The Holy Grail of Non-Human Identities - Databases

Lalit Choda, NHI Mgmt Group

The Holy Grail of Non-Human Identities - Databases
The Holy Grail of Non-Human Identities - Databases

Databases, being critical assets, require protection from both external and internal threats. They are prime targets for acquiring sensitive data, causing operational impact and performing fraudulent activities. From an insider threat perspective, many incidents, including accidents typically involve databases and technical accounts.

However, Databases are one of the most challenging areas to securely manage. Here's why :

  • Local DB Accounts

  • Password Authentication

  • Inventory & Ownership

  • Secrets Sprawl / Account Sharing

  • Password Cycling

  • Account Permissions

  • Interactive Logins

  • Monitoring of DB Activity

This white paper will deep dive into the key challenges around DB Non-Human Identities and how to tackle some of those challenges.