Mitigate Risk and Pass Audits
User Rights Management for Databases (URMD) enables automatic aggregation and review of user rights, focused analysis of rights to sensitive data and the identification of excessive rights and dormant users based on organizational context and actual usage. Using URMD, organizations can demonstrate compliance with regulations such as SOX, PCI 7, and PCI 8.5 and reduce the risk of data breach. URMD is an add-on option to Imperva's Database Security Products.
To learn more, click on the Capabilities tab.
Audit: Aggregate and Report on Access Rights across Databases
User Rights Management for Databases (URMD) streamlines the process of aggregating, consolidating and reporting on user access rights across heterogeneous enterprise databases. The automated audit process significantly reduces the time and resources required for gathering user rights. Consolidated reports provide a full overview of user rights across all databases and enable reviewers to focus on changes since the last review.
Investigate: Does the User have Access to Sensitive Data?
SecureSphere enables organizations to map out databases and discover where sensitive data resides on the corporate network. Data Classification provides insight into the different types of sensitive data that are stored in database objects. URMD correlates the user rights with information about the object’s sensitivity, allowing organizations to focus on analyzing access rights to sensitive data which represents the highest business risk.
Validate: Should the User Have Access to Sensitive Data?
Access to sensitive objects needs to be granted based on ‘Need-To-Know’ which is typically defined by the users’ organizational context. By adding details such as the user role and department, reviewers have full visibility into the user job function and the type of data he/she can access. URMD's analytical views provide reviewers with the ability to determine if the user access rights are appropriately defined and enable the removal of excessive rights that are not required for the users to do their job.
Mitigate: Remove Excessive Rights and Dormant Users
When SecureSphere Database Activity Monitoring (DAM) is deployed in conjunction with URMD, it is possible to track the actual usage of database objects by different users. A combined report showing the user, its organizational role, the type of data the user is allowed to access and the actual usage of that data, helps identify dormant users and un-used access rights. Such rights can now be safely removed from the database and reduce the risk of exploitation.
Manage: Built-In Workflow for Reviewing and Approving User Rights
With Imperva URMD organizations can easily demonstrate an automatic, repeatable process for reviewing access rights as required by regulations like PCI DSS and SOX. Imperva URMD includes a work-flow framework to support user rights review and authorization processes. URMD provides a full audit trail of the right granted/revoked including the grantee and granted details. Administrators can accept or reject privileges and add comments to explain the decision. When further action is required, a task can be assigned and its status is tracked within SecureSphere.
User Rights Management for Databases Specifications
|Supported Database Platforms|
|Centralized User Rights Management|
|Access Rights Review|
|Excessive User Rights Analysis|
|When integrated with Database Activity Monitoring or Database Firewall:|
|Rights usage Analysis|