Education
Abstract
A quick overview of where Access, Extrusion, and Exception rules take place.
Content
There are 3 Basic Types or Rules for Guardium Policies.
#1 Access Rules answer the following questions
- Who is trying to access the Server
- What and where the database is that the client is trying to access
- How the database client accessed the server
- When the Access client accessed the Server
There are three hierarchies of Access Rules
1 Network Connection
2 One more sessions associated to the Connection
3 The SQL requests associated with that session
1 Network Connection
2 One more sessions associated to the Connection
3 The SQL requests associated with that session
On the Database side, you find Extrusion Rules and SQL Errors; Is traffic passing from the Database Server to the database client?
#2 Extrusion Rules
- Database Results that can be masked and/or edited to preserve sensitive data secrecy
#3 Exception Rules
- Errors thrown by the database server
[{"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Product":{"code":"SSMPHH","label":"IBM Security Guardium"},"Component":"","Platform":[{"code":"PF016","label":"Linux"}],"Version":"All Version","Edition":"","Line of Business":{"code":"LOB24","label":"Security Software"}}]
Product Synonym
Guardium Infosphere
Was this topic helpful?
Document Information
Modified date:
13 November 2019
UID
ibm11077621