Title
AWS re:Invent 2023 - Managing Database Roles with Active Directory and Heimdall Data (DAT205)
Summary
- Eric Bransberg, CTO of Heimdall Data, discusses automating role and user management for databases using Heimdall Data's capabilities.
- The solution supports MySQL, Postgres, SQL Server, and variants like Aurora and Redshift.
- Heimdall Data addresses security principles such as segregation of duty, least privilege, and zero trust model, which are often violated by database administrators (DBAs).
- Traditional database integration with Active Directory is limited and does not synchronize role changes effectively.
- Heimdall Data introduces zero touch user management through a proxy that authenticates users via Active Directory, maps groups to database roles, and creates users with appropriate roles at login.
- A new database portal is announced, enhancing security with features like two-factor authentication, Kerberos, and an approval chain for role access requests.
- The portal provides an audit trail, role management, and auditing functionality, including detailed access reports down to the column level.
- Database administrators are relieved from user and role management, and emergency access ("break glass") functionality is available for urgent situations.
- Additional security features include a database firewall and honey token detection for suspicious activity monitoring.
Insights
- Heimdall Data's approach to database role management aligns with compliance requirements such as Sarbanes-Oxley by enforcing segregation of duty and least privilege principles.
- The zero touch user management system simplifies the synchronization of organizational role changes with database access rights, reducing administrative overhead and potential for human error.
- The database portal's request and approval workflow for accessing data sets ensures that access is granted based on current needs and permissions, enhancing the security posture.
- The audit trail and reporting capabilities provided by Heimdall Data can significantly ease the process of demonstrating compliance during audits.
- The inclusion of advanced security features like honey token detection indicates a comprehensive approach to database security, going beyond just role management.
- The ability to integrate biometric authentication methods for superuser access suggests a forward-thinking approach to security, leveraging the latest technology to protect sensitive data.