Data Management

PolicyReplay: Misconfiguration-Response Queries for Data Breach Reporting

Free registration required

Executive Summary

Recent legislation has increased the requirements of organizations to report data breaches, or unauthorized access to data. While access control policies are used to restrict access to a database, these policies are complex and difficult to configure. As a result, misconfigurations sometimes allow users access to unauthorized data. In this paper, the authors consider the problem of reporting data breaches after such a misconfiguration is detected. To locate past SQL queries that may have revealed unauthorized information, they introduce the novel idea of a Misconfiguration Response (MR) query. The MRquery cleanly addresses the challenges of information propagation within the database by replaying the log of operations and returning all logged queries for which the result has changed due to the misconfiguration.

  • Format: PDF
  • Size: 599.1 KB