This column is the concluding installment of a three-part series on security vulnerabilities of the data warehouse environment. This installment examines measures that can be utilized to help minimize or remove security vulnerabilities in front-end business intelligence applications. In earlier installments, we saw that securing the data warehouse environment is more than just administering users and access privileges. There are a number of actions that can be implemented with varying levels of effort to mitigate security exposures of your data warehouse site.

To begin, remove or at least turn off features and functionality of the site that are not being used. This will reduce the number of access points that an attacker can take advantage of and manipulate. The more access points, the more opportunities for exploitation. This includes any sample code provided by an application vendor, debug functionality used by developers and administrative functionality that is not going to be used.

Register or login for access to this item and much more

All Information Management content is archived after seven days.

Community members receive:
  • All recent and archived articles
  • Conference offers and updates
  • A full menu of enewsletter options
  • Web seminars, white papers, ebooks

Don't have an account? Register for Free Unlimited Access