Then secretary of Defense Donald Rumsfeld popularized the terms:
“known knowns”, “known unknowns”, and “unknown unknowns.” With
the ever-increasing number of data breaches and vulnerabilities,
database operation teams have to account for every possibility.
Visualizing your audit data allows you to look for the
“unknowns”, those access patterns or connections that you’d
otherwise overlook.
Although enabling an audit log and shipping it off to a vault may
meet security and regulatory requirements, you will lose an
important opportunity to protect your customer and employee
information.
The following dashboard demonstrates the type of information that
audit logs can reveal:
- Who is connecting to my database (IP address, location,
username..)
- Who is trying to connect to my database but getting
access errors?
- Which tables are being accessed and by whom?
…
[Read more]