Database security is an important layer in any defense-in-depth approach. Database security is the deepest layer because it aims to protect the data at its root, on the database system.
The primary means by which a high-level of database security is achieved is by tightly controlling who has access to the data, whether it be directly or through applications. A coherent process for managing access and authorization is key to preventing unauthorized access whether malicious or unintentional.
In addition to access controls, database security is achieved by insulating the database systems from attack by segmenting them on the network both physically and with firewalls and by encrypting data in transit. Read our database security best practices for more information.
The Division of IT is currently working on a database security initiative to improve the security of University data. Phase I is concentrating on central databases managed by Division of IT and the upcoming Phase 2 will consist of working with departments to improve the security of their resources.
All departments are required to register their database resources in the database registry and comply with data classification standards for the UM System.
If you have any questions regarding database security, please contact ISAM at email@example.com for more information.