IBM Support

The 3 Basic Types of Rules for a Guardium Policy

Education


Abstract

A quick overview of where Access, Extrusion, and Exception rules take place.

Content

  
  There are 3 Basic Types or Rules for Guardium Policies.
  
 #1 Access Rules answer the following questions
  •  Who is trying to access the Server
  •  What and where the database is that the client is trying to access
  •  How the database client accessed the server
  •  When the Access client accessed the Server
There are three hierarchies of Access Rules
  1 Network Connection 
  2 One more sessions associated to the Connection
  3 The SQL requests associated with that session  

 
On the Database side, you find Extrusion Rules and SQL Errors; Is traffic passing from the Database Server to the database client?
#2  Extrusion Rules
  • Database Results that can be masked and/or edited  to preserve sensitive data secrecy
#3 Exception Rules
  • Errors thrown by the database server

[{"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Product":{"code":"SSMPHH","label":"IBM Security Guardium"},"Component":"","Platform":[{"code":"PF016","label":"Linux"}],"Version":"All Version","Edition":"","Line of Business":{"code":"LOB24","label":"Security Software"}}]

Product Synonym

Guardium Infosphere

Document Information

Modified date:
13 November 2019

UID

ibm11077621