How to evaluate database security tools in terms of security

5 pts.
Tags:
Database
Database security
Security
I want to evaluate these tools, by using something like protection profiles or common criteria, but I don't know how can I find some checkpoints for evaluation. Can anybody help me?


Software/Hardware used:
fortidb
0

Answer Wiki

Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.

Discuss This Question: 2  Replies

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.
  • Jaideep Khanduja
    The tool must be able to take care of few basic things like:
     
    Who changed the data and when?
    Does it support transparent encryption?
    Are your granular policies taken care of?
    Does it support multiple levels and location access?
    Is there a provision of centralized enterprise key and policies?
    Does it have features like key rotation, data re-keying, logging, and auditing?
    18,930 pointsBadges:
    report
  • Kevin Beaver
    What are you trying to do? Has a security assessment been performed that identified flaws that can be addresses by this type of control?
    27,480 pointsBadges:
    report

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following

Share this item with your network: