8 Steps to Holistic Database Security

Wednesday Apr 21st 2010 by Datamation.com Staff

This white paper from IBM-owned Guardium offers best practices for securing databases against growing threats.

Guardium: In the past, IT security efforts focused on the perimeter of networks, but now enterprise IT departments are being asked to secure databases in response to growing threats. Guardium offers eight steps enterprises can take to safeguard databases and comply with regulations:

  1. Discovery
  2. Vulnerability and Configuration Assessment
  3. Hardening
  4. Change Auditing
  5. Database Activity Monitoring (DAM)
  6. Auditing
  7. Authentication, Access Control and Entitlement Management
  8. Encryption
Mobile Site | Full Site
Copyright 2017 © QuinStreet Inc. All Rights Reserved