S 4.71 Restrictive handling of database links

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: Administrator

Database links (DB links) can be used to access the data of another database, possibly in a different DBMS, from a database within a DBMS. To guarantee adequate protection of this data, this technique should only be used when access to the data is regulated in a corresponding authorisation concept. This concept must contain rules specifying how to control the authorisations of a user when DB links are used, among other things.

For example, the authorisation concept may specify that a user should only be granted the right to access an external database if the same user ID used by the user to log in to the local database is present in the remote database. Additional protection is obtained when the possibility of explicitly specifying a user ID and a password is exploited when creating DB links.

The authorisation concept should include rules specifying the following in terms of DB links:

Review questions: