Imperva user rights management for databases



Compliance and Risk Reduction

In fact, all regulations require user rights to manage sensitive data. Compliance with these requirements is one of the most difficult tasks to perform effectively, although there is built-in database control. User Rights Management (URMD) for databases can help you establish an automated access rights review process to eliminate unauthorized user rights. It also enables you to demonstrate compliance with regulations such as SOX and PCI DSS. URMD reduces labor costs associated with database user access management.

Simplify user access compliance

URMD allows you to easily demonstrate an automated and repeatable process for reviewing access rights, which is required by SOX 302 and 404, PCI 7 and 8.5 regulations. URMD includes a workflow framework to support the user rights review and authorization process.

Save time by automatically connecting points

find the information you need to reduce the risk of unauthorized data access without consuming a lot of time in manually trying this activity. URMD automatically associates user rights with information about data sensitivity, thus quickly clarifying important relationships.

Discover and remove unauthorized access and hibernate users

hackers seek easy access to sensitive data. User accounts with a large amount of data access are valuable targets because they can provide a large amount of influence. Dormant user accounts are also valuable targets, because suspicious activities such as unexplained changes can occur when the account owner is not aware of them. With URMD, you can reduce the chance of security violations by identifying unauthorized users and dormant user accounts.


Specifications

User permissions for databases

SpecificationsDescription
Supported database platforms
  • Oracle

  • Oracle Exadata

  • Microsoft SQL Server

  • IBM DB2 (on LUW)

Centralized user permission management
  • aggregates user permissions in all enterprise databases into a single repository for centralized management.

Access audit
  • You can automatically complete the repeatable process of auditing user access rights.

User ultra vires behavior analysis
  • supports a comprehensive investigation of ultra vires

  • User permissions

LDAP integration
  • Add user organization details (role, department, manager) to help verify whether users access based on "need to know"

Predefined reports
  • Fixed reports show valid user permissions, permission grants, role grants, unapproved permissions, and unused permissions.

compliance report
  • compliance reporting simplifies reporting on users' access to sensitive data. The user rights change log shows the existence of a user rights auditing process.

Custom reports
  • Custom reports can be easily created to record analysis results

authentication workflow
  • Authorize or request to revoke user access based on the analysis results.

platform
  • add options to all SecureSphere database security product platforms, including virtual platforms

Licensing options
  • Time-based license: expires 30 days after activation

  • Permanent license: No expiration date

in andDatabase activity monitoringorDatabase Firewallintegration:
Permission usage analysis
  • For more information, see the usage frequency and last usage date.

Hibernation permission
  • Find a user who has not used its permissions for a period of time.

Hibernation account
  • shows the last time the account accessed the database.