Oracle Security is easier if you design for it
View Profile | WWW | Email
database applications access logging
« on: Aug 20th, 2009, 4:30pm »
Quote | Modify
Hi.I'm starting a new project which covers overall organization information security.My background is essentially in networking arena so i'm starting getting my feet wet into database security field.
My question is what would be an efficient approach to monitor access violations to applications connect to databases? Our engine is DB2 (yeah i know wrong forum but this forum seems only devoted to security in database) so i'd like to hear from experts what would be a strategy to detect our main concern which is how to tell if some users are inapropiatelly accessing information.My first thinking was detecting a compromised database user id would be difficult and that we should focus on:
Failed Authentication Detection
How could i achieve this? Is this the right approach?