Top
Enterprise Postgres 16 Security Operation Guide

1.3 Security Threats

A security threat is defined as something that threatens the confidentiality, integrity, and availability indicated in "1.2 Security Requirements" in respect to information assets. This includes technical threats such as accessing a database, but does not include physical destruction.

Threats are considered to be a combination of type of user who is the source of the threat, information assets that need to be protected, techniques, and unauthorized actions. For example, a threat might be a general user exploiting a database vulnerability to obtain database management information, and then tampering with that information.

When considering security measures, it is firstly necessary to clarify what kind of threats there are. A list of possible threats is shown in the table below. Refer to "Types of user" and "Information assets" for details on the definition of each type of user and information assets that should be protected.

Possible threats

Type of user

Information asset

Technique

Unauthorized action

General user

Internal user

System manager

System developer

System administrator

System operator

Database management information

Eavesdropping of packets

Unauthorized acquisition (viewing) of information

Unauthorized tampering or destruction (updating) of information

Dictionary attack of passwords

Unauthorized acquisition of IDs/passwords through social engineering

Unauthorized acquisition of information through misuse of settings

Unauthorized acquisition of information through exploiting a database vulnerability

Acquisition by an unauthorized route

General user

Internal user

General database information

Acquisition by a normal route

Misuse of information that can be acquired normally (taking data outside of the company)

SQL issued with the aim of obstructing a job

Obstructing a job (resource depletion)

General user

Internal user

General database information

Eavesdropping of packets

Unauthorized tampering or destruction (updating) of information

Dictionary attack of passwords

Unauthorized acquisition of IDs/passwords through social engineering

Unauthorized acquisition of information through exploiting configuration errors

Unauthorized acquisition of information through exploiting a database vulnerability

Acquisition by an unauthorized route

System manager

System developer

System administrator

System operator

General database information

Eavesdropping of packets

Unauthorized acquisition (viewing) of information

Unauthorized tampering or destruction (updating) of information

Dictionary attack of passwords

Unauthorized acquisition of IDs/passwords through social engineering

Unauthorized acquisition of information through exploiting configuration errors

Unauthorized acquisition of information through exploiting a database vulnerability

Acquisition by an unauthorized route

System developer

Database management information

Creation of a backdoor

Unauthorized acquisition (viewing) of information

Unauthorized tampering or destruction (updating) of information

General database information

System manager

System administrator

Database management information

Unauthorized acquisition of information by creating an unauthorized database administrator account

Unauthorized acquisition (viewing) of information

Unauthorized tampering or destruction (updating) of information

General database information

System manager

System operator

Database management information

Unauthorized acquisition of information by tampering with database-related files (definition file, physical file, and so on)

Unauthorized acquisition (viewing) of information

Unauthorized tampering or destruction (updating) of information

General database information

Database administrator

Database management information

Misuse of information (taking information outside of the company) after obtaining it through the normal route

Misuse of information that can be acquired normally (taking information outside of the company)

Unauthorized use of IDs/passwords from the management information

Tampering with or destroying information that can be acquired

Unauthorized acquisition of information by tampering with management information

SQL issued with the aim of obstructing a job

Obstructing a job (resource depletion)

General database information

Eavesdropping of packets

Unauthorized acquisition (viewing) of information

Unauthorized tampering or destruction (updating) of information

Misuse of information (taking information outside of the company) after obtaining it through an unauthorized route

Database operator

Database management information

Eavesdropping of packets

Unauthorized acquisition (viewing) of information

Unauthorized tampering or destruction (updating) of information

Dictionary attack of passwords

Unauthorized acquisition of IDs/passwords through social engineering

Unauthorized acquisition of information by exploiting configuration errors

Unauthorized acquisition of information through exploiting a database vulnerability

Acquisition by an unauthorized route

General database information

Acquisition by a normal route

Misuse of information that can be acquired normally (taking data outside of the company)

SQL issued with the aim of obstructing a job

Obstructing a job (resource depletion)


Types of user

In database security, the persons involved with databases and their roles are defined below.

Type of user

Role

System manager

Manages developers, administrators, and operators

System developer

Builds the network around the database server

Builds the database server

System administrator

Operates devices of the surrounding database network

Operates the database server

System operator

Operates the surrounding database network

Database administrator

Builds the database system

Operates the database system

Database operator

Performs business operations

Internal user

End user inside the company

General user

End user outside the company


Information assets

In database security, it is necessary to protect the information assets to be stored on the database server.

Such assets are defined below.

Database management information
  • Database configuration information (system catalog, user ID/password, and so on)

  • Database logs (such as access logs)

General database information
  • Job data

  • Applications