Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Integrated Data Environments for Natural Resource Management NCAI Exchange Network Tribal User Meeting 9-10 April 2008 Considerations for Tribal Database Application Security Bill Farr President ResourceVue, LLC T: 801-458-5900, [email protected] © 2008 ResourceVue, LLC, All Rights reserved NCAI Tribal Data Types Examples etc… Haz Waste Departmental Unique Data Tracking Land Use, Air Water Resources Departmental Data Tracking Air EPA EN Node Clients Land Water GIS Assets Assets Ag Tribal Business Applications Contract, Grant Management Program Management Tribal Common Processes Finance etc… NCAI 9 Apr 2008 2 NCAI IT and Data Architectures Databases typically run on servers that have basic protection Client Server SW Code IIS Internet Explorer Firewall IIS and Oracle can reside on the same server, where IIS communicates with the Oracle database through port 1521 Web Web Services Client connects to IIS server over the Web and through a firewall using port 443 NCAI 9 Apr 2008 DB (Oracle) Users are authenticated using PKI certificates and strong passwords 3 NCAI Threats to Database Applications 80% of malicious activity on data comes from the inside… (Forester) Typical database application threats are: – SQL Injection – Inference – Web page hi-jacks Result: Unauthorized access to data NCAI 9 Apr 2008 4 NCAI Threats to Database Applications SQL Injection “…SQL injection attacks allow a malicious activity to execute arbitrary SQL code on the server. The attack is issued by including a string delimiter (') in an input field and following it with SQL instructions. If the server does not properly validate input, the instructions may be executed against the database. “ Malicious DB query NCAI 9 Apr 2008 5 NCAI Threats to Database Applications Inference – Inference occurs when users are able to piece together information at one security level to determine a fact that should be protected at a higher security level. Level 2 Level 1 Inference Allotment Ownership Tribal Member Name NCAI 9 Apr 2008 6 NCAI Threats to Database Applications Web page Hi-jacks A web page hi jack occurs when a malicious person tries to capture a URL/page name without going though any authentication. Hi-jack Malicious User Authentication NCAI 9 Apr 2008 Web page Database 7 NCAI What to ask the DB Developer What tiers/layers do you have in your application, and what security is built in? How do you handle SQL Injection attacks? How do you handle Inference attacks? How do you handle Web age Hijacks? How do you handle User Security? NCAI 9 Apr 2008 8 NCAI Example Answers What tiers/layers do you have…… Middle Layer Data Layer Web Services Internet Explorer The Internet Explorer client communicates to the IIS server through HTTPS NCAI 9 Apr 2008 IIS The IIS server passes user requests to the TVUtils object, which returns HTML and DHTML TVUtils The TVUtils object communicates with the DBUtils object using XML DBUtils DB The DBUtils object retrieves information from and updates information in the Oracle database using an OLEDB connection 9 NCAI Example Answers How do you handle SQL Injection attacks? “Our middle layer performs a format check on the DB request…” Is this request the correct format??? - NO: kick out - Yes: proceed Middle DBUtils NCAI 9 Apr 2008 Data Layer DB 10 NCAI Example Answers How do you handle Inference attacks? “1. If a user does not have the permissions they can not get to the next page, and….. 2. Error messages no display any data.” Level 2 Level 1 Inference X Allotment Ownership Tribal Member Name NCAI 9 Apr 2008 11 NCAI Example Answers How do you handle Web page Hijacks? “1. If a user does not have the permissions they can not get to the next page, and….. 2. each page checks the source of the request; if not authenticated, it throws a message: Hi-jack Malicious User Authentication NCAI 9 Apr 2008 Web page Database 12 NCAI Example Answers How do you handle User Security? “We use a multi-factored security model: •Realm: Separate data into virtual instances •Rule: Restrict DB operations to what is needed, when.. •Roles:Only allows users to perform the functions they need •Policy: Written policies on the above NCAI 9 Apr 2008 13 NCAI User Security Example ResourceVue – Super Node NCAI 9 Apr 2008 14 Mni Sose – Resourcevue Super Node NCAI Example Roll-up Queries EPA EN Mni Sose ‘Super-Node’ Node Client Rule: Only allow operations at certain hous Aggregated Multi-tribal Water Quality Environmental Data Data Services Mni Sose Coalition Portal DB DB Web Services Coalition Kickapoo Tribe 1 DB Web Services Omaha Web Services Coalition Ponca Tribe 3 DB Web Services Prairie Coalition Band Tribe 4 DB Potawatomi Web Services Realm: Separate, Secure Tribal Databases Role: Individual Member Log In Local Data Server Coalition Sac and Fox Tribe 5 DB Spreadsheet Searches Reports Documents NCAI 9 Apr 2008 Web Services Coalition Santee Tribe 6 DB Sioux Web Services Coalition Winnebago Tribe 7 DB 15 NCAI A Solution Web based – currently hosted at Mni Sose, Rapid City Member access, security, admin Multi-Tribal Partitions Program Area Apps: Water, Air, Facilities Document Library NCAI 9 Apr 2008 16 NCAI Role: Access to Water Assets Surface and Ground Water Sources Manage Baseline Data of Water Assets Monitoring Stations Manage Monitoring Stations NCAI 9 Apr 2008 17 NCAI Role: Manage of EPA Transactions Track each node client data submission history – EPA token ID, XML file (WQX) NCAI 9 Apr 2008 18 NCAI The Process - Node Client Flow Sample Process for Managing Water Quality Data Exchange 400 EPA Water Quality Engineers D A T A N N I N Reviewers G NCAI 9 Apr 2008 Set Standards S T O R E Water P Resources L Dept A 410 Receive Data Set 200 210 Manage Monitoring Stations Gather Water Quality Samples 100 Manage Baseline Data of Water Assets 110 Import Data Into Central Repository 120 130 Prepare EPA Data Exchange Format Invoke Node Client to Push Data Set to EPA 300 Review and Assess Water Quality Data 19 NCAI NCAI 9 Apr 2008 Questions….. 20 NCAI Bill Farr ResourceVue, LLC T: 801-458-5900 Email: [email protected] NCAI 9 Apr 2008 21