-60 Gb in size. Not using indexes is not an option. Basic queries go from seconds to hours.
The problem still remains, that SOMETHING needs to be able to read the data. That something then needs the decrypt key. If that something is then compromised, encryption is me
Re:Master Key and Indexes (Score:2)
That's rather defeatist.
Firewalls irrelevant because of firewalls (Score:5, Insightful)
Thus, the firewall becomes less and less relevant with time.
Originally, the great designers of IP gave us any number of protocols, and 65,534 ports in each protocol. Different applications could use different ports, and these ports would identify what application you wanted to connect to. Port 80 was used for web traffic, Email uses port 25. This gives incredible room for growth and expansion, and was "a good design". (TM)
Firewalls block all but ports 80, 25, 443, and maybe a few others. Thus, many applications are now built using ONLY one of these ports!
So now, we have the dog, the kitchen sink, Instant Messaging, RSS, XML/RPC, and god knows what else tunnelled over port 80. Dude, Like where's my firewall?
So, push comes to shove, there are no real shortcuts without a long term price.
Application level (Score:3, Interesting)
One of the great concepts I learned at my last training was the idea of compartmentalization. This is after many other layers of defense, but the idea is even if you are compro
Re:Firewalls irrelevant because of firewalls (Score:2)
Re:Firewalls irrelevant because of firewalls (Score:3, Informative)
Re:Firewalls irrelevant because of firewalls (Score:2)
Re:Firewalls irrelevant because of firewalls (Score:2)
Will the database finish what it begins? (Score:2)
"I won't fail you. I'm not afraid."
"You will be. You will be."
Database Security (Score:3, Informative)
The fact of the matter is that until more mandatory disclosure laws are passed companies will simply choose to ignore the simple basic things they can do to secure a database. Security to many (PHB) managers is a widget of some kind that they can buy and plug in to their network. This writer ignores a very simple flaw in his logic. Typcially, one compromises the database to get the box. If I own the box, encrypting the contents of the datbase won't help you any. It's going to have to be encrypted in such a way that it can be decrypted for use, unless you plan on turning all your data into MD5 hashes (evil grin).
Given the assumption that you want to be able to decrypt your data, you'll have to have the means to do so either stored on that box or on the receiving box, which is also likely on your network. If it's stored on that box, guess what, I've got access to it since UR ()WN3D. If it's another box, hey, I got this one so I can see what this one answers requests from and then I know what I need to ()WN next. Since your security on box was obviously lax enough to let me in, getting the next box down the line won't be any harder.
Mind you that all this assuming that I don't fire up the Beowulf cluster and just crack your encryption the hard way.
2 cents,
Queen B
Database encryption hasn't been important... (Score:5, Informative)
HIPAA
PCIDSS
Both specify, more or less, that sensitive information must be encrypted within the database. That means the data at rest on disk must be encrypted. Encrypting customer-sensitive information in the database will prevent exposure of customer sensitive information from:
Disk-scraping attacks (such as if the storage rep who replaces a failed drive in the SAN is ethically challenged)
Backup attacks (where a complete database backup can be restored and hacked)
What doesn't it save you from?
Users who have rights they don't need looking at data they don't need.
Users who don't need access to the system but have it anyway.
Poor security standards (not changing default passwords, insufficient password strength, etc).
The DBA, who can always log in and see whatever the heck he wants(I almost said he or she, but who am I kidding).
The SysAdmin, who can become the DBA, and can scrape the disks himself.
What are the costs of encryption?
1. It will cost you CPU cycles. (Don't even think about sending all the crypto calls over the wire to a hardware module -- it'll cut application througput in half).
2. You won't be able to have queries like "Select name from patients where ssn between '5030000000' and '503999999'" use indexes, as the ordering of crypto is gone forever.
What's being done about this?
Enterprise vendors are busy rolling out encryption solutions (the other security holes already have support around them, but often aren't implemented in applications.) DB2 lets you encrypt the file system, or tables, or values within tables.
Oracle lets you encrypt columns within tables with AES128, AES192, AES256, or 3DES. (You can also set it up so that the same value in 2 columns has the same ciphertext, which is a good thing.)
SQL Server's got... something, but I don't support it, so I don't care.
(PostgreSQL and MySQL users, I left you out on purpose. I said enterprise vendors, and I meant it.)
Re:Database encryption hasn't been important... (Score:2)
psql=> update table set column = encrypt(column, 'password', 'aes'); (PostgreSQL and MySQL users, I left you out on purpose. I said enterprise vendors, and I meant it.)
Well, both PG and MySQL can do this. Don't leave them out.
Re:Database encryption hasn't been important... (Score:2, Interesting)
Than, PostgreSQL implements stored procedures and triggers which makes it easy to automate encrypting of columns too, or do any transformation on reading/writing from your records automatically. (Yes, function based indices and other goodies too.)
Quite likely someone already wrote something like this, and maybe it is even in your contrib/ directory. But it sure is more sensibly named than DBM
Untrue for HIPAA (Score:3, Informative)
That's not actually the case when it comes to HIPAA. Encryption is not a required element of the technical safeguards for data, it's only an addressable element. See section 164.312 part (a)(2)(iv) of the final Security Rule, which can be found in the Federal Register (volume 68 number 34 page 8378) or on my desk.
The regulation requires the covered entity t
Re:Database encryption hasn't been important... (Score:2, Insightful)
no, HIPAA most certainly does not specificy that sensitive data within a database must be encrypted. such a very, very strict interpretation is something vendors looking to make a dime off of HIPAA would make you believe. if this was really true, you really would not be able to do data warehousing and decision support (which happens to be my meal ticket) in t
Re:Database encryption hasn't been important... (Score:2)
This is one area where I think you're probably off base. There are lots of female DBAs out there, and some of them are quite good. I would say about half the DBAs I've known in my career have been women.
I wish Slashdot did book reviews. (Score:5, Insightful)
Instead, we get a synopsis of what the book covers, plus a blurb for why the topic is important. Yes, securing databases is important! Yes, Part 4 provides Java examples! But why do I want to buy THIS book about securing databases? Why do I want to buy THIS book with Java examples?
They should have some sort of guidelines to follow. They could call them "Slashdot Book Review Guidelines". The guidelines could include points like "Is the book readable as well as technically accurate?" and "How gracefully do you expect the content to age?" That would be amazing.
Odd Ranum quote (Score:3, Interesting)
This seems like a very odd quote to use to introduce this book, because one of the things Ranum seems to be talking about is that use of encryption and complex protocols can make security worse.
Why worse? Because the firewall, mainstay of our security efforts, becomes less and less effective. In the old days, your firewall could give a fairly cursory glance at packet headers, and have a good shot at catching the bad ones. Now, the packet header isn't so useful, because there is complex stuff inside the packet --- protocols are layered three deep or more.
That's why we need security at the application layer, instead of at the network transport layer --- the network transport layer just doesn't "know" enough to catch threats. What makes this really scary is that there is less of a bottleneck for the threats. It's nice as a defender to have a bottleneck you can protect. If the bottleneck goes away, and you have to protect all the applications, that's pretty scary.
Cryptography isn't going to give us a lot of help here, IMO. Yes, when our security has been breached, it can give a second line of defense, but that's about all (and even that seems a little suspect in a world with keystroke loggers).
Re:I don't get the point (Score:2, Interesting)
Second, firewalls really don't do that much for you. They stop things like blaster which attack an open port on the operating system, but let's fix the damn oeprating system to patch those holes, not just cover them up with a rug.
You don't really have to "hack through" a firewall. The hack is you leaving any ports open. If I can get through http, that's all I need. The real protection should be that all i