Ebook Imperva SecureSphere DAP Getting Started
Ebook Imperva SecureSphere DAP Getting Started
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
eBook Series . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
The plan is a living document that reflects the lessons learned and evolving needs of the company. Ownership and
responsibility for the plan should reside with the person who will be held responsible in the event of a data breach.
Security and compliance reporting requirements can be complex in enterprises with large
heterogeneous database environments. Fortunately, the objectives for will distil down to a set of use
Compliance data
cases with overlapping requirements. Your security strategy should reflect the company’s tolerance for
requirements are largely
risk. Auditing – or activity monitoring – for compliance only will provide little to no pro-active security
a subset of the broader
and limited forensic capabilities. Auditing for data security can be very simple or sophisticated. Some
and more time-sensitive
key differences are highlighted below:
data security requirements.
Security monitoring
SECURITY • Broad visibility and scalability
• Alert and/or block in real time on suspicious behavior
• Team and task centric
• Independent compliance and security evaluation engines
• Correlation with other best of breed security solutions
Successful deployment and positive quarterly results will, in large part, depend on the work you do
before you purchase the software. Early stakeholder involvement and consensus on objectives and
success criteria will reduce the number of “negative impact” concerns, speed deployment and increase
your depth and breadth of coverage.
Key Stakeholders
Justifying the initial and on-going cost of new technology requires an understanding of the cost
factors, time frames and the current return on investment. Verify there are no hidden costs or expensive
license renewals that are not accounted for in vendor cost estimates. Ask your short-list or in-house
team for a 5-year cost analysis that includes databases and use cases you will add post phase one.
Understand that different use cases can drastically change your audit volume and velocity.
Do your homework, gather the technical, cost and risk information necessary to calculate actual costs
and return on investments. For a sample cost analysis calculate your savings using the Imperva Cost
Savings Estimator
Calculate Your
Savings
DB License, maintenance
Storage costs
Administration
Breach costs
Understand the cost-risk balance, prepare a five years total cost of ownership report.
While the plan is a living document that reflects the lessons learned and evolving needs of the
company you must manage to the existing plan. Control scope creep and set expectations. Use a
defined change process that accounts for additional resources and budget. Implement a solution that
will integrate and leverage your existing solutions to simplify management, maintenance and updates.
People change roles, remember to educate and evangelize the on-going benefits of your data audit
and protection solution. Communicate with your stakeholders, provide regular updates that are
pertinent to their needs. Your data audit and protection solution should facilitate role and task specific
reports and dashboards that can be scheduled and routed via email or web posting.
The importance of data discovery and user rights analysis cannot be overemphasized.
Automate and routinely repeat the process of finding sensitive data and excessive user rights.
Automated discovery scans eliminate the need for error-prone manual database inventories. Select
a solution that finds the databases, enables single-click ”acceptance” of the new database into the
default monitoring group and provides the option to arrange databases into either logical or physical
groupings for policy application and management.
Imperva SecureSphere database
discovery screen shots:
Actionable
Automates process
of on-boarding
databases
Select technology that automates the discovery of a broad range of databases to speed deployment
Actionable
Automates process
of Classifying data
Payment Card
Implementing access control is part of virtually every compliance, privacy and governance policy. Use a
data audit and protection solution that provides the user database rights discovery – both granted and
Imperva SecureSphere User Rights effective with an integrated review and reporting capability.
Management screen shots:
Systematically protecting data at scale requires a solution that can manage the complexities of multiple
and often overlapping compliance and security requirements. Leverage a solution that provides pre-
defined assessment scans and policies with regular updates from the vendor’s research team.
Real-time security incident response analysis and compliance reporting have overlapping but different needs.
Building and retaining in-house expertise and content are not practical for most companies. Buy a solution that
provides out-of-the-box policies and reports for both security and compliance, includes integrations to your
existing system and offers the flexibility and scalability to match your needs.
Ensuring you deliver results that meet or exceed expectations is not an accident. Plan for the timely
delivery of the information your stakeholders require–including the information they will need as part
of an escalated audit task or security incident response.
Leverage automation
Good automation frees up your staff to focus on the things that computers do not do well, it improves
consistency and enables scalability. Look for automation within the application and for APIs to
automate multi-system processes and facilitate integration with your IT management systems.
SCHEDULER,
ACTIONABLE FOLLOWED ACTION 3RD PARTY
BUILT-IN PROCESS REST API (SSL)
RESULTS SCRIPTING INTEGRATION
WORKFLOW
Prepare to respond
A successful incident response process depends on connecting the dots, contextual information and
isolation of the abnormal behavior. When and how you respond is a reflection of the company’s or
business unit’s tolerance for risk. Low-medium risk tolerant organizations should select a solution that can:
• enrich logs with the contextual information from external systems
• provide alerts, quarantines and blocks across a flexible range of monitoring modes
• support followed action scripts for initiating external process actions
• integrate with your other tools and systems to help identify, trace and prioritize the attack points
• keep pace with your highest performing databases and Big Data instances
Improve reporting
All major compliance Reducing the time required and complexity of your audit reporting tasks are baseline prerequisites
regulations require reporting for your solution. More specifically, the system must provide regulation specific reporting across the
entirety of your heterogeneous database environment without the need to manually intervene. The
SOX/JSOX system should collect, consolidate and properly present the required audit information upon real-time
MAS request and at scheduled intervals.
NERC Accounting for change is another baseline requirement. Look for a vendor that has a history of
delivering compliance-specific policies and reports that can be configured to your unique needs
HIPPA without compromising functionality and upgradability. Verify centralization is supported by all reports,
PCI-DSS not just a handful.
GDPR
Unmonitored databases are a gap in your compliance and security profile. Mapping out your database
environment by type, volume and velocity provides a quick checklist to validate your solution. Implement a
solution that can monitor local system access, do network based monitoring or a hybrid of both
monitoring deployment options.
Unmonitored databases are a gap in your compliance and security profile. Mapping out your database
environment by type, volume and velocity provides a quick checklist to validate your solution.
Implement a solution that can monitor local system access, do network based monitoring or a hybrid
of both monitoring deployment options.
IBM
MySQL Netezza SybaseIQ IMS-IBM Cassandra Teradata
Informix
Select a solution that provides a versatile, easy-to-use policy management system that can process the
SecureSphere policy list and rule sets across the entirety of your environment regardless of velocity or volume.
definition screen shots
Simplify your deployment, maintenance and upgrades projects by implementing a solution that is
designed to work with your other technology investments and IT project cadence.
Solutions to avoid:
• vendor-centric solutions that lead you into a “good-enough” paradigm
• solutions that that actually increase the total cost-of-ownership due to expensive custom
integrations to your environment and on-going professional services required to keep them up-
to-date
• Solutions that lack backward and forward compatibility between all component levels, requiring
top-down or all-at-once upgrades
Backward
and forward
Best-of-breed compatibility
across all
tiers
Rest API
Out-of-the-box
integrations
Compliance and security mandates are often rolled out to support specific audit and security
“use cases”. Prioritize your use cases, map out the basic requirements, determine the overlap in
requirements and gain buy-in from the stakeholders for which use-cases will be implemented in
what phases of the project.
• Sensitive data auditing • Database risk assessment • Malware and targeted attacks defense
• Data theft prevention • Change management • VIP data privacy
• Data across borders • Ticket reconciliation • Ethical walls
Summary
An effective audit and protection solution provides tangible data security benefits while simplifying the compliance audit process. A good
understanding of the options and requirements will improve your ability to successfully select and implement a solution that meets both
your immediate and future needs.
Understand where the data is Located Inventory type, volume and velocity of databases
Download the Seven Keys to a Secure Data Solution white paper for more information.
To Learn more
about database
auditing and
protection visit
imperva.com