Ads
related to: best practices for database security and management
Search results
Results From The WOW.Com Content Network
These may reflect general information security requirements or obligations imposed by corporate information security policies and applicable laws and regulations (e.g. concerning privacy, financial management and reporting systems), along with generally accepted good database security practices (such as appropriate hardening of the underlying ...
Database activity monitoring (DAM, a.k.a. Enterprise database auditing and Real-time protection [1]) is a database security technology for monitoring and analyzing database activity. DAM may combine data from network-based monitoring and native audit information to provide a comprehensive picture of database activity.
Ron Ben-Natan, IBM Gold Consultant and Guardium CTO. Implementing Database Security and Auditing. Digital Press, 2005. KK Mookhey (2005). IT Audit. Vol. 8. Auditing MS SQL Server Security. IT Audit. Vol. 8 Murray Mazer. Database Auditing-Essential Business Practice for Today’s Risk Management May 19, 2005.
Information security managers (or equivalent) IT auditors; The commitment provided by top management to promoting good information security practices across the enterprise, along with the allocation of appropriate resources. Security management arrangements within: A group of companies (or equivalent) Part of a group (e.g. subsidiary company or ...
The first part, containing the best practices for information security management, was revised in 1998; after a lengthy discussion in the worldwide standards bodies, it was eventually adopted by ISO as ISO/IEC 17799, "Information Technology - Code of practice for information security management." in 2000.
ISO/IEC 27002 provides best practice recommendations on information security controls for use by those responsible for initiating, implementing or maintaining information security management systems (ISMS). Information security is defined within the standard in the context of the CIA triad:
Ad
related to: best practices for database security and management