Database Vulnerability Assessment
A network-based, vulnerability assessment scanner, AppDetectivePro discovers database applications within your infrastructure and assesses their security strength.
Databases frequently contain business critical information such as customer names, company account information, credit card details etc. Over the last few years there has been an ever increasing awareness that databases are being targeted by professional hackers for financial gain. Greater demands for 24 hour access to business applications by vendors, suppliers and customers has greatly increased the number of databases and the number of people and applications requiring access to the information contained within the database. Databases are complex pieces of software with vulnerabilities which can be exploited by criminals who are determined to access your critical business information.
A Database Vulnerability Assessment is a ‘point in time assessment’ on the security posture of a specific database. Each database can be configured in a different way so it is crucial that each business critical database be assessed regularly to ensure that they are protected against the ever changing threats.
Database Vulnerability Assessments usually include three key elements:
§Discovery/Inventory of all databases residing on the network.
§Penetration Testing. This is where the external threats to your database are investigated i.e. what potential avenues might a hacker attempt to gain access to the database and your critical information.
§Security Auditing or checking for vulnerabilities and configuration weaknesses which might be exploited by someone who is authorised to be on your network i.e. an insider. It is key to ensure that all possible steps are taken to identify and resolve potential vulnerabilities such as default, weak or blank passwords, misconfigurations and incorrect permissions.
The results of the scans can then be used to actively and continually harden the database from the latest threats in order to mitigate the risk of compromise by intruders.