Establishing Databases and Data Warehousing
895
For example, organizations may approach email service in two ways. They might pur-
chase physical or virtual servers and then install email software on them, such as Microsoft
Exchange. In that case, the organization purchases Exchange licenses from Microsoft and
then
installs, configures, and manages the email environment.
As an alternative, the organization might choose to outsource email entirely to Google,
Microsoft, or another vendor. Users then access email through their web browsers or
other tools, interacting directly with the email servers managed by the vendor. In this case,
the organization is only responsible for creating accounts and managing some application-
level settings.
In
either case, security is of paramount concern. When the organization purchases and
configures software itself, security professionals must understand the proper configuration
of that software to meet security objectives. They also must remain vigilant about security
bulletins and patches that correct newly discovered vulnerabilities. Failure to meet these
obligations may result in an insecure environment.
In the case of SaaS environments, most security responsibility
rests with the ven-
dor, but the organization’s security staff isn’t off the hook. Although they might not be
responsible for as much configuration, they now take on responsibility for monitoring
the vendor’s security. This may include audits, assessments, vulnerability scans, and
other measures designed to verify that the vendor maintains proper controls.
The orga-
nization may also retain full or partial responsibility for legal compliance obligations,
depending upon the nature of the regulation and the agreement that is in place with the
service provider.
Establishing Databases and Data
Warehousing
Almost every modern organization maintains some sort of database that contains infor-
mation critical to operations—be it customer contact information, order-tracking data,
human resource
and benefits information, or sensitive trade secrets. It’s likely that many
of these databases contain personal information that users hold secret, such as credit card
usage activity, travel habits, grocery store purchases, and telephone records. Because of the
growing
reliance on database systems, information security professionals must ensure that
adequate security controls exist to protect them against unauthorized access, tampering, or
destruction of data.
In the following sections, we’ll discuss database management system (DBMS) architec-
ture, including the various types of DBMSs and their features. Then we’ll discuss database
security
considerations, including polyinstantiation, Open Database Connectivity (ODBC),
aggregation, inference, and data mining.