S 2.124 Selection of suitable database software

Initiation responsibility: IT Security Officer, Head of IT

Implementation responsibility: Administrator, IT Security Officer

When purchasing new database software, it is possible to select the software right from the start in such a way that only minimal additional personnel and organisational resources are necessary to achieve a high level of security when it is operated later on.

At the beginning, the field of application and intended purpose of the database system must be clarified so that it is possible to formulate the requirements regarding availability, integrity, and confidentiality. Furthermore, the requirements must be quantified in terms of the amounts of data to be processed, the data processing speed, and the throughput. This information can be used to derive the features the database software to be purchased must have, for example its availability for certain hardware platforms and/or operating systems or the scope of necessary security mechanisms. In this planning phase, it is possible to determine whether and to what extent the hardware must be upgraded and/or replaced to operate the database system later on. The monitoring capabilities required must then also be defined based on the availability requirements, i.e. it must be specified which database states should be detectable and how they will be detected (for example by logging information in a file), as well as how the persons in charge and/or groups of persons in charge will be notified about critical database states (for example by displaying a message on the console).

When purchasing a database software, the following aspects should be taken into consideration in particular:

Based on these criteria, the database systems available for selection must be examined and evaluated. The software that best meets the specific requirements should then be selected. More in-depth requirements must then be met either using additional products or by developing the corresponding software in-house. However, it should be clarified before purchasing which additional products are available for which database software so that it is not necessary to develop software in-house, which is expensive.

There are generally several different versions of most of the database management systems available on the market at the same time. Different versions of the same database management system usually differ only in terms of their functionality, which also includes the security-relevant functionality, amongst other functionality. The high level of competition has forced some manufacturers to deliver software that is not fully mature and for which it must be assumed that the software contains errors and can only provide limited functionality.

For this reason, it should be examined in a test phase if the database software selected is actually able to provide the necessary functions in the given application environment. This applies especially to the requirements regarding the performance and the mechanisms necessary for contingency planning.

Before purchasing, the experiences gained from comparable installations should also be taken into consideration.

Review questions: