Business Intelligence

Policy-Based Enforcement of Database Security Configuration through Autonomic Capabilities

Download Now Free registration required

Executive Summary

Significant emphasis has been placed recently on the hardening of databases and on regular audits of such systems by independent auditors and certified Information Systems Security Officers (ISSO). Data centers hosting sensitive data and mission-critical systems, especially centers that belong to governmental agencies, have been under tremendous pressure to secure their databases in compliance with several security guidelines. Such requirements mandate that each system passes a strict security scan before it is deemed suitable to go into operational mode and that it be subjected to regular audits thereafter.

  • Format: PDF
  • Size: 404.77 KB