in Engineering


Protecting Against the Insider Threat – Verify Your Trusted Users

Mike Mohler

Principal Systems Engineer

Protecting Against the Insider Threat – Verify Your Trusted Users

Continuing with the blog post, Protecting Against the Insider Threat, where the theme was the “Separation of Administrative Duties” as a way to disintermediate the Database Administrator (DBA) from the data, this blog will focus on the need to “Trust, but Verify” your users.

It is always the assumption that employees will act in their best interest for the good of the organization and their customers. But, what if they don’t? Unfortunately, this can be the reality in some organizations and requires extended security in your database to ensure protection against this threat.

SingleStore delivers the extra security you need. Of course, we support all the typical enterprise security features for maintaining data confidentiality, integrity and availability. Features such as Role Based Access Control (RBAC) as discussed in the previous blog, end-2-end SSL TLS 1.2 based encryption, 3rd party encryption stack integration for data at rest, as well as easy-to-configure high availability to guard against data loss and system downtime. However, you always need to know that the administrators and users that connect to your system are trusted.

Let’s discuss two critical principles to address this threat. Specifically, deep database auditing for a 360° view of all session activity along with trusted authentication into the database to maintain confidentiality to prevent sensitive information from being accessed by the wrong people.

single-store-deep-database-auditingSingleStore Deep Database Auditing

SingleStore logs all database activity to an external location. Once written, analysis tools can then be used to perform information security analysis to verify access control policies are enforced, as well as investigate suspicious activity or system outages.

The system also captures the User’s intention in the audit logs BEFORE returning any data back to the user. SingleStore auditing provides configurable filtering to allow for five levels of logging. These levels will capture valid and invalid SQL statements and queries as defined below:

ADMIN-ONLY-INCLUDING-PARSE-FAILS
WRITES-ONLY-INCLUDING-PARSE-FAILS
ALL-QUERIES-INCLUDING-PARSE-FAILS
ALL-QUERIES-PLAINTEXT-INCLUDING-PARSE-FAILS
ALL-RESULTS-INCLUDING-PARSE-FAILS

When you remove ‘-INCLUDING-PARSE-FAILS’ from any of the above log levels, only valid SQL statements and queries are logged. This logging enables SingleStore to record administrator and/or user activity along with the results of the query. Should a command contain sensitive data, like a password, SingleStore redacts that information from the audit logs.

single-store-authenticationSingleStore Authentication

An organization must also reliably identify users and provide secure authentication and authorization to support data confidentiality. Using an identity federation standard such as SAML (Security Assertion Markup Language) allows an organization to support this requirement to establish trusted access to their applications and database systems. SingleStore supports SAML, as well as Kerberos, PAM, and native authentication. The process involves establishing user credentials in the identity provider and then mapping those to users inside SingleStore. When a user attempts to authenticate, the security token is validated before granting access. (See SAML Authentication and Kerberos using GSSAPI online documentation for details).

Whether using SAML tokens or Kerberos principals to represent user credentials, the user credentials are mapped to an internal user within SingleStore. Adding and removing users in SingleStore is simple and explained in the Securing SingleStore online documentation.

conclusionConclusion

In this blog series on “Protecting Against the Insider Threat”, we focused on the separation of duties as well as trusted verification of your database users. With SingleStore, enterprises and government organizations get an enterprise quality database that meets the triad of security principles (Confidentiality, Integrity, and Availability) while delivering very high performance. Today, SingleStore meets these requirements and also supports ICD-503 for the highest level data protections. With SingleStore, you will achieve real-time performance and distributed SQL operations with maximum security controls.

Protecting Against the Insider Threat – Verify Your Trusted Users

Share