In order to expand and collapse the table of contents, you must enable JavaScript in the browser.
(Collapse Contents)
Title Page
Preface
Chapter 1 Overview of Security
1.1 What is Security?
1.2 Security Requirements
1.3 Security Threats
1.4 Security Scope
1.5 Security Provided by Fujitsu Enterprise Postgres
1.5.1 Roles Targeted For Security
1.5.2 Security Features
Chapter 2 Overview of Security Operation
2.1 Security Operation Flow
Chapter 3 Tasks of the Manager
3.1 Defining Important Information and Risk Analysis
3.2 Formulating Account Management Policies
3.3 Formulating Log Retrieval Policies
3.4 Formulating Rules
3.5 Implementing Training
3.6 Checking the Database Management Operations
3.7 Periodic Diagnosis of the Status of Security Measures
Chapter 4 Tasks of Administrators
4.1 Receiving Training
4.2 Initial Setup
4.3 Authentication
4.3.1 Managing Accounts
4.3.2 Managing Passwords
4.3.3 Configuring Connections and Authentication
4.4 Access Control
4.5 Encryption
4.6 Controlling Use of External Media
4.7 Security Measures for Servers/Applications
4.8 Log Management
4.8.1 Retrieving Logs
4.8.2 Maintaining Logs
4.9 Detecting Unauthorized Access
4.10 Analyzing Logs
Chapter 5 Tasks of Users
5.1 Receiving Training
5.2 Managing Accounts/Passwords
Chapter 6 Audit Log Feature
6.1 Audit Log Output Modes
6.2 Setup
6.3 Setting Up the Scalable Audit Log Feature
6.4 pgaudit Configuration File
6.5 Session Audit Logging
6.6 Object Audit Logging
6.7 Database Multiplexing
6.7.1 Setup
6.7.2 Configuring Audit Log Retrieval
6.8 Analyzing Audit Logs in SQL
6.9 Removing Setup
Chapter 7 Confidentiality Management
7.1 Setup
7.2 Designing Confidentiality Management
7.2.1 Designing a Confidentiality Matrix
7.2.1.1 Defining Confidentiality Levels
7.2.1.2 Defining Confidentiality Groups
7.2.1.3 Defining Confidentiality Privilege
7.2.2 Determining Confidentiality Management Roles
7.2.3 Classify Confidentiality Objects According to the Definition of Confidentiality Level
7.2.3.1 Defining Confidentiality Objects
7.2.3.2 Classify Confidentiality Objects
7.2.4 Classify Roles According to Confidentiality Group Definitions
7.3 How to Use Confidentiality Management Feature (Definition)
7.3.1 Creating a Confidentiality Management Role
7.3.2 Creating a Confidentiality Matrix
7.3.3 Adding Confidentiality Levels to the Confidentiality Matrix
7.3.4 Adding Confidentiality Groups to the Confidentiality Matrix
7.3.5 Granting Confidentiality Privileges to Confidentiality Groups
7.3.6 Adding Confidentiality Objects to Confidentiality Level
7.3.7 Adding Roles to Confidentiality Groups
7.4 How to Use Confidentiality Management Feature (Change and Deletion)
7.4.1 Renaming Confidentiality Objects
7.4.2 Renaming Roles
7.4.3 Deleting Roles
7.4.4 Changing Confidentiality Matrix
7.4.5 Deleting Confidentiality Matrix
7.4.6 Changing Confidentiality Level
7.4.7 Deleting Confidentiality Level
7.4.8 Changing Confidentiality Group
7.4.9 Deleting Confidentiality Group
7.4.10 Revoking Confidentiality Privileges
7.4.11 Removing Confidentiality Objects from Confidentiality Level
7.4.12 Removing Roles from Confidentiality Groups
7.5 Suggestions for Monitoring Methods
7.5.1 How to Detect Privilege Changes without Using Confidentiality Management feature
7.5.2 How to Check Confidentiality Objects and Roles
7.6 Backup/Restore
7.7 Removing Setup
7.8 Usage Example of Confidentiality Management
Appendix A Tables Used by Confidentiality Management Feature
A.1 pgx_confidential_matrix
A.2 pgx_confidential_level
A.3 pgx_confidential_group
A.4 pgx_confidential_privilege
A.5 pgx_confidential_object
A.6 pgx_confidential_role
A.7 pgx_confidential_policy
Appendix B System Management Functions Used by Confidentiality Management Feature
B.1 Confidentiality Matrix Manipulation Functions
B.2 Confidentiality Level Manipulation Functions
B.3 Confidentiality Group Manipulation Functions
B.4 Confidentiality Privilege Manipulation Functions
B.5 Confidentiality Object Manipulation Functions
B.6 Role Manipulation Functions
B.7 Functions that Support Definition Referencing and Comparison with System Catalogs
Top