Introducing Guardium Vulnerability Assessment

This chapter describes:

 

What is Guardium Vulnerability and Threat Management

The Guardium Vulnerability and Threat Management solution is the first step in the security and compliance lifecycle management for any IT environment. A set predefined and custom, along with a process workflow, allow organizations to identify and address database vulnerabilities in an automated fashion—proactively improving configurations and hardening infrastructures.

Included in the Guardium Vulnerability and Threat Management solution are:

 

How does Guardium Vulnerability Assessments Work

The Guardium Vulnerability Assessment application enables organizations to identify and address database vulnerabilities in a consistent and automated fashion. Guardium’s assessment process evaluates the health of your database environment and recommends improvement by:

 

What are the Essential Security Testing Methods

Guardium’s Database Vulnerability Assessment combines three essential testing methods to guarantee full depth and breadth of coverage. It leverages multiple sources of information to compile a full picture of the security health of the database and data environment.

  1. Agent-based-Using software installed on each endpoint (e.g. database server). They can determine aspects of the endpoint that cannot be determined remotely, such as administrator’s access to sensitive data directly from the database console.

  2. Passive detection-Discovering vulnerabilities by observing network traffic.

  3. Scanning-Interrogating an endpoint over the network through credentialed access.

 

What are Predefined Assessment Tests

Predefined tests are designed to illustrate common vulnerability issues that may be encountered in database environments. Because of the highly variable nature of database applications and the differences in what is deemed acceptable in various companies or situations, some of these tests may be suitable for certain databases but totally inappropriate for others (even within the same company). Most of the predefined tests are customizable to meet requirement of your organization. Additionally, to keep your assessments current with industry best practices and protect against newly discovered vulnerabilities, Guardium distribute new assessment tests and updates on quarterly bases as part of its Database Protection Subscription Service. Please refer to Guardium Administration Guide for more details.

 

What are Behavioral Tests

This set of tests assesses the security health of the database environment by observing database traffic in real-time and discovering vulnerabilities in the way information is being access and manipulated.

As an example, some of the behavioral vulnerability tests included are:

 

What are Configuration Vulnerability Tests

This set of assessments checks security-related configuration settings of target databases, looking for common mistakes or flaws in configuration create vulnerabilities.

As an example, the current categories, with some high-level tests, for configuration vulnerabilities include:

 

What are Custom Assessment Tests

Guardium provides an interface to define custom assessment tests, either as a Java class or through the Guardium’s query builder facility. A custom assessment test is a user-written vulnerability assessment test implemented as a Java class. Custom tests must be uploaded to the system by the administrator before they can be used. For information about creating and maintaining custom tests, see the Custom Assessment Tests topic in the Administrator Guide.

 

What are Query Based Tests

A query based tests are user defined tests that can be quickly and easy created by defining or modifying a SQL query, which will be run against database datasource and results compared to a predefined test value.