No arguments that database security on its own is insufficient, and I wasn't implying that it was. What I was commenting on was the notion that providing a data service layer improves security, or better stated, that better security is sufficient justification for creating a data services layer.

I did notice that my original post was missing a key "not." The lack of a typical XML style service interface (and an actual implementation behind it, obviously) is not the problem with securing data access.

-tb

Todd Biske
http://www.biske.com/blog/
Sent from my iPhone

On Jul 7, 2008, at 4:33 PM, Michael Poulin <[EMAIL PROTECTED]> wrote:

Sorry Todd, this is off the SOA topic - a database security is not suitable for application security any more; it was designed for limited and not frequently changing number of uses initially. Nowadays, Db security is good for DBA primarily.

For the applications, especially, distributed application, an enterprise has to have separate security systems (and services).

One of the best security practices says that the threat must be stopped before it reaches the resource (concept of 'locked door'). When intruder gets to the database with a fake (stolen) identity , it is not a good practice. Good Entitlement systems used to intercept requests from applications and kill unauthorized ones to the database or explicitly filter out access to particular (to be protected) data fields.

I do not understand HOW service interfaces might know anything about its implementation; even if you pass through an identity of the consumer ( which is good thing to do), there is no mechanism in the interface capable of relating this ID to a database, right?

- Michael

----- Original Message ----
From: Todd Biske <[EMAIL PROTECTED]>
To: "[email protected]" <[email protected] >
Sent: Monday, July 7, 2008 6:51:14 PM
Subject: Re: [service-orientated-architecture] Re: Vandersluis on a Data Abstraction Layer's Benefits

Regarding securing access, I'd argue that the problem is the lack of
service interfaces, but rather the inability to pass true identity
through to the database, relying on system accounts associated with
connection pools instead.

-tb

Todd Biske
http://www.biske. com/blog/
Sent from my iPhone

On Jul 7, 2008, at 9:33 AM, "Kirstan Vandersluis" <[EMAIL PROTECTED] com>
wrote:

> --- In service-orientated- architecture@ yahoogroups. com, Michael Poulin
> <[EMAIL PROTECTED] .> wrote:
>>
>> The DAL became a point of indirection where all needed interceptions
> of data could happen. It was not related to any particular
> application. Moreover, it was a mandatory environment element for
> access all strategic DB.
>
> Michael, you bring up another set of benefits of a data abstraction
> layer: regulating and monitoring access to the data. I certainly
> hear consistently that this is a big issue with companies I work
> with. Most continue to use ad-hoc methods to restrict access, such as
> allowing access to the database only through stored procs (no ad-hac
> queries).
>
> In an SO environment, it seems these requirements could be satisfied
> at a higher level by run-time governace tools like those from
> AmberPoint and Forum/XWall. Still, I see those responsible for the
> data may continue to want control, or at least monitoring of the data
> layer.
>
> -Kirstan
>
>
>
> ------------ --------- --------- ------
>
> Yahoo! Groups Links
>
>
>



Reply via email to