Like any other security feature, a secure implementation
of BI row-level permissions requires that you pay careful attention
to the entire environment in order to avoid vulnerabilities in other
security layers. For example, if you do not limit physical access
to the target data, there is a risk that users will exploit their
physical access to circumvent the filters that you define in your
information maps. If this is an acceptable risk, then no special measures
are needed. This can be an acceptable risk in environments such as
the following:
-
-
environments that do not have strict
security requirements
-
environments in which a firewall
separates untrusted users
-
environments in which untrusted
users do not have the tools, knowledge, or operating system privileges
to access files and metadata on the server tier
If, on the other hand,
you require strict security controls against the possibility of malicious
activity on your company intranet, then a more tightly protected configuration
is necessary. In such circumstances, it is important to strictly limit
physical access to the target tables to prevent direct access by regular
users. The goal is to enable regular users to have only mediated access
to the target tables. The strategy is as follows:
-
Deny regular users physical access
to the tables (using host or DBMS access controls).
-
Require participating applications
to use a dedicated, privileged account to fetch data for requesting
users.
-
Configure the retrieving server
and environment in a way that minimizes the risk of a user exploiting
the privileged account, or otherwise circumventing the row-level filters.