Sample Logging Setup - Advanced SQL Engine - Teradata Database

Security Administration

Product
Advanced SQL Engine
Teradata Database
Release Number
17.05
17.00
Published
September 2020
Language
English (United States)
Last Update
2021-01-23
dita:mapPath
ied1556235912841.ditamap
dita:ditavalPath
lze1555437562152.ditaval
dita:id
B035-1100
lifecycle
previous
Product Category
Teradata Vantageā„¢

The following procedure is based on the PCI-DSS requirements shown in Sample Logging Requirements, but you can use them as a general guide to set up access logging for any sensitive data, by adjusting them to your site security policy.

The examples that follow are for reference only and do not in themselves guarantee compliance with PCI-DSS requirements.
  1. Run the DIPACC script to create the DBC.AccLogRule macro, which must exist before initiating access logging.

    For information on running DIPACC, see the Database Initialization Program (DIP) in Teradata Vantageā„¢ - Database Utilities , B035-1102 .

  2. Initiate logging on tables or views that contain sensitive data:
    BEGIN LOGGING DENIALS ON EACH SELECT, INSERT, UPDATE, DELETE, STATISTICS, INDEX, REFERENCES, DUMP, RESTORE, SHOW, GRANT, CREATE TRIGGER, DROP TABLE, DROP TRIGGER ON Table "Tables_Database"."Table_Name" ;

    Repeat this step for each table or view that contains sensitive data.

  3. Initiate logging of any action taken by all users with administrative privileges:
    BEGIN LOGGING ON EACH ALL BY "DBADMIN","DBC","SECADMIN","admin1","admin2" ;

    where DBADMIN, SECADMIN, admin1, and admin2 are the database usernames of administrators.

  4. Initiate logging of all invalid access attempts:
    BEGIN LOGGING DENIALS ON EACH ALL ;
  5. Initiate logging of any query that creates or deletes a system level object, that is, in the space directly owned by user DBC:
    BEGIN LOGGING ON EACH INDEX, REFERENCES, ALTER PROCEDURE, ALTER FUNCTION, ALTER EXTERNAL PROCEDURE, CREATE OWNER PROCEDURE, CREATE TABLE, CREATE VIEW, CREATE  MACRO, CREATE DATABASE, CREATE USER, CREATE TRIGGER, CREATE PROCEDURE, CREATE FUNCTION, CREATE EXTERNAL PROCEDURE, CREATE AUTHORIZATION, DROP TABLE, DROP VIEW, DROP MACRO, DROP DATABASE, DROP USER, DROP TRIGGER, DROP PROCEDURE, DROP FUNCTION, DROP AUTHORIZATION ON Database "DBC" ;
  6. Log the initialization of the audit logs:
    BEGIN LOGGING WITH TEXT ON EACH ALL ON MACRO DBC.AccLogRule;
  7. Initiate logging on all attempts to access audit trails:
    BEGIN LOGGING ON EACH ALL ON TABLE DBC.AccessLogTbl;
    BEGIN LOGGING ON EACH ALL ON VIEW DBC.AccessLog;
    BEGIN LOGGING ON EACH ALL ON VIEW DBC.DeleteAccessLog;
    BEGIN LOGGING ON EACH ALL ON TABLE DBC.EventLog;
    BEGIN LOGGING ON EACH ALL ON VIEW DBC.LogOnOff;