16.10 - Setting Up a System for Common Criteria Compliance - Teradata Database

Teradata Database Security Administration

Teradata Database
June 2017

The following procedure describes how to set up and operate a Teradata Database system at a level of security equivalent to the Common Criteria evaluated configuration.

If your Teradata Database system is in operation, you may have already performed some of the needed steps during system implementation.
  1. Establish a system security policy.

    See Developing a Teradata Database Security Policy.

  2. Establish the physical security controls for the system. See Controlling Physical Access.
  3. Establish operating system and network security controls for the Teradata Database server.
  4. Install the system hardware and software following Teradata-supplied installation documentation. Be sure to use the documentation that corresponds to the applicable hardware, software, and operating system versions.
  5. Run the DIPACC script, provided on the Teradata Database software release media, to allow access logging. See Setting Up the DBC.AccLogRule Macro. This script creates the AccLogRule macro in system user DBC, which allows you to enable access logging.
    Do not run the tpareset command until instructed, later in this procedure.
  6. Change the password control parameters defined in the DBC.SysSecDefaults table to the recommended default values:
    UPDATE DBC.SysSecDefaults SET
       /* password must be at least 8 characters in length */
       PasswordMinChar = 8,
       /* password cannot exceed 30 characters */
       PasswordMaxChar = 30,
       /* digits required in a password */
       PasswordDigits = 'r',
       /* alpha, special characters required in a password */
       PasswordSpecChar = 'r',
       /* user name will be locked after 3 failed logons */
       MaxLogonAttempts = 3,
       /* user name will remain locked for 5 minutes */
       LockedUserExpire = 5,
       /* passwords will expire in 90 days */
       ExpirePassword = 90,
       /* a password cannot be reused for 270 days */
       PasswordReuse = 270
       /* dictionary words cannot be used in a password */
       PasswordRestrictWords = 'Y'
    WHERE PrimeIndex = 1;

    See also About Password Controls.

  7. Change the default PASSWORD parameter for usernames DBC, SYSTEMFE, and SYSADMIN (via MODIFY USER), and protect the new passwords in accordance with your security policy. For example, to modify user DBC:

    The following example shows the SQL you can use to modify user DBC:

  8. Grant the necessary rights to SECADMIN to carry out security administrator duties. Only the security administrator (and user DBC) should have these privileges.
    GRANT USER ON SECADMIN TO SECADMIN               /* maintain users */ ;
    GRANT ROLE TO SECADMIN                           /* maintain roles */ ;
    GRANT PROFILE TO SECADMIN                        /* maintain profiles */ ;
    GRANT SELECT ON DBC TO SECADMIN                  /* select on dictionary tables */  ;
    GRANT UPDATE ON DBC.SysSecDefaults TO SECADMIN   /* password characteristics */  ;
    GRANT EXECUTE ON DBC.LogonRule TO SECADMIN       /* logon rules */ ;
    GRANT EXECUTE ON DBC.AccLogRule TO SECADMIN      /* access logging */ ;
    GRANT DELETE ON DBC.AccLogTbl TO SECADMIN        /* delete audit entries */  ;
    GRANT DELETE ON DBC.DeleteAccessLog TO SECADMIN  /* delete audit entries */  ;
    GRANT DELETE ON DBC.EventLog TO SECADMIN         /* delete event log */ ;
    These are the minimum privileges required for the security administrator to fulfill Common Criteria requirements, but you can grant additional privileges if your security policy requires them.
  9. Use the tpareset command to restart the system to activate access logging and the revised password controls. See Utilities.
  10. Initiate logging of all user attempts to access the security administrator macros, including access by the security administrator, to check for possible attempts to learn or compromise system security measures:
       ON MACRO DBC.LogonRule, MACRO DBC.AccLogRule;
  11. Establish any additional security logging that is required by your site security policy. See Monitoring Database Access.
  12. Establish any logon rules required by your security policy.
  13. Implement an analysis and reporting process to examine the output of access logs, according to your site security policy. See Investigating Database Access Attempts