Editor’s Note: Read this related blog:“The Structured Future of Data Access Governance“.
There are generally two kinds of data: structured and unstructured. An oversimplification shown in Figure 1 below is essentially correct. When we say, “structured data”, we usually mean traditional data that possess organized layouts with somewhat predictable growth characteristics. In fact, for relational databases, we would further assume that means spreadsheet-like tables having rows and columns (a.k.a. relations, tuples, and attributes). So, for now, let’s just focus on the right-hand side of the above diagram.
What does it mean to secure structured data? While that may seem like an easy question, it is in fact far more complex than one might initially surmise. We first need to understand the fundamental nature of data. Sometimes information systems professionals can draw some very useful analogies from the hard sciences. For example, physics offers us one very useful concept – the states of matter. Figure 1 shown below is an excellent diagram that I modified from Wikipedia explaining the four states of matter.
Looking at these four states, I’m going to strongly suggest that from a higher level there are just two fundamental states – bound and liberated. Bound connotes that molecular cohesion binds the matter into a semi-solid to solid state, while liberated signifies that the matter overcomes molecular cohesion to more freely “bounce around” and thus be anti-solid. It is my contention that data is like matter and that it possesses just these two fundamental states: inert (i.e. at rest) and in motion. Thus, securing data means protecting it while it exists in either state.
Basic techniques for protecting structured data in motion
These are the high-level and obvious basics. In an upcoming series of blogs, I’ll delve into more detailed low-level techniques by which to secure your structured data databases such that they can pass a basic vulnerability assessment test. For now, I’ll end with this thought: even if you implemented all ten of the items listed above, you probably would not pass vulnerability assessment examination. In fact, you might fail and fail miserably.
At the end of this series, I will be wrapping it up in a live webinar. REGISTER TODAY!
Bert Scalzo is STEALTHbits Technical Product Manager for databases. He’s an Oracle ACE, blogger, author, speaker, and database technology consultant. He has BS, MS and Ph.D. in computer science, an MBA, and has worked for over 30 years with all major relational databases, including Oracle, SQL Server, DB2 LUW, Sybase, MySQL, and PostgreSQL. Moreover, Bert has also has worked for several of those database vendors. He has been a key contributor for many popular database tools used by millions of people worldwide, including TOAD, Toad Data Modeler, ERwin, ER/Studio, DBArtisan, Aqua Data Studio, and Benchmark Factory. In addition, Bert has presented at numerous database conferences and user groups, including SQL Saturday, SQL PAAS, Oracle Open World, DOUG, ODTUG, IOUG, OAUG, RMOUG, and many others. His areas of interest include data modeling, database benchmarking, database tuning and optimization, “star schema” data warehouses, Linux®, and VMware®. Bert has written for Oracle Technology Network (OTN), Oracle Magazine, Oracle Informant, PC Week (eWeek), Dell Power Solutions Magazine, The LINUX Journal, LINUX.com, Oracle FAQ, and Toad World. Moreover, Bert has written an extensive collection of books on database topics, focusing mainly around TOAD, data warehousing, database benchmarking, and basic introductions to mainstream databases.
Adopting a Data Access Governance strategy will help any organization achieve stronger security and control over their unstructured data. Use this free guide to help choose the best available solution available today!
Read more© 2022 Stealthbits Technologies, Inc.
Leave a Reply