Databases
Overview
Monitoring database logs to detect and respond to unauthorized access, potential data breaches, abnormal queries, and other security-related events.
Sample products
- Imperva SecureSphere
- IBM Guardium
Use Case Categories
Category | Description |
---|---|
Unauthorized Database Access Detection | Proactively monitors database activity to detect and respond to unauthorized attempts to access databases. |
Database Configuration Changes Monitoring | Monitors changes to database configurations to ensure compliance, minimize vulnerabilities, and maintain stability. |
Sensitive Data Exposure Alerts | Detects and alerts on potential exposure of sensitive data within databases, safeguarding against data breaches and ensuring regulatory compliance. |
Anomalous Database Query Patterns | Identifies irregular patterns in database queries to detect potential security threats or unauthorized activities. |
Failed Database Login Attempts | Monitors and analyzes failed database login attempts to identify potential credential misuse or security breaches. |
Core Use Cases
Alert Name | Description |
---|---|
Anomalous Login Activity Detection | Monitor database login activity for anomalies such as unusual login times, excessive failed login attempts, or logins from unexpected locations. |
Privileged User Activity Monitoring | Monitor activities performed by privileged database users, such as administrators or DBAs, to detect unauthorized access or suspicious behavior. |
User Account Permission Changes | Monitor changes to user account permissions and privileges within the database to detect unauthorized elevation of privileges. |
Database Connection from Blocklisted IPs | Monitor database connections for connections originating from blocklisted or suspicious IP addresses. |
Suspicious Query Patterns Detection | Monitor database query activity for suspicious patterns or queries indicative of unauthorized access attempts or data exfiltration. |
Unauthorized Database Configuration Changes | Monitor database configuration files for unauthorized modifications or changes. |
Suspicious Database Schema Alterations | Monitor database schema for suspicious alterations or modifications that may indicate unauthorized changes. |
Database Role Permission Changes | Monitor changes to database roles and permissions for unauthorized modifications or elevation of privileges. |
Abnormal Database Configuration Backup Activity | Monitor database configuration backup logs for anomalies or irregularities in backup processes. |
Unauthorized Query Activity Detection | Monitor database query logs for unauthorized or suspicious activity. |
Data Encryption Status Monitoring | |
Monitor database encryption status to ensure sensitive data is adequately protected. | |
Suspicious Data Replication Activity | |
Monitor database replication logs for suspicious or unauthorized replication activity. | |
Unusual Query Sources | |
Monitor database access logs for queries originating from unexpected or unauthorized sources. | |
Query Rate Anomaly Detection | |
Monitor database query rates and identify anomalous patterns of query frequency. | |
Abnormal Database Performance Monitoring | Monitor database performance metrics for abnormal fluctuations or degradation in performance. |
Long-Running Query Identification | |
Monitor for queries with excessively long execution times or resource consumption. | |
Suspicious Account Lockouts Monitoring | Monitor database authentication logs for unusual patterns of account lockouts. |
Anomaly in Login Source Locations | Monitor database authentication logs for login attempts from unexpected or unusual geographic locations. |
Brute-Force Attack Detection | Monitor authentication logs for patterns indicative of brute-force attacks attempting to gain unauthorized access to the database. |
MITRE ATT&CK
T1110, T1552, T1566 , T1055, T1078, T1087, T1069, T1070 , T1566, T1190, T1071, T1048, T1105, T1106, T1564, T1560, T1487, T1070, T1082, T1550, T1498, T1570, T1485, T1010, T1083, T1049, T1119, T1573, T1005, T1133, T1114, T1132, T1016, T1115, T1488, T1491, T1494, T1059, T1053, T1028, T1110, T1562, T1018