39
Building Security Audits with Extended Events

BuildingSecurity Audits with Extended Events

Embed Size (px)

Citation preview

Page 1: BuildingSecurity Audits with Extended Events

Building Security Audits with Extended Events

Page 2: BuildingSecurity Audits with Extended Events

Jason Strate

e: [email protected]

e: [email protected]

b: www.jasonstrate.com

t: StrateSQL

Resources jasonstrate.com/go/xevents

Introduction

MAKING BUSINESS INTELLIGENT www.pragmaticworks.com

Page 3: BuildingSecurity Audits with Extended Events

MAKING BUSINESS INTELLIGENT www.pragmaticworks.com

• Founded 2008 by MSFT MVP Brian Knight• Focused on the MSFT SQL Server Platform• Provides services, training and software• MSFT/HP “go to” partner: • Gold Certified:

o BIo Data Managemento SQL Performance

• Team led by multiple MVP’s• Offices throughout the US with Corporate

HQ in Jacksonville, FL

Pragmatic Works Company History

Page 4: BuildingSecurity Audits with Extended Events

It’s 12 o’clock…

Page 5: BuildingSecurity Audits with Extended Events

Do you know where your data is?

Page 6: BuildingSecurity Audits with Extended Events

Do you know who is accessing your data?

Page 7: BuildingSecurity Audits with Extended Events
Page 8: BuildingSecurity Audits with Extended Events

> ACCESS GRANTED!

Page 9: BuildingSecurity Audits with Extended Events

Agenda

Why Security Audits?

Security Audit

Components

Building a Login Audit

Building a Query Audit

Page 10: BuildingSecurity Audits with Extended Events

Agenda

Why Security Audits?

Security Audit

Components

Building a Login Audit

Building a Query Audit

Page 11: BuildingSecurity Audits with Extended Events

Why Do We Need Security Audits?

Regulations

Corporate Policy

Responsibilities

Page 12: BuildingSecurity Audits with Extended Events

Most Important Reason

Everyone Lies!Even Unicorns,While They AreDoing Their Jobs

Page 13: BuildingSecurity Audits with Extended Events

Validate Security

DataUsers

Page 14: BuildingSecurity Audits with Extended Events

Types of Audits

Common Criteria Compliance

C2 Audit Tracing

SQL Audit

Extended Events

Page 15: BuildingSecurity Audits with Extended Events

Types of Audits

Common Criteria Compliance

C2 Audit Tracing

SQL Audit

Extended Events

Page 16: BuildingSecurity Audits with Extended Events

CCC and C2 Concerns

• Difficult to manage

• Too much data

• Too little control

• Behavior changes in SQL Server

MAKING BUSINESS INTELLIGENT www.pragmaticworks.com

Page 17: BuildingSecurity Audits with Extended Events

SQL Audit

• Two audit levels– Server (Instance)– Database

• Captures preset data• Sync or async targets

– File– Security log– Application log

• Standard and Enterprise– SQL Server 2012

MAKING BUSINESS INTELLIGENT www.pragmaticworks.com

Page 18: BuildingSecurity Audits with Extended Events

SQL Audit

• No control on columns– Maybe too much data

• Limited output formats– Maybe need in-flight

aggregation

• Need something less?

MAKING BUSINESS INTELLIGENT www.pragmaticworks.com

Perfect for tracking permissions changes, login creation, DBCC

activity, backups and restores, etc.

Page 19: BuildingSecurity Audits with Extended Events

Do you know SQL Audit?

Page 20: BuildingSecurity Audits with Extended Events

SQL AUDIT

Demo

Page 21: BuildingSecurity Audits with Extended Events

“Lower” Solution

• Less invasive

• Temporary need

• Scenarios…– What about Bob, the New

DBA?

– How often is Sally accessing the database?

– What is the application logon/logout frequency?

MAKING BUSINESS INTELLIGENT www.pragmaticworks.com

Page 22: BuildingSecurity Audits with Extended Events

Agenda

Why Security Audits?

Security Audit

Components

Building a Login Audit

Building a Query Audit

Page 23: BuildingSecurity Audits with Extended Events

Components

Events Actions

Predicates Targets

Packages

MAKING BUSINESS INTELLIGENT www.pragmaticworks.com

Page 24: BuildingSecurity Audits with Extended Events

Packages

Events Actions

Predicates Targets

Packages • sqlserver• SecAudit

MAKING BUSINESS INTELLIGENT www.pragmaticworks.com

Page 25: BuildingSecurity Audits with Extended Events

Events

Events Actions

Predicates Targets

Packages

• Logon• Logout• SQL Statement

Starting• RPC Starting• Module Start• SQL Batch

Starting

MAKING BUSINESS INTELLIGENT www.pragmaticworks.com

Page 26: BuildingSecurity Audits with Extended Events

Actions

Events Actions

Predicates Targets

Packages

• User Name• Client App

Name• Client

Hostname• Database Id• Database Name• NT Username• Server Instance

Name• Server Principal

Name• SQL Text• User Name

MAKING BUSINESS INTELLIGENT www.pragmaticworks.com

Page 27: BuildingSecurity Audits with Extended Events

PREDICATES

Events Actions

Predicates Targets

Packages

WHERE• Equal• Greater Than• Less Than• Not Equal• LIKE

FILTERS• AND• OR

MAKING BUSINESS INTELLIGENT www.pragmaticworks.com

Page 28: BuildingSecurity Audits with Extended Events

Targets

Events Actions

Predicates Targets

Packages• File Target• Ring Buffer• Event Stream

MAKING BUSINESS INTELLIGENT www.pragmaticworks.com

Page 29: BuildingSecurity Audits with Extended Events

Agenda

Why Security Audits?

Security Audit

Components

Building a Login Audit

Building a Query Audit

Page 30: BuildingSecurity Audits with Extended Events

Login Scenario

• How often is a login being used?

• When are logins occurring?

• What applications are using a login?

• What host has the most logins?

MAKING BUSINESS INTELLIGENT www.pragmaticworks.com

Page 31: BuildingSecurity Audits with Extended Events

Login Audits

• Connection Tracking template

– Login

– Logout

– Connectivity Ring Buffer Recorded

• Targets

– File target for long term analysis

– Ring buffer for shorty term activity

– Event stream for real-time analysis

MAKING BUSINESS INTELLIGENT www.pragmaticworks.com

Page 32: BuildingSecurity Audits with Extended Events

LOGIN AUDITS

Demo

MAKING BUSINESS INTELLIGENT www.pragmaticworks.com

Page 33: BuildingSecurity Audits with Extended Events

Agenda

Why Security Audits?

Security Audit

Components

Building a Permissions

Audit

Building a Query Audit

Page 34: BuildingSecurity Audits with Extended Events

Query Audit

• What queries did the new DBA run?

• What is being run against XYZ database?

• What is the developer doing that keeps causing SEVERITY 20 errors?

MAKING BUSINESS INTELLIGENT www.pragmaticworks.com

Page 35: BuildingSecurity Audits with Extended Events

Query Audit

• Query level auditing

– RPC Starting

– Module Start

– SP Statement Starting

– SQL Batch Starting

– SQL Statement Starting

• Targets

– Same as Login Audit

MAKING BUSINESS INTELLIGENT www.pragmaticworks.com

Page 36: BuildingSecurity Audits with Extended Events

QUERY AUDIT

Demo

MAKING BUSINESS INTELLIGENT www.pragmaticworks.com

Page 37: BuildingSecurity Audits with Extended Events

Any Questions?

Page 38: BuildingSecurity Audits with Extended Events

Learn More About Extended Events

MAKING BUSINESS INTELLIGENT www.pragmaticworks.com

Page 39: BuildingSecurity Audits with Extended Events

ServicesSpeed development through training, and rapid development services from Pragmatic Works.

ProductsBI products to covert to a Microsoft BI platform and simplify development onthe platform.

FoundationHelping those who do not have themeans to get into information technologyachieve their dreams.

For more information…

Name: Jason Strate

Email: [email protected]

Blog: www.jasonstrate.com

Resource: jasonstrate.com/go/xevents