Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
    • By Category
      • AI/Hyperautomation
      • Cloud/Cloud Wars
      • Cybersecurity
      • Data
    • By Interest
      • Leadership
      • Office of the CFO
      • Partners Ecosystem
      • Sustainability
    • By Industry
      • Financial Services
      • Healthcare
      • Manufacturing
      • Retail
    • By Type
      • Guidebooks
      • Digital Summits
      • Practitioner Roundtables
      • Practitioner Playlists
    • By Language
      • Español
  • Vendor Shortlists
    • All Vendors
    • AI/Hyperautomation
    • Cloud
    • Cybersecurity
    • Data
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
Twitter Instagram
  • CIO Summit
  • Summit NA
  • Dynamics Communities
Twitter LinkedIn
Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
        • By Category
          • AI/Hyperautomation
          • Cloud/Cloud Wars
          • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
          • Data
        • By Interest
          • Leadership
          • Office of the CFO
          • Partners Ecosystem
          • Sustainability
        • By Industry
          • Financial Services
          • Healthcare
          • Manufacturing
          • Retail
        • By Type
          • Guidebooks
          • Digital Summits
          • Practitioner Roundtables
          • Practitioner Playlists
        • By Language
          • Español
  • Vendor Shortlists
    • All Vendors
    • AI/Hyperautomation
    • Cloud
    • Cybersecurity
    • Data
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
    • Login / Register
Acceleration Economy
    • Login / Register
Home » How to Vet Autonomous Database Security
Cybersecurity as a Business Enabler

How to Vet Autonomous Database Security

Robert WoodBy Robert WoodOctober 6, 2022Updated:December 27, 20224 Mins Read
Facebook Twitter LinkedIn Email
autonomous databases security
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

Security is a vast landscape of things: things to remember to do, things to find time for, and then things to get right. As such, it comes with a lot of cognitive overhead for security teams and developers hardening their code, system administrators patching their servers, and database administrators protecting their databases. Security is also constantly changing, in part because technology is constantly changing, which only adds to the cognitive load.

Advancements that can reduce cognitive load around security have tremendous potential because they get adopted. Benefits around risk reduction are inherited largely from the use of these advancements. Many modern programming languages for the most part don’t require that developers think about buffer overflows. Consumers of Software-as-a-Service (SaaS) products don’t think about patching.

A recent advancement in cloud-native database technologies referred to as autonomous databases seeks to have a similar impact on those responsible for setting up, managing, and overseeing databases, and includes many automated security features. It’s worth noting that while this term is being used for an Oracle Cloud product, similar concepts exist in other cloud infrastructure providers such as AWS Aurora or GCP Cloud SQL, though the features differ. While these new solutions can definitely reduce the cognitive load for database teams, they must still be vetted in terms of what they can and cannot do on the security front . This article is going to discuss some of the benefits and potential risks of autonomous databases as they apply to security.

The Security Benefits of Autonomous Databases

Some of the biggest security benefits of autonomous databases over traditional, cloud-based database technologies include:

  • Automatic patching, which alleviates the constant negotiation around downtime, migrations, prioritization, and security impact.
  • Encryption, which ensures that data is protected at rest using the optimal encryption settings — without needing to negotiate trade-offs with the development teams.
  • Built-in auditing, which produces, from day one, a viable, consumable audit log of the service rollout. This is a huge boon for compliance and security operations teams.
  • Configuration management, which gives scalable security benefits no matter where it’s applied. This is big. Operating by default on secure configuration settings is also important as configuration options change, ensuring little or no time is spent between a new feature release and its subsequent implementation.

Each of the above areas typically creates discussion points and trade-offs with development and system administration teams. Those trade-off discussions lead to gaps in coverage which, depending on how bad things might be, create opportunities for exploitation.

The Potential Risks of Autonomous Databases

One interesting aspect of the cloud technology explosion has been the misunderstanding of various shared responsibility models. This misunderstanding often comes in the form of assumptions not aligning with reality. For example, the consumer believes that their cloud provider is addressing auto-scaling or patching when, in reality, the particular services they are consuming do not handle this by default. This assumption leads to a gap, that gap leads to risk, and that risk can be exploited.

One of the biggest risk areas that I see with the development of autonomous databases lies in the unintended creation of these assumptions through marketing. Even if the reality of what autonomous databases (or equivalent solutions) do is only and exactly what their marketing campaigns are supporting, potential or actual consumers may still draw unintended conclusions.

Looking at the autonomous database documentation, it would be reasonable to conclude that an application owner doesn’t have to think at all about least privilege, configuration, hardening, encryption, or compliance issues when it comes to the database. Are these all the security concerns one might have when it comes to data? What about the service points of interaction with the database? What about processes security-related processes that intersect with or are built on top of the database?

The point is, “set it and forget it” assumptions can be dangerous when it comes to security. It’s important for users to understand everything their cloud tools can’t do as much as they understand what they can do.


Want more cybersecurity insights? Subscribe to the Cybersecurity as a Business Enabler channel:

Acceleration Economy Cybersecurity

Autonomous Database Cloud Database Cybersecurity data management database featured security security teams
Share. Facebook Twitter LinkedIn Email
Analystuser

Robert Wood

CISO
Executive Branch Agency

Areas of Expertise
  • Cybersecurity

Robert Wood is an Acceleration Economy Analyst focusing on Cybersecurity. He has led the development of multiple cybersecurity programs from the ground up at startups across the healthcare, cyber security, and digital marketing industries. Between experience with startups and application security consulting he has both leadership and hands on experience across technical domains such as the cloud, containers, DevSecOps, quantitative risk assessments, and more. Robert has a deep interest in the soft skills side of cybersecurity leadership, workforce development, communication and budget and strategy alignment. He is currently a Federal Civilian for an Executive Branch Agency and his views are his own, not representing that of the U.S. Government or any agency.

  Contact Robert Wood ...

Related Posts

Why Leaders from Cybersecurity and Data Teams Need Strong Relationships

March 21, 2023

Road to CIO Summit: Why Customers’ AI and Digital Transformation Stories Are So Valuable

March 21, 2023

Workday Co-CEO Aneel Bhusri One-on-One: Customers, AI/ML, New Role

March 21, 2023

An Exciting Time for Enterprise Software | Aneel Bhusri on Business Models, CEO Priorities

March 21, 2023
Add A Comment

Comments are closed.

Recent Posts
  • Why Leaders from Cybersecurity and Data Teams Need Strong Relationships
  • Road to CIO Summit: Why Customers’ AI and Digital Transformation Stories Are So Valuable
  • Workday Co-CEO Aneel Bhusri One-on-One: Customers, AI/ML, New Role
  • An Exciting Time for Enterprise Software | Aneel Bhusri on Business Models, CEO Priorities
  • How to Create New Procurement Savings Using AI and RPA to Streamline Purchasing

  • 2X a week
  • Analyst Videos & Articles
  • Exclusive Digital Business Content
This field is for validation purposes and should be left unchanged.
Most Popular Guidebooks

Securing Software-as-a-Service Applications

March 1, 2023

Retail Innovation With AI, Data, and Cybersecurity

March 1, 2023

Cloud Data Strategy, Analytics, and Governance

February 27, 2023

Cloud Wars Top 10 CEO Priorities

February 8, 2023

Advertisement
Acceleration Economy
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Advertising Opportunities
© 2023 Acceleration Economy.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?

Connect with

Login with Google Login with Windowslive

Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.