Security Management
Security features must be tested early during the first rollout. Security is often
overlooked in BI applications or is given superficial attention. Keep in mind that the
data in the BI target databases is the same data contained in the operational
systems. The common argument that security is not an issue for BI applications
because the data is aggregated and summarized holds true only if detailed data is
not available through drill-down features. In that case, the security measures for the
BI data do not need to be as stringent as the security measures imposed on the
same operational source data. However, most BI target databases store a fair
amount of detailed data in addition to the summaries. Therefore, the security
measures may be relaxed for some of the data but not for all.
Security Measures for BI Applications
Organizations that have strong security umbrellas on their mainframes are more
likely to pay attention to security measures for their BI applications on multi-tier
platforms. Organizations that have very lax security policies for their mainframes are
usually prone to treating security casually for their BI applications as well. These
organizations may unwittingly expose themselves to security breaches, especially if
they plan to deliver information from the BI target databases over the Web.
The following is an example of a security requirement that may need to be imposed
on a BI application. Suppose an organization wants to give its distributors the ability
to analyze their orders and shipments via a multidimensional BI application. To
prevent a distributor from searching through other distributors' sales data, there
would have to be a mechanism for restricting each distributor's access to only the
sales data pertaining to that particular distributor. In other words, some security
lock is required to prevent access to the competitors' sales data. This is not as
straightforward as it sounds.
No off-the-shelf umbrella security solutions can impose this kind of security.
This security requirement would have to be implemented through the various
security features of the database management system (DBMS) and of the
access and analysis tools used by the BI application.
The solution of imposing security at a table level may not be granular enough.
However, one possible way to achieve this type of security is to partition the
tables either physically or logically (through VIEWs). Partitioning will restrict
access solely to the appropriate distributor as long as both the fact tables and
the dimension tables are partitioned. Therefore, this method could become too
cumbersome.
An alternative may be to enhance the meta data with definitions of data
parameters, which could control access to the data. This form of security would
be implemented with appropriate program logic to tell the meta data repository
the distributor's identity, allowing the application to return the appropriate data
for that distributor only. This type of security measure will be only as good as
the program controlling it.