Home | Previous Page | Next Page   Overview of Auditing > DBMS Security Threats >

Untrusted Software Used in a Privileged Environment

Problems might occur if DBSAs or OSAs execute untrusted software. Untrusted software can use the privileges of the DBSA or the OSA to perform actions that bypass or disable the security features of the product or that grant inappropriate DAC access privileges.

The primary countermeasure to this vulnerability is to make sure that DBSAs and OSAs do not execute software of unknown or untrusted origin. We further recommend that the operating-system access controls protect all software that DBSAs and OSAs execute against unauthorized modification.

Home | [ Top of Page | Previous Page | Next Page | Contents | Index ]