473,396 Members | 2,151 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

How to implement Audit/Alert for Row level access?

Hello,

We have a large database of our customers. Some of the important
customers records are flagged and can be accessed only by applications
designed for upper management. The management would like to know if
anyone else is trying or successfully accessed the flagged customers.

Is there anyway to send an email alert when a normal user/sysadmin tries
to access the flagged customers in the table?

Thank you in advance for any help.

NJ
Jun 27 '08 #1
7 2523
On Mon, 05 May 2008 21:09:00 -0400, Neil Jones
<ca******************@yahoo.comwrote:

You may have a logic error in your question, because if your assertion
"can be accessed only by applications designed for upper management"
is true, then obviously no one else has successfully accessed the
flagged customers.

-Tom.

>Hello,

We have a large database of our customers. Some of the important
customers records are flagged and can be accessed only by applications
designed for upper management. The management would like to know if
anyone else is trying or successfully accessed the flagged customers.

Is there anyway to send an email alert when a normal user/sysadmin tries
to access the flagged customers in the table?

Thank you in advance for any help.

NJ
Jun 27 '08 #2
Ok. Well, actually anyone user can access the data in the table. We
would like to monitor the access to the flagged customers.

NJ

Tom van Stiphout wrote:
On Mon, 05 May 2008 21:09:00 -0400, Neil Jones
<ca******************@yahoo.comwrote:

You may have a logic error in your question, because if your assertion
"can be accessed only by applications designed for upper management"
is true, then obviously no one else has successfully accessed the
flagged customers.

-Tom.

>Hello,

We have a large database of our customers. Some of the important
customers records are flagged and can be accessed only by applications
designed for upper management. The management would like to know if
anyone else is trying or successfully accessed the flagged customers.

Is there anyway to send an email alert when a normal user/sysadmin tries
to access the flagged customers in the table?

Thank you in advance for any help.

NJ
Jun 27 '08 #3
On Tue, 06 May 2008 03:03:22 -0400, Neil Jones
<ca******************@yahoo.comwrote:

Just checking.

You can apply SQL Server security to revoke access to that table, then
create two views:
select * from SecretTable
and give access to the Mgmt group only
and:
select * from SecretTable
where ImportantCustomerRecFlag = 0
and give access to Everyone.

-Tom.

>Ok. Well, actually anyone user can access the data in the table. We
would like to monitor the access to the flagged customers.

NJ

Tom van Stiphout wrote:
>On Mon, 05 May 2008 21:09:00 -0400, Neil Jones
<ca******************@yahoo.comwrote:

You may have a logic error in your question, because if your assertion
"can be accessed only by applications designed for upper management"
is true, then obviously no one else has successfully accessed the
flagged customers.

-Tom.

>>Hello,

We have a large database of our customers. Some of the important
customers records are flagged and can be accessed only by applications
designed for upper management. The management would like to know if
anyone else is trying or successfully accessed the flagged customers.

Is there anyway to send an email alert when a normal user/sysadmin tries
to access the flagged customers in the table?

Thank you in advance for any help.

NJ
Jun 27 '08 #4
>The management would like to know if anyone else is trying or successfully accessed the flagged customers. <<

This is a HIPAA requirement and it is best done with third party
software that has been certified. Conventional tools based off the
log files will show changes, but not access by user.
Jun 27 '08 #5
On May 6, 5:54 pm, --CELKO-- <jcelko...@earthlink.netwrote:
The management would like to know if anyone else is trying or successfully accessed the flagged customers. <<

This is a HIPAA requirement and it is best done with third party
software that has been certified. Conventional tools based off the
log files will show changes, but not access by user.
Joe, you don't happen to have a list of such software?
/Lennart
Jun 27 '08 #6
Neil Jones (ca******************@yahoo.com) writes:
We have a large database of our customers. Some of the important
customers records are flagged and can be accessed only by applications
designed for upper management. The management would like to know if
anyone else is trying or successfully accessed the flagged customers.

Is there anyway to send an email alert when a normal user/sysadmin tries
to access the flagged customers in the table?

Thank you in advance for any help.
In SQL 2000 and SQL 2005 there is very little support for this in
the product. You can set up a trace to caputre access to these tables.
You would then need a program that reads these trace files and checks
them for violation.

If you can afford to rework your applications, you can revoke access to
the underlying tables, and expose the customers through views. All
customers in one view, and another view with only non-flagged customers.
Only upper management would have permission to the former view.

In SQL 2008, currently in beta, there is a new auditing feature that I
think could meets your needs to some extent. But you would still have
to monitor the auditing log for violations on your own.
--
Erland Sommarskog, SQL Server MVP, es****@sommarskog.se

Books Online for SQL Server 2005 at
http://www.microsoft.com/technet/pro...ads/books.mspx
Books Online for SQL Server 2000 at
http://www.microsoft.com/sql/prodinf...ons/books.mspx
Jun 27 '08 #7
>Joe, you don't happen to have a list of such software? <<

Craig Mullins likes NEON, so I'd start there.
Jun 27 '08 #8

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

1
by: Byrocat | last post by:
We're going to be enabling the audit facility on some of our DB2 servers in the future, and I need some basic information on how large I can expect the log to grow. I've already been warning NOT...
2
by: Sarah | last post by:
Hi I have built a database that is currently being used by multiple users. I have not added user-level security to it because I don't understand it very well. I would like to add a audit trail...
13
by: Jim M | last post by:
I've been playing with Allen Browne's audit code and found it very useful. I need to track record insertions, deletions, and edits for several tables. I am planning to replace Access with Microsoft...
5
by: musicloverlch | last post by:
I'm looking for an simple bit of code that I can put on any field in a form to record any changes. Not only do I need to know who changed the field, but also what the original value was. Is...
6
by: Parag | last post by:
Hello, I have been assigned the task to design the audit trail for the ASP.NET web application. I don't know what the best practices for such audit trails are. Our application one dedicated user...
0
by: Santiago Cassina | last post by:
Hi list. I just want to send to you an sql file containing tools for audit the UPDATE and DELETE statements in a database by saving all the modifications made by a network/system/database user. I...
6
by: philmgron | last post by:
Hello I have been hitting my head against the wall on this problem for a day now. I have a simple table that stores cities, on of the fields on the table is modified_by. I am trying to write the...
3
by: hary08 | last post by:
im doing a database for Hospital Admission, I have a log in form which prompt user for a password. The source of log in is to look for the values in my Table tblEmployees and match user name and...
1
by: melissamuse | last post by:
I am using an MS Access 2002 database to track user login information. I have copied Allen Browne's audit log and removed the references to the error handling. So far, on all of my forms (for 7...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.