DBF Deck
DBF Deck
Network Public/Private
Microservices Unstructured/
Outsider Threats Applications & APIs Insider Threats
Structured Data
WAF Gateway
Attack Analytics (AA) Attack Analytics
DDoS (3s SLA) Client Reputation
Cloud WAF API Anywhere Protects Workloads
Advanced API Security ABP Connector Running On
Advanced Bot Protection (ABP)
Client-Side Protection
Waiting Room
1
26-Mar-25
2
26-Mar-25
Challenges
22B
• Data breaches often are a series of failure points total records compromised
1,120
• Many database attacks are due to simple misconfiguration Breaches
2020
and privilege escalation 20.2B
956 records compromised
Breaches
2019
12.3B
• Expanding data uses and APIs present dangerous new records compromised
https://www.cshub.com/attacks/articles/the-biggest-data-breaches-and-leaks-of-2022
Challenges
+
Insider Threat Shared credentials Lenient Misconfigured
Entitlements database
Failed audit
Exfiltration Undetected Leaked or exposed
privilege escalation credentials
3
26-Mar-25
Challenges
Challenges
4
26-Mar-25
Noise Threat
Data Risk Analytics Correlation Detection Enrichment
Reduction
Ecosystem
10
5
26-Mar-25
RDS,
Redshift, S3 Ex: CloudWatch
Agent Gateway
Cluster
Agentless
Gateways Agentless
Datacenter Gateways
or cloud
11
DBaaS
▪ Cover both your immediate
needs & future integrations as
you expand use cases Amazon
Document
DB
Privileged
Metadata Change
CMDB Control
Access Identity SIEM
Management
12
6
26-Mar-25
How We Do It ?
13
14
7
26-Mar-25
15
• In cloud services
Scan
2) Classify Regulated or Sensitive Data
How it Helps
Identify Sensitive
• Know what sensitive data you hold
Data
• Know where that data is stored
16
8
26-Mar-25
DB Assessment Scan
Scan
• Templatized
• Out-of-the-box policies
• Create custom policies
Identify
Vulnerability
Industry Frameworks
• Over 1,500 pre-defined vulnerability tests
• CIS, DISA STIG Benchmarks
Fix
• Known CVEs
17
Account Dept Priv Type Sys Priv Object Schema Type Sensitivity Category Object Last Used
John RND SELECT Normal Customer Bills Table Sensitive Credit Card 2020-03-20
18
9
26-Mar-25
19
20
10
26-Mar-25
Track & Flag Database Activity Description Application Accessed SQL Server from Unauthorized IP 172.165.10.23
• Users
• Data Accessed When? March 20, 2020 8:35:14
• Data Operations
Where? MS SQL Server, Arlington VA Data Center
• Privileged Operations
Who? User: dev_app
How it Helps
How? MS SQL Studio Management Studio Express
• Single view across data footprint
• Comprehensive incident details What? SELECT * from ‘ShortPositions’
21
Enabled Response
Automated actions and integrations
Followed Action
Create an incident
Assign task
Identify severity
22
11
26-Mar-25
Step 3: Audit
Create audit trail and produce audit reports
23
March 20, 2020, 09:33:13 165.133.10.8 Mohamad 11.11.133.5 IBM Db2 sqlplusw.exe SELECT * from users
March 20, 2020, 09:33:49 165.133.10.8 Mohamad 11.11.133.5 IBM Db2 sqlplusw.exe SELECT * from credentials where user=’ben.paul’
March 20, 2020, 09:34:55 165.133.10.8 ben.paul 11.11.84.12 MySQL sqlplusw.exe SELECT * from Accounts
March 20, 2020, 09:35:15 165.133.10.8 ben.paul 11.11.84.12 MySQL sqlplusw.exe SELECT * from PaidBills
March 20, 2020, 09:35:47 165.133.10.8 ben.paul 11.11.84.12 MySQL sqlplusw.exe SELECT * from CreditCards where status-=’pending’
Captures Everything
Granular Audit Policies How it Helps
Storage and Retention Proof of audit integrity requirements
• Policy Based Storage Assignment Proof of verifiable change control
• Archiving and Purging Mechanism Meet regulatory retention period requirements
“READ-ONLY” access
24
12
26-Mar-25
How it Helps
• Simplify and reduce manual work
• Scheduled or on-demand
25
Step 4: Secure
Create audit trail and produce audit reports
26
13
26-Mar-25
Audit Policy
Out-of-the-Box and/or Custom
• Simple to use, easy to deploy
How it Helps
By Specific User
• Instant best practices for common use cases
27
Monitor critical
assets with out of box
policies
Use audit data to
create normal
Leverage Imperva
behavior baseline
Risk Analytics to
identify usage
anomalies and other Additionally apply
risky behavior custom policies for
your unique business
requirements
28
14
26-Mar-25
Sensitive Database
Who is connecting to the What data are they How much data do they
database? accessing? query?
How do they connect Do their peers access data When do they usually
to the database? in the same way? work?
29
• Data Scientist
30
15
26-Mar-25
• Client port
• OS user
• Client port
IMPERVA DATA RISK ANALYTICS (DRA) WORKS AT
• User domain
THE INTERSECTION OF USERS AND DATA WHERE
• User identity
• OS user
• Server IP
• Data sensitivity • File type • Database name • Number of rows • Database error code
• User department
• File share IP
Server response time • SQL operation and type • Database error code
BREACHES • File type • Table name
File type • Table name • Server response time • File operation • Data sensitivity
• Client application
• Affected rows • File name • Operation response time • SQL operation and type • Schema
DATA
OS user
Client IP
Server IP
31
WHO?
WHAT?
WHERE?
IS IT OK?
32
16
26-Mar-25
33
Step 5: Remediate
How Imperva empowers your teams
34
17
26-Mar-25
Key Takeaways
Start with what matters most
▪ Do you know where your sensitive data is?
▪ Can you tell who accesses what data, and how its used?
Compliant?
▪ Can you determine which data access is appropriate?
▪ Can you detect suspicious data access with high confidence?
▪ Do you have the necessary records for audit and incident response?
35
Thank You
36
18
26-Mar-25
2) Subscription Plan
- Subscription (VMs. Low start-up investment)
- DataSecure/360 Plans: Subscription with Appliance
- PS: Quickstart 2 or 4 weeks (mid to large & complex deployment)
3) Sizing
- Spreadsheet for customer to input
- Purpose: Supported DBs or Not, highlight challenges, Propose Solution
37
38
19
26-Mar-25
Admin
Administrator
(Web Browser) • Audit Data
LEARN AND DETECT • Online Audit
• Config Backup
Third Party IT
Management
Ecosystems
Data Risk Analytics Management
Behavioral
Analytics
User Interface Server (MX)
(Admin)
LDAP Ticketing
Analysis
Audit Audit
Data Data
SIEM SQL
Data Risk Analytics
Agent Gateway Agent Gateway
Imperva Agent Gateway
Cluster (N+1)
DB
Real-time
Collection
DB
Agent DB audit Agent
Data
activities
DB Server DB Server
39
• Audit Data
• Online Audit
• Config Backup Third Party IT
DSF
Admin
Unstructured file Encryption / Ecosystems
discovery Tokenization Administrator
(Web Browser)
3rd party OEM integration
LDAP Ticketing
(Data Risk Management)
Management
Data Security Fabric SIEM SQL
Management Hub
Server (MX)
Audit Audit
Data Agentless Gateways
Data
Data Risk Analytics
Behavioral
User Interface
Analytics
Agent Gateway Agent Gateway Agentless Gateways (Admin)
Imperva Agent Gateway
Cluster (N+1)
Collection
DB DB
Agent DB audit Agent
activities
DB
DB Server DB Server DBaaS / AWS
Servers
Aurora / Azure
SQL / etc
Proprietary and confidential. Do not distribute.
40
20