Today’s rapid pace of development and deployment increases the need for accessibility, which increases the risk of simple human error which can corrupt, delete, or drop valuable data from your database. But, traditional perimeter-based security methods often restrict the agility of development. As a result, developers are often given administrator privileges, which attackers can exploit to move laterally around your network.
Check Point eliminates the need to give developers such board access rights. Check Point integrates natively with database protocols, providing developers with a quick and secure connection to any database through their terminal. Any underlying security measures are indetectable. At the same time, Check Point’s role-based access controls allow administrators to easily provision and deprovision access to (and within) any database and limit a developer’s role down to “view only” completely blocking their ability to write, drop or alter the database.
Administrators can confidently provide developers with database access because they can also but limit their roles down to “view only” completely blocking their ability to write, drop or alter the database. Check Point supports three profiles: owner, editor, and viewer.
Check Point’s built-in PAM solution eliminates the risk associated with users holding static credentials. Users authenticate to a database using either a short-lived token or a public-private key pair, both of which are issued and managed through Check Point. The keys are rotated periodically and can be manually revoked at any time, instantly cutting off all access.
Check Point integrates natively with database protocols, providing users with a quick and secure connection to any database through their terminal and providing administrators with a complete audit trail of user activity, including executed queries. All audit logs are tied to user accounts and devices and can be exported to your SIEM or other monitoring tools for additional contextual data.