Imperva - SecureD Data Protection v1.5 HSL v1.2
Imperva - SecureD Data Protection v1.5 HSL v1.2
Protection
Hands On
Participant Guide
Version 1.5
Last updated: 07 Aug 2024
Purpose
The purpose of this document is to facilitate understanding and provide a step-by-step instruction to
navigate and make use of the different features within the platform to derive key information to
complete the questions in the hands on lab quickly and easily.
Able to acquire key information/metrics quickly also means lower & better MTTD (Mean time to
detect) and MTTR (Mean time to respond) for any suspicious events and potential incidents.
About Imperva
Imperva Data Security Fabric is the first data-centric solution that enables your organization's
security and compliance teams to quickly and easily secure sensitive data, no matter where it resides,
with an integrated, proactive approach to visibility and predictive analytics via some of the core
features listed below:
Imperva Data Security Fabric consists of multiple data security centric platforms which can integrate
and provide security protection for databases anywhere across any infrastructure or any
environment. In this lab, we will focus on the below:
Imperva DAM Imperva DRA
(Database Activity Monitor) (Data Risk Analytics)
Look & Feel
Imperva.com 2
Instructions
There will be some guided scenarios to help participants as a quick orientation to the platform, and
subsequently the guide will provide step by step instructions to enable participants to find the right
information required for the lab.
We will be using Database Risk & Visibility Matrix as a reference to the core scenarios of the lab.
The Classified DB DAM/DBF Objective is to quickly see which DBs have sensitive data.
The Security DB DAM/DBF Objective is to quickly see which DBs have possible violations.
Imperva.com 3
Important Note:
Use of GUI
Scripting or any command line is not required in any part of the exercise.
Use of Filters
We will be extensively using filters for this lab for several reasons
1. Enable consistent viewpoint across all participants
2. Focus only the important events (as system related DB events are filtered away)
DAM/DBF comes as a foundation of database security providing a good understanding and context
to the database activities as well as risks which are governed by both common and custom security
compliance and guidelines.
DRA comes as a user-focus and incident focus viewpoint where related events or incidents which
attributes to a user or an entity are being analyzed and correlated.
We will explore more in-depth what these platforms do within the lab activities.
Imperva.com 4
Guided Scenario 1: The Compliant & Secured DB
Imperva Data Security Fabric provides an easy way to manage different compliances across multiple
DBs which are monitored. Using tags, DBs activities can be easily filtered based on compliance
requirements (i.e. PDPA, IT-RM, PCI-DSS), in addition, tags can also be used for easy reporting &
report generation.
Imperva Data Security Fabric provides a complete set of tools to help you discover, classify and
manage assets in your network that include database services, database data user rights and more.
It then allows you to use this information to create security policies to monitor them, alert you to
suspicious activity, audit activity to these various assets, and more.
Service discovery scans your network for open ports and determines the services listening on these
ports. Any new databases can be discovered in a scheduled & continuous manner.
Credential Information
Link: https://dbf.hsldemo.net
Username: ctfuser
Password: Imperva123!
Guided Scenario Task 1: Get the number of DBs and find out the compliance based on tags
Guided Scenario Task 2: Get the Inventory of DB as well as their status
Regulation 1 3 1
Compliance
PDPA IT Risk Mgmt PCI-DSS
Secured 0 3 3 0
DB Secured Non-Secured Agent-based Agent-less
Imperva.com 5
Difficulty: Guided
Steps:
1. Login to Imperva MX Platform using the above credential information.
2. Click on “Setup” in the menu at the top then “Agents” in the sub-menu.
Imperva.com 6
Guided Scenario 2: The Risky DB
Using AI/ML to detect and define Risk
Imperva Data Risk Analytics (DRA) is a security solution that provides protection to the databases in
your environment. Data Risk Analytics dynamically learns users’ normal data access patterns and
then identifies inappropriate or abusive access activity to proactively alert IT teams to dangerous
behavior.
Credential Information
Link: https://dra.hsldemo.net/
Username: IMPVCU\ctfuser
Password: Imperva123!
Guided Scenario Task 2: Get the number of Critical, High, Medium and Low Risk Issues
Risky 16 13 12 2
Behavior Critical High Medium Low
Difficulty: Guided
Steps:
1. Login to DRA using the above credential information.
2. [Critical] Record down the number of “Critical” Risk Issues. [ for example 3] [ ]
[High] Record down the number of “High” Risk Issues. [ ]
[Medium] Record down the number of “Medium” Risk Issues. [ ]
[Low] Record down the number of “Low” Risk Issues. [ ]
******
LAB Task: Find out number of most severe issues for the top 3 Users.
Difficulty: Guided
Imperva.com 7
Steps:
1. Login to DRA using the above credential information.
2. Observe the number of “Critical” Risk Issues for Mariam Harris.
Observe the number of “Critical” Risk Issues for John Heidorn.
Observe the number of “Critical” Risk Issues for Tim Cooper.
Imperva.com 8
2. Click on “Application Data on Several Databases Suspiciously Accessed Multiple Times by a
Single User” with Issues ID #572 and Client Details “john.heidorn”.
(Note: 1 Issue contains multiple Incidents)
Imperva.com 9
Below are the investigation notes which are derived from the DRA platform which gives context
and investigative insights of the incident or issue which answers the fundamental question to Who,
What, Where, When and How.
Moderate influence
Minor influence
Imperva.com 10
Scenario: The Classified DB
Imperva Data Security Fabric provides a complete set of tools to help you discover, classify and
manage assets in your network that include database services, database data user rights and more.
It then allows you to use this information to create security policies to monitor them, alert you to
suspicious activity, audit activity to these various assets, and more.
Data Classification consists of scanning database services to classify data types hosted on these
services. It uses credentials you provide to search existing services, either found through service
discovery, or manually configured.
The Classified DB Task 1: Find out what are the Sensitive Data in the Database
Classification
0 0 0 0 0 0
Personal Data Credit Card Financial Health Mobile Phone Fraud
Difficulty: ★★
Steps:
1. Continue using the Imperva DAM MX Platform.
2. Go to Discovery & Classification, Click on Classified DB Data
Imperva.com 11
3. Click on “Distribution by Data Type”
a. If the filter is missing, Click on the Clear Filter button (above the chart)
b. Click on the “filter: Last scan only is [True]”, add the “decision is [accept]” to the
condition
Imperva.com 12
5. [Personal Data] Observe the total number of classified data
[Credit Card] Observe the number of “Payment Card” records
[Financial] Observe the number of “Payment Card” + “Account Number” records
[Health] There is no health-related sensitive data records
[Mobile Phone] Observe the number of “Phone” records
[Fraud] Observe the total number of classified data (Everything can be used as Fraud)
******
Imperva.com 13
Scenario: The Auditable DB
Auditing is defined as the saving of data regarding activity for the purpose of review and analysis.
The ability to audit this activity, which is expressed in access to sensitive data, is a key aspect in
securing your data, providing visibility into transactions being conducted in day-to-day operations,
and creating an audit trail that can assist in analyzing data theft, sensitive data exposure, and other
behavior that may impact your company’s data.
Imperva Data Security Fabric manages and tracks all activity in your network, as defined through
sites, services, server groups and applications. Additionally, you can configure audit policies that
audit database activity and access to files on file servers, which can then be queried and used to
analyze this activity.
Difficulty: ★★
Steps:
1. Continue using the Imperva DAM MX Platform.
2. Go to “Audit” at the top menu, then click on “DB Audit Data”
3. Click on “Filter” on the most left, Click on “Saved Filters”, Click on “User List”
Select “Last 3 Months” within Time Frame.
Imperva.com 14
5. Click on “DB Users” under Source Analysis.
Imperva.com 15
9. Click on “SQL Errors” under Additional Views
Make sure are there no active filters.
10. [SQL error] Count the number of rows with SQL errors.
******
11. Click on “Sensitive Query Overview” under Data Access Patterns header
12. Click on “Filter” on the most left, Click on “Saved Filters”,
Click on “Sensitive Query – Sensitive Data”
13. [Sensitive Data Access/Response] Count the number of rows with Sensitive Data
Access/Response.
******
14. Click on “Filter” on the most left, Click on “Saved Filters”,
Imperva.com 16
Click on “Delete & Update Filter”
Click on “Data Modification Analysis”
15. [Delete/update activities] Count the number of rows of all the delete and update
operations.
Do not count the Insert operations.
******
16. Click on “Click on “Newly Created Users” under "Privileged operations” header
17. [Newly created users] Count the number of rows of list of users (objects).
******
Imperva.com 17
18. Click on the Clear Filter button
Click on “Source IPs” under Source Analysis
19. [Local Activities] Count the number of rows with local address
(Count only unique addresses from 0.0.0.0, 127.0.0.1 & 10.0.0.0/16)
******
Imperva.com 18
Scenario: The Security DB
Imperva DAM/DBF comes with is a set of definitions that characterize security violations and actions
that take in response to them.
It also contains predefined policies that provide protection against the majority of known attacks and
threats. You can use the default policies, modify them or create user-defined policies.
Imperva DAM/DBF also incorporates a proprietary database scanner which is regularly updated with
the latest vulnerability definitions discovered by the Imperva ADC (Application Defense Center)
team. It runs these scans to assess your resources, searching for vulnerabilities and determining risk.
0 0 0 0 0 0 0 0
Security
Unauthorized source
Select * CVE Mis-config Excessive Response 200+ Violated policy Privilege commands Login failed
IPs
Imperva.com 19
The Security DB Task 1: Find out what are the (Select *) commands from audit
Security
0
Select *
Difficulty: ★★
Steps:
1. Continue using the Imperva DAM MX Platform.
2. Go to “Audit” at the top menu, then click on “DB Audit Data”
5. [Select *] The list will show list of database activities with Select * operations.
******
Imperva.com 20
The Security DB Task 2: Find out what are the Sensitive Data in the Database
Security 0 0
CVE Mis-config
Difficulty: ★★
Steps:
1. Continue using the Imperva DAM MX Platform.
2. Go to “Risk Management” at the top menu, then Click on “Risk Console”
3. Filter from the “Assessment Results” by Clicking on “Known Vulnerabilities” under “Scan
Name”.
4. Click on “Add to Filter”
5. Click on “This field”
Imperva.com 21
6. [CVE] The list will show list of total number of CVEs
******
******
Imperva.com 22
The Security DB Task 3: Find out what are the potential Security Violations
0 0 0
Security
Unauthorized source
Excessive Response 200+ Violated policy
IPs
Difficulty: ★★
Steps:
1. Continue using the Imperva DAM MX Platform.
2. Go to “Monitor” at the top menu, then click on “Alerts”
3. Click on the “Alerts” subtab.
Imperva.com 23
6. Click on “Filter” on the most left, Click on “Saved Filters”,
Click on “Custom – Security: DB Query High Response Size”
7. [Excessive Response 200+] The list will show list of database activities with “Excessive
Response 200+” operations.
(Hint: Count the number of rows)
******
8. On the “Filter” on the most left, for “Saved Filters”,
Click on “Custom – Security: Unauthorized Source IPs”
9. [Unauthorized source IPs] The list will show list of database activities with “Unauthorized
source IPs” operations.
******
Imperva.com 24
The Security DB Task 4: Find out what are the potential Security Violations
Security 0 0
Privilege commands Login failed
Difficulty: ★★
Steps:
1. Continue using the Imperva DAM MX Platform.
2. Go to “Audit” at the top menu, then click on “DB Audit Data”
3. Select “Last 3 Months” within the Scope
Imperva.com 25
7. Click on “Failed Logins” under Additional Views
Imperva.com 26
Lab Scenario: The Riskier DB
Using AI/ML to detect and define Risk
The Imperva DRA is used to detect:
• Compromised users whose credentials are stolen, or who unknowingly introduce malware
into the enterprise
• Malicious users who deliberately steal or tamper with corporate assets; and
• Careless users who inadvertently put sensitive data at risk
Difficulty: ★★★
Hints to Answer:
1. Look for john.heidorn
2. Look for Several Database Service Accounts Abused Multiple Times by a Single User
3. Look for Issue ID #571
4. Look for Incident ID #1304
Difficulty: ★★★
Hints to Answer:
1. Look for mariam.harris
2. Look for Excessive Database Records Access
3. Look for Issue ID #534
4. Look for Incident ID #1004
Imperva.com 27
The Riskier DB Task 3: Suspicious Sensitive System Tables Scan
An interactive (human) user has scanned sensitive system tables on several databases over a
relatively short period of time in an abnormal way. This could be an indication that a hacker or
malicious user is running a reconnaissance attack searching for interesting databases that can be
accessed in the organization.
Difficulty: ★★★
Hints to Answer:
1. Look for mariam.harris
2. Look for Suspicious Sensitive System Tables Scan
3. Look for Issue ID #490
4. Look for Incident ID #1305
Difficulty: ★★★
Hints to Answer:
1. Look for Excessive Multiple Database Access
2. Look for Issue ID #559
3. Look for Incident ID #1203
Imperva.com 28
Annex A: Filter definitions
DB Audit data
Filter name Field Operation Values
Delete and Update Database Not equals master
filter Object Not equals oauth_access_tokens
#tmp_role_member_ids
#sver
#tempbackup
Object Type Equals table
Operation Not equals select
Filter – Select * Database Not equals Information_schema
Master
Model
Msdb
Mysql
Performance_schema
Sys
Object Not equals Tables
Dm_xe_sessions
Sysdatabases
Columns
Dm_resource_governor_resource_pools
Data_spaces
Server_event_sessions
Dm_cluster_endpoints
Filegroups
Database_recovery_status
Statistics
Syspolicy_system_health_state
#t_514907_result_b
Pg_attrdef
Databases
Availability_databases_cluster
#t_514907_result_a
Database_files
Dm_hadr_cluster
Schemata
Database_mirroring
Objects
Server_principals
Syspolicy_configuration
Availability_replicas
Operation Equals Select
Parsed Query Contains Select *
from index
Source Not Equals Postgresql jdbc driver
Application
Sensitive Query – Table group Equals Choose all beginning with DAM CTF site
Sensitive data Choose all beginning with sv2013
User Not equals Hashed user
Hashed user (Unsupported SSL Cipher)
Nt service\sqlagent$2014sql
User List User Not equals Hashed user
Hashed user (Unsupported SSL Cipher)
Nt service\sqlagent$2014sql
Imperva.com 29
Classified DB data
Filter name Field Operation Values
Accepted Sensitive Decision equals Accept
Last scan only True
Alerts
Filter name Field Operation Values
Custom - DB Query Custom Policy equals Custom – Security: DB Query High Response Size
High Response Last few Days 90
Size
Custom- Custom Policy equals Custom – Security: Unauthorized Source IPs
Unauthorised Last few Days 90
Source IPs
Imperva.com 30
APPENDIX A: Metrics & Investigation
General Metrics
Regulation 1 3 1
Compliance
PDPA IT Risk Mgmt PCI-DSS
Secured DB
0 3 3 0
Secured Non-Secured Agent Based AgentLess
Classification
[pg 11-13] Personal Mobile
Credit Card Financial Health Fraud
Data Phone
Audit Sensitive
[pg 14-18] Service Delete /
Data New User Local
Admin Applications Users SQL Errors Update
access / Created Activities
Login / Logout Activities
Response
Security
Excessive
[Pg 19-26] Violated Unauthorized Privileged
Select * CVE Mis-config Response Login Failed
Policy Source IPs Commands
+200
Risky 16 13 12 2
Behaviour
Critical High Medium Low
Imperva.com 31
The Riskier DB Task 2: Finding Excessive Database Records Access
Investigation Notes Information
Who?
Human User
What?
What kind of data is related
Where?
Source Host/IP Address
When?
Event Time
How?
How it happened? Incident
How?
How many records in total is
assessed?
Which?
Which Application?
Imperva.com 32