• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Tracking SQL: Tango/04 Keeps Watch for Malicious Queries

    July 20, 2004 Alex Woodie

    The power of SQL is a double-edged sword on the iSeries. Its ease of use and speed make SQL a lifesaver when DB2/400 data must be fixed quickly. But, in the wrong hands, SQL can be used to copy, change, or delete whole swaths of a database, which can be done in relative obscurity. Tango/04 Computing Group recently launched new SQL Monitor software designed to shine some light on SQL’s dark side.

    Consider the potential uses of SQL on the iSeries, as related by Raul Cristian Aguirre, chief executive of Tango/04. “A well-known fraud scheme involved people from IT in combination with a truck driver: the IT guy doubled the number of goods to be delivered in certain orders just before shipping them, so the truck was loaded with more product than required. After getting the goods in the truck, the order numbers were reverted back to the original customer purchase, and the truck driver and the IT guy shared the profits of selling the extra products.”

    In this scenario, it would be almost impossible to trace how the goods left the warehouse, since the changes to the database were not audited, Aguirre says. SQL could also help someone to gain access to personal information, such as a politician’s medical history or a celebrity’s phone number, which might be governed under new laws, such as the Sarbanes-Oxley Act or HIPAA. Or a disgruntled employee might use SQL to copy a master file, which could be sold to the competition.

    On the iSeries, users are provided with interactive SQL access to the database through the Start Interactive SQL (STRSQL) command in OS/400, as well as through PC-based products, such as Microsoft Excel and Access, ODBC file transfer software, and many other reporting products. The STRSQL command is particularly dangerous, Aguirre notes, because it includes a wizard that guides users through the process of writing SQL queries.

    So if SQL is so easy to use and available, yet so dangerous, Aguirre asks, why is it used on the iSeries in the first place? “The answer is obvious: it is fast, convenient, and powerful,” he says. “On many occasions companies need to fix data as fast as possible, and there is no time to create a compiled, auditable, secure RPG or COBOL program to fix the wrong tables. Many financial institutions will publicly deny such practices (using SQL for quick-and-dirty fixes), but what happens when they have, for instance, a bug or a failure in the middle of a process? If a portion of the data is in bad shape, they need tools to fix it immediately, so they do not have to shutdown operations.”

    The bottom line is that “everybody fixes data with SQL or similar tools, but it is a nightmare for auditors and security officials to control this,” Aguirre says.



    FINDING AN SQL SOLUTION

    Aguirre says that Tango/04 has received many requests for products like the SQL monitors. There is nothing in OS/400 itself that can track interactive SQL statements. Similarly, today’s network security products for the iSeries aren’t able to track SQL statements in real time.

    Tango/04’s new SQL monitors are designed to bring accountability and real-time visibility to SQL. The products, which are components of Tango/04’s VISUAL Security Suite and VISUAL Message Center suites, capture all SQL queries performed on the iSeries database and save the SQL statement data in an audit trail file. This data can be retrieved by the VISUAL Security Suite console to generate audit reports that can be analyzed by IT personnel, security officers, or internal or external auditors, the company says.

    Tango/04 has introduced two SQL monitoring products. The Interactive iSeries SQL Monitor Agent keeps an eye on interactive SQL use supplied by STRSQL, while the iSeries SQL Monitor Agent captures all SQL statements, regardless of their source, including batch processes, SQL statements embedded in RPG and COBOL programs, ODBC clients, or any kind of program accessing DB2/400 with SQL.

    Both monitors structure and enrich the data they collect with additional information, such as the IP address and the real user who performs a query through ODBC, to generate legible event messages that provide the job name, user name, group profile, and accounting code, along with the corresponding executed SQL statement in its entirety, the company says.

    The new monitors also can be used with filters to target specific areas where SQL abuse is suspected. For example, the monitors could be set up to watch SQL statements dealing with specific tables, those entered during non-business hours, or those issued from people who shouldn’t be accessing that area of the database.

    In addition to catching malicious SQL statements, or malevolent employees or other users, the new SQL monitors have other uses. For example, when someone makes an honest mistake when writing an SQL statement, the monitors can be used to help revert the changes and understand what caused them, Aguirre says. They can also bolster the case of honest IT personnel who might have received a black mark due to the malicious actions of their not-so-honest coworkers, he says.

    The new SQL monitors are the latest enhancements to Tango/04’s VISUAL Security Suite and its flagship VISUAL Message Center. This spring it launched new software that monitors the logs of OS/400 applications (see “Tango/04 Launches New Message Log Monitor”).

    The new SQL monitors are available now. Go to www.tango04.com for more information.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    WorksRight Software

    Do you need area code information?
    Do you need ZIP Code information?
    Do you need ZIP+4 information?
    Do you need city name information?
    Do you need county information?
    Do you need a nearest dealer locator system?

    We can HELP! We have affordable AS/400 software and data to do all of the above. Whether you need a simple city name retrieval system or a sophisticated CASS postal coding system, we have it for you!

    The ZIP/CITY system is based on 5-digit ZIP Codes. You can retrieve city names, state names, county names, area codes, time zones, latitude, longitude, and more just by knowing the ZIP Code. We supply information on all the latest area code changes. A nearest dealer locator function is also included. ZIP/CITY includes software, data, monthly updates, and unlimited support. The cost is $495 per year.

    PER/ZIP4 is a sophisticated CASS certified postal coding system for assigning ZIP Codes, ZIP+4, carrier route, and delivery point codes. PER/ZIP4 also provides county names and FIPS codes. PER/ZIP4 can be used interactively, in batch, and with callable programs. PER/ZIP4 includes software, data, monthly updates, and unlimited support. The cost is $3,900 for the first year, and $1,950 for renewal.

    Just call us and we’ll arrange for 30 days FREE use of either ZIP/CITY or PER/ZIP4.

    WorksRight Software, Inc.
    Phone: 601-856-8337
    Fax: 601-856-9432
    Email: software@worksright.com
    Website: www.worksright.com

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    As I See It: What I Did on My Summer Vacation Encapsulating File Access in a Service Program

    Leave a Reply Cancel reply

Volume 4, Number 29 -- July 20, 2004
THIS ISSUE
SPONSORED BY:

LANSA
iTera
Guild Companies
Tango/04 Computing Group
Affirmative Computer

Table of Contents

  • Tracking SQL: Tango/04 Keeps Watch for Malicious Queries
  • App Development Gains Speed, Visual Characteristics with WebSphere Tools
  • IBM Targets Exchange Again with New E-Mail Software
  • Dieselpoint Search Engine Optimized for OS/400

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Meet The Next Gen Of IBMers Helping To Build IBM i
  • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
  • Will Independent IBM i Clouds Survive PowerVS?
  • Now, IBM Is Jacking Up Hardware Maintenance Prices
  • IBM i PTF Guide, Volume 27, Number 24
  • Big Blue Raises IBM i License Transfer Fees, Other Prices
  • Keep The IBM i Youth Movement Going With More Training, Better Tools
  • Remain Begins Migrating DevOps Tools To VS Code
  • IBM Readies LTO-10 Tape Drives And Libraries
  • IBM i PTF Guide, Volume 27, Number 23

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle