Questions You Should Ask About the Databases You Manage

SQL Server
18 Comments

First, what data do we have?

  1. Do we store any personally identifiable data?
  2. Does any of that data include children?
  3. Do customers believe that this data will never be seen publicly?
  4. Do customers believe that this data will never be seen by your employees?

Next, what would happen if this data became public?

  1. What would happen if all of the data was suddenly available publicly?
  2. What would happen if the not-really-considered-private data was made public? (Customer lists, products, sales numbers, salaries)
  3. If someone got a copy of our backups, what data would they be able to read?
  4. If someone got the application’s username/password, what data would they be able to read?
1.5TB of flash drives. All your backups in my pocket.
1.5TB of flash drives. All your backups in my pocket.

What are we doing to ensure those scenarios don’t happen?

  1. If our backups aren’t encrypted, do we know everywhere that the backups are right now?
  2. How are we preventing people from taking out-of-band backups?
  3. How are we preventing systems administrators from taking snapshot backups or copying backups?
  4. How are we preventing people from running queries, saving the output, and taking them out of the building?
  5. For each of these scenarios, do we have a list of all of the people who could accomplish these tasks?
  6. For each of these scenarios, would we know if they happened?

And finally:

  1. Overall, what risks are out there?
  2. Have you documented the risks in writing?
  3. Has this risk list been given to management?
  4. Or, when any of these scenarios eventually happen, are you going to be the one who was assumed to be protecting the business from this kind of thing?

After all, notice the title of this blog post – you’re managing the databases, right?

Previous Post
Triage Quiz: Is Your SQL Server Safe?
Next Post
Let’s Make a Match: Index Intersection

18 Comments. Leave new

  • Policy mantle questions !!

    Reply
  • I’d be curious to hear about good ways to address this one: “How are we preventing people from running queries, saving the output, and taking them out of the building?”

    Reply
    • I really don’t see how you can prevent that. I mean, if someone is dedicated enough they’ll just take a series of screen captures and save them off.

      Reply
    • This was my question as well. Is it possible to prevent this entirely? IT can lock down flash drives through GPOs and such, but who/what can prevent a rogue dev from saving the output in SSMS and emailing it to himself, uploading to Dropbox, Google Drive, etc? Can a DBA disable the “Save Results As” functionality in SSMS?

      Reply
      • Easy – don’t give your devs access to production environments.

        Reply
        • In my experience, developers who have access to production data are usually pretty responsible about it. The problem is not from the responsible or locked-down Devs, but from business users who can access data as part of their jobs, and have very little regard for its safety.

          Reply
          • That’s kinda like saying in my experience, I haven’t needed life insurance.

          • no, i was responding to “Easy – don’t give your devs access to production environments.” to point out its often not the devs who are the main risk. not that they aren’t a risk.

          • Or more so the temporary contractors they bring in and give a lot of access to.

      • One of the places I used to work used to disable all the USB ports on the computer if a nonapproved disk drive was plugged in. I don’t recall how exactly it worked, it used a hardware id to provide exceptions, but it is possible. As soon as a device was plugged in that wasn’t on the approved list, it sent us an alert (computer name, logged on user, etc) and essentially locked the computer until it was rebooted.

        Reply
    • Query > Query Options > Results > Discard results after executing

      This might work if it can be enforced at the role level.

      Reply
  • All your backup are belong to us

    Reply
  • Well let’s see…

    They regularly hire contractors who use their laptops for short term stints to help them and give them a lot of access so how secure is that?
    And when you identify this issue it’s ignored. As for the data itself, someone else can chose a solution that is very time intensive (static masking for example) but you don’t get any more resources.
    Oh yah, this worked out well.
    As for suggestions, well management makes those decisions. 🙂 Doesn’t matter what you suggest it seems.
    Sometimes trying to do the right thing can be somewhat frustrating.

    Reply
    • P.S.
      A possibility was have the application encrypt those fields that are deemed sensitive as it has provisions to do so. Wasn’t chosen.

      Reply
  • One question you didn’t mention. For each security measure we decide to implement, what is it’s cost? Both in terms of time to get it setup, and lost productivity for those people who are impacted. Every security measure has a cost to someone, even something as simple as a door lock (it takes you a couple seconds to open the lock).

    Reply
  • Alex Friedman
    June 19, 2016 5:46 am

    And here I thought you don’t do security work 😉

    Reply

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.