Proactive early threat detection and securing SQL database with IBM QRadar and IBM Spectrum Copy data management, using IBM FlashSystem safeguarded copy

This IBM® blueprint publication focuses on early threat detection within a database environment by using IBM QRadar®. It also highlights how to proactively start a cyber resilience workflow in response to a cyberattack or potential malicious user actions. The workflow that is presented here uses IBM...

Full description

Bibliographic Details
Main Authors: Sapkar, Tejas, Shingornikar, Shashank (Author)
Format: eBook
Language:English
Published: [Place of publication not identified] IBM Blueprint 2022
Edition:[First edition]
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 02546nmm a2200385 u 4500
001 EB002172033
003 EBX01000000000000001309810
005 00000000000000.0
007 cr|||||||||||||||||||||
008 230808 ||| eng
020 |a 9780738460857 
050 4 |a QA76.9.A25 
100 1 |a Sapkar, Tejas 
245 0 0 |a Proactive early threat detection and securing SQL database with IBM QRadar and IBM Spectrum Copy data management, using IBM FlashSystem safeguarded copy  |c Tejas Sapkar, Shashank Shingornikar 
250 |a [First edition] 
260 |a [Place of publication not identified]  |b IBM Blueprint  |c 2022 
300 |a 34 pages  |b illustrations 
653 |a Internet / Security measures 
653 |a Internet / Sécurité / Mesures 
653 |a Surveillance des menaces informatiques 
653 |a Computer networks / Security measures / fast 
653 |a Réseaux d'ordinateurs / Sécurité / Mesures 
653 |a Cyber intelligence (Computer security) / http://id.loc.gov/authorities/subjects/sh2011005959 
653 |a Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277 
653 |a Internet / Security measures / fast 
653 |a Cyber intelligence (Computer security) / fast 
700 1 |a Shingornikar, Shashank  |e author 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
776 |z 0738460850 
776 |z 9780738460857 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780738460857/?ar  |x Verlag  |3 Volltext 
082 0 |a 005.8 
082 0 |a 331 
520 |a This IBM® blueprint publication focuses on early threat detection within a database environment by using IBM QRadar®. It also highlights how to proactively start a cyber resilience workflow in response to a cyberattack or potential malicious user actions. The workflow that is presented here uses IBM Spectrum® Copy Data Management as orchestration software to start IBM FlashSystem® Safeguarded Copy functions. The Safeguarded Copy creates an immutable copy of the data in an air-gapped form on the same IBM FlashSystem for isolation and eventual quick recovery. This document describes how to enable and forward SQL database user activities to IBM QRadar. This document also describes how to create various rules to determine a threat, and configure and start a suitable response to the detected threat in IBM QRadar. Finally, this document outlines the steps that are involved to create a Scheduled Job by using IBM Spectrum® Copy Data Management with various actions