A
A
AntohaRomaha2015-12-04 11:37:39
Information Security
AntohaRomaha, 2015-12-04 11:37:39

How to track the copying of database files?

Good afternoon.
There is a task - to protect all files of databases. What software can be used to track local copying, copying to a USB flash drive, copying over the network, as well as uploading to the Internet? Interested only in certain files, quite large in size with a certain extension.
It is necessary to monitor Windows Server 2008 R2, and NAS Netgear, there is Linux with a web face. There are bases on them, it is necessary to take control.
There is a gateway on FreeBSD 10.2 - but it can be tracked, I believe, only uploading to the Internet.

Answer the question

In order to leave comments, you need to log in

8 answer(s)
A
AntohaRomaha, 2016-02-09
@AntohaRomaha

I will try staffcop

A
alexxandr, 2015-12-04
@alexxandr

database files and backups on a separate NAS and deny access to it to everyone except applications that work with the database.

O
other_letter, 2015-12-04
@other_letter

Who are the recipients of the information? Your employees or end users? If the first - it's easier, probably, to track them. If the second ... Perhaps, I don’t know ...

A
Armenian Radio, 2015-12-04
@gbg

It can do (partially) audit files in windows. Well, or some secret net.
In general, configure the access rights properly. It is not good for employees to have access to database files.

M
mace-ftl, 2015-12-04
@mace-ftl

usb_lock1.png
from here ptraffer.ru/analiz-trafika/69-control-usb

A
apreobr, 2015-12-04
@apreobr

Prohibiting copying of specific files makes sense only as one of many points of protection. The database can be pulled out via mail, archived into a multi-volume archive with a non-standard extension and copied over the network to a computer that is allowed access to public mail servers. The closest thing to a universal solution is the differentiation of access rights.
- We had 2 domain controllers, 75 group policies, 5 access logs, half the enterprise information security scheme and a whole lot of USB blocking utilities, as well as antivirus, DIP, a video camera box, file access restriction by extension and and the head of the security department. Not that it was the necessary margin to protect the database. But once you start doing IS, it becomes hard to stop. The only thing that caused me concern was extensions. There is nothing more helpless, irresponsible and corrupt than filtering access by extension. I knew that sooner or later we would switch to this rubbish.

N
nApoBo3, 2015-12-09
@nApoBo3

It is generally impossible to protect a file database from copying without an intermediate layer. This operation can be somewhat difficult. But if the user can work with this database, then he can copy it.

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question