Dear Gurpur,
The most efficient way to start quickly is by utilizing the predefined use cases available in DRA. These use cases are preconfigured and will automatically adjust based on the observed usage data. Please refer to the documentation at https://docs.imperva.com/bundle/v4.0-data-risk-analytics-user-guide/page/63485.htm for a comprehensive list.
Additionally, it's advisable to consult with your auditing/compliance team, as they may have compliance-related requirements. For instance, SOX might necessitate auditing any changes made to specific tables.
Furthermore, you can review the policy criteria for areas you may wish to monitor. These can include SQL Exceptions, user and privilege management, questionable operations, Non-DBA privilege operations, and more.
Thanks for posting on community , let us know whether you require further help.
------------------------------
Nikhil Nandode
------------------------------
Original Message:
Sent: 08-29-2023 15:47
From: Gurpur Pai
Subject: Database Signature policies
Hello,
I am looking for use cases/examples of implementation of effective Database Signature Policies. Can anyone please share.?
#AccountTakeOver
#AdvancedBotProtection
#AllImperva
#APISecurity
#AttackAnalytics
#ClientSideProtection
#CloudDataSecurity
#CloudWAF(formerlyIncapsula)
#CloudVector
#ContentDeliveryNetwork
#DataMasking(formerlyCamouflage)
#DataRiskAnalytics(formerlyCounterBreach)
#DatabaseActivityMonitoring
#DDoSProtectionforNetworks
#DDoSProtectionforWebsites
#ImpervaAgent
#ImpervaAgentforzOS
#jSonar
#LoadBalancer
#On-PremisesWAF(formerlySecuresphere)
#RASP
------------------------------
Gurpur Pai
info sec
Mufg Union Bank, National Association
San Francisco CA
------------------------------