Hi,
I have a database program that I have designed for my department and I have a few questions concerning security that I hope someone here could educate me on.
I will admit, that up to this point I have been concentrating on building this database and not on securing it after it was built and was hoping someone could shed some light on what needs to take place concerning security and the law.
This database is currently setup to include personal info such as Name, address, phone, complete ssn # and complete drivers license number. I will soon change the ssn # to the last 4 digits and the dl# to the last four 4 digits. This database will be accessed remotely with employee laptops.
The database will be hosted at a third-party site (edthosting.com). It is sql backend and a microsoft access front end.
1. I understand that the access front end will communicate with the sql in an unencrypted fashion. The verizon aircard, in the vehicles, used software that can utilize vpn. I know what vpn is and understand that it basically is an encrypted tunnel between two computers. I have never used vpn and am unfimiliar with the details. Once a vpn account is created on the laptop the database could use this encrypted connection to communicate directly to the ip address where the sql database / server is located?
2. The SQL database, being that it on a third-party server, is it possible to encrypt this database for security yet still allow easy access to employees? If so, is this a function of the server it is located on? or a third party program?
3. I understand to have a strong password policy.
4. I understand to have whole disk encryption on the laptops (truecrypt)
5. Would it be better to have the laptops locked down so that only the database program has access thru the vpn to the database, and lock everything else off the internet?
6. utilize a software restriction policy to not allow installation of unauthorized programs
7. Do not allow use of usb drives on the remote access computer.
I am looking for a somewhat specific overview of the feasibility of what I have planned, and of what I am overlooking would be greatly appreciated.
Perhaps a suggestion of best practices concerning remote access and database security that people here use.
Conserve landfill space ... spay/neuter your pets.
I have a database program that I have designed for my department and I have a few questions concerning security that I hope someone here could educate me on.
I will admit, that up to this point I have been concentrating on building this database and not on securing it after it was built and was hoping someone could shed some light on what needs to take place concerning security and the law.
This database is currently setup to include personal info such as Name, address, phone, complete ssn # and complete drivers license number. I will soon change the ssn # to the last 4 digits and the dl# to the last four 4 digits. This database will be accessed remotely with employee laptops.
The database will be hosted at a third-party site (edthosting.com). It is sql backend and a microsoft access front end.
1. I understand that the access front end will communicate with the sql in an unencrypted fashion. The verizon aircard, in the vehicles, used software that can utilize vpn. I know what vpn is and understand that it basically is an encrypted tunnel between two computers. I have never used vpn and am unfimiliar with the details. Once a vpn account is created on the laptop the database could use this encrypted connection to communicate directly to the ip address where the sql database / server is located?
2. The SQL database, being that it on a third-party server, is it possible to encrypt this database for security yet still allow easy access to employees? If so, is this a function of the server it is located on? or a third party program?
3. I understand to have a strong password policy.
4. I understand to have whole disk encryption on the laptops (truecrypt)
5. Would it be better to have the laptops locked down so that only the database program has access thru the vpn to the database, and lock everything else off the internet?
6. utilize a software restriction policy to not allow installation of unauthorized programs
7. Do not allow use of usb drives on the remote access computer.
I am looking for a somewhat specific overview of the feasibility of what I have planned, and of what I am overlooking would be greatly appreciated.
Perhaps a suggestion of best practices concerning remote access and database security that people here use.
Conserve landfill space ... spay/neuter your pets.
Last edited: