An Oracle White Paper June Security and Compliance with Oracle Database 12c

Size: px
Start display at page:

Download "An Oracle White Paper June 2013. Security and Compliance with Oracle Database 12c"

Transcription

1 An Oracle White Paper June 2013 Security and Compliance with Oracle Database 12c

2 Introduction... 3 Oracle Database 12c Security... 4 Locating and Cataloging Your Sensitive Data... 4 Monitoring the Configuration of Sensitive Databases... 5 Configuration Scanning... 5 Auditing Sensitive Operations... 5 Protecting Against Database Bypass Threats... 6 Advanced Security TDE... 6 Protecting Data in Non-Production Environments... 7 Data Masking... 7 Limiting Sensitive Data Exposure in Applications... 8 Advanced Security Data Redaction... 8 Protecting Against Common Threats... 8 Database Vault Privileged Account Controls... 9 Database Vault Command Controls Audit Vault and Database Firewall Detective Controls Audit Vault and Database Firewall SQL Injection Prevention Building More Secure Applications Database Vault Privilege Analysis Code Based Access Control Real Application Security Data Classification for Government and Defense Applications Label Security Access Control... 12

3 Oracle Database 12c Secure By Default Oracle Database Security and Applications Conclusion... 14

4 Introduction The need to secure data is driven by an expanding privacy and regulatory environment coupled with an increasingly dangerous world of hackers, organized crime, and other groups intent on stealing valuable data. The security picture is complicated even more by the rapid expansion of access to the Internet, an unprecedented understanding of technology, increasing economic competition, and the push to achieve greater efficiencies through consolidation and cloud computing. Information targeted for attack has included citizen data, intellectual property, credit card data, financial information, government data, and competitive bids. Attack methodologies include hacking of privileged user accounts, exploitation of application vulnerabilities, media theft, and other sophisticated attacks collectively known as advanced persistent threats or APT. In response to the increasing threat to data, regulations have been put in place that include the numerous U.S. State privacy laws, Payment Card Industry Data Security Standard (PCI-DSS), the U.K Data Protection Act, and the Korean Act on Protection of Personal Data, to name a few. To better understand the importance of database security one needs to consider the potential sources of vulnerability. Threats that target the operating system can circumvent the database by accessing raw data files, bypassing application security, access controls inside the database, network security, and encrypted drives. Proliferation of production data beyond the controls of the production environment expand the scope of compliance and increase the risk to data. Privacy related information by be exposed to individuals without a true need-to-know due to an oversight in the development process or the complexity of modifying legacy application modules. Privileged user accounts and over privileged applications may become targets for highly specialized attacks or the source of insider threats. Ad-hoc access to application data by privileged accounts may violate internal policies, regulatory mandates, service level agreements, as well as expose data to external attacks. Application bypass through SQL injection can expose large amounts of sensitive data to attackers or unauthorized users. Configuration drift or changes that create deviation from internal deployment standards and security best practices can result in audit findings, impact business continuity, and increased security risks. 3

5 Oracle Database 12c Security Security and compliance requires a defense in depth, multi-layered, security model that includes preventive, detective, and administrative controls that are aligned with the sensitivity of the data, its location, its environment, applicable regulations and business impact should the data be lost, stolen, or used for unauthorized purposes. Oracle Database 12c increases security for both existing and new application development by enabling controls to be moved closer to the data itself and providing solutions to the tighten security of existing applications. New capabilities such as privilege analysis, conditional auditing, real application security, data redaction, mandatory realms, separation of duty, and integration with the Oracle Multitenant are just a few of the exciting new security capabilities available with Oracle Database 12c. Deploying security with Oracle Database 12c is even easier with simplified setup and configuration combined with enhancements to Oracle Enterprise Manager Grid Control. Performance optimizations across all areas, including encryption, auditing, and access control, enable security to be deployed without impacting business operations or service level agreements. Oracle Database 12c Security combined with the latest release of Oracle Audit Vault and Database Firewall provides unprecedented capabilities to protect data using a combination of preventive, detective, and administrative controls. Locating and Cataloging Your Sensitive Data Knowing where your sensitive data resides is an important first step in deploying a defense in depth security model. Identifying sensitive data based on the type of application running is a common method used to classify databases. In some cases, more granular controls on data within a given application may be desired. Knowing where specific data resides can be challenging due to the complexity and size of large applications. Oracle Enterprise Manager Data Discovery and Modeling and Sensitive Data Discovery (SDD) can be used to facilitate the process of locating sensitive data within an application and applying security controls on that data. SDD can be used with Oracle Data Masking and other database security solutions to identify and protect sensitive data. Oracle has created Application Accelerators for both Oracle Fusion Applications and Oracle E- Business Suite. The Application Accelerators list the sensitive data for each of the applications. Oracle Data Masking uses the Application Accelerators to facilitate masking of data from production databases to test and development environments. In addition, the new Oracle Database 12c feature Transparent Sensitive Data Protection (TSDP) can load sensitive information from Oracle Enterprise Manager Data Discovery and Modeling into the Oracle database and apply security controls such as Oracle Advanced Security Data Redaction. 4

6 Monitoring the Configuration of Sensitive Databases Preventing and detecting configuration drift increases both business continuity and high availability. Oracle Database 12c provides both administrative controls and detective controls to help maintain a secure configuration. Fundamental to preventing configuration drift is blocking unauthorized or out of policy changes. Configuration Scanning Configuration monitoring and the prevention of configuration drift is an important part of the security deployment architecture. Oracle Enterprise Manage Database Lifecycle Management Pack can be used to scan databases for numerous security related settings, including checks for default passwords. Monitoring database accounts, managing privilege entitlements, enforcing password complexity, and maintaining a secure configuration are all part of the monitoring process. Proactive assessment of key compliance areas such as security, configuration, and storage help identify areas of vulnerabilities and areas where best practices are not being followed. Important components of Oracle Enterprise Manager Database Lifecycle Management include out-of-the-box policy checks as well as the ability to define custom configuration checks. Auditing Sensitive Operations Oracle Database 12c unified auditing provides a comprehensive syntax for managing auditing inside the Oracle database that is both policy based as well as context sensitive aware. The new implementation provides a policy based syntax that is easy to use for managing auditing within the database. For example, audit policies can be configured to audit based on the IP address or program name of the database connection. If a connection is coming from an unidentified IP address or using an ad hoc tool, audit records will be generated for the activity and recorded in the new unified_audit_trail inside the Oracle database. New roles have been introduced for management of policies and viewing of audit data. This new separation of duty capability provides flexibility to organizations who wish to designate specific users for managing audit settings and viewing audit activity. For example, audit policies can be defined based on factors such as time of day, IP address, program name, and proxy user name. In addition, the policies can be enabled with exception clauses that disable auditing for specific users. The new architecture unifies the existing audit trails into a single audit trail, enabling simplified management and increasing the security of audit data generated by the database. Audit data can only be managed using the built-in audit data management package within the database and not directly updated or removed using SQL commands. Three default policies are configured and shipped out of the box. The traditional audit commands available in previous releases continue to be supported in Oracle Database 12c. 5

7 Protecting Against Database Bypass Threats Database bypass threats include attacks that target backup media, discarded media, and the operating systems. One of the most widely used technologies used to protect against database bypass threats is encryption. A key milestone in the widespread recognition of encrypt technologies came in 2003 with the passage of California Senate Bill 1386 (SB1386). SB1386 introduced the topic of encryption to a broad audience and since then many other states have passed their own privacy-related laws. Today the need to protect privacy-related information is a global issue as companies expand their operations and businesses. In addition to privacy laws, the payment card industry data security standard (PCI-DSS), first introduced in 2006, has raised awareness across the board for security and the need to render cardholder data unreadable where it is stored and transmitted. While encryption of backup media and proper disposal of media are probably the two most well understood security controls, increasing sophisticated attacks have focused on attacking the servers themselves and gaining access to the raw data files that hold sensitive information. Advanced Security TDE Oracle Advanced Security Transparent Data Encryption (TDE) encrypts and decrypts data through the Oracle database kernel. Data stored on disk is automatically encrypted when loaded into the database and automatically decrypted when users or applications authenticate to the database and pass all database enforced access controls. Plain text data is unavailable when access is attempted at the operating system layer. TDE provides transparent of encryption of data at rest, a requirement today for regulations that range from privacy laws to PCI-DSS as well as protecting against threats directly targeting storage either on production servers or backup media. TDE enables data owners to maintain control over the data by ensuring that sensitive data does not reside in clear text on the underlying media. Without encryption, operating system attacks leave open the possibility of unimpeded access to sensitive data via direct access at the operating system layer to the files, or disk blocks, that comprise the database, bypassing the authentication and access controls of the database. TDE has distinct advantages over other encryption solutions in that a user has to be authenticated to the database and pass authorization checks at both the application and database levels before the data is decrypted. Encryption is especially important when data is moved into cloud environments where the management of storage media and transmission of data is transparent to the data owners themselves. TDE transparently leverages hardware cryptographic acceleration available on Intel XEON 5600 and Oracle SPARC T4 and T5 processors, enabling encryption to be performed with negligible performance overhead in most workload environments. TDE tablespace encryption is integrated with Oracle Compression technologies, enabling storage to be optimized without sacrificing security. 6

8 Protecting Data in Non-Production Environments The need for realistic data sets for development and test environments has resulted in the proliferation of data beyond the boundaries of production applications. This movement of production data dramatically increases the risk to data and increases the overall cost of security and compliance. Masking of data before it is moved from production eliminates the risk of data breaches in non-production environments by irreversibly replacing the original sensitive data with fictitious data so that data can be safely shared with IT developers or business partners. Data Masking Oracle Data Masking provides end to end automation for provisioning test databases from production in compliance with regulations. Sensitive information such as credit card or social security numbers can be replaced and used for development and testing without expanding the security perimeter. This reduces the number of database systems that need to be monitored for compliance and security. Important considerations in masking include the ability to maintain referential relationships between application tables after the masking process has taken place. Application records that span application tables and are linked by a given column need to have those values consistently replaced across the related tables. Data Masking discovers these relationships and masks all related data elements automatically while preserving referential relationships. The combination of sensitive data columns and the associated primary key-foreign key relationships are stored in an Application Data Model in the Oracle Enterprise Manager repository. Data Masking ships with pre-defined accelerators for Oracle Applications that can discover the metadata relationships in existing Oracle Fusion Applications and Oracle E-Business Suite applications and create Application Data Models to store these relationships. Data Masking provides a centralized library with out-of-the-box mask formats for common types of sensitive data, such as credit card numbers, phone numbers, national identifiers (social security number for U.S., national insurance number for U.K.). By leveraging the Format Library in Data Masking, enterprises can apply data privacy rules to sensitive data across enterprise-wide databases from a single source and thus, ensure consistent compliance with regulations. Enterprises can also extend this library with their own mask formats to meet their specific data privacy and application requirements. Once the work of associating masking definitions with application attributes is complete, the formats and data associations can be saved in the Application Data Model and re-executed when test, development or partners need a refresh of data. Oracle Data Masking Pack can support masking of data in heterogeneous databases, such as IBM DB2 and Microsoft SQLServer, through the use of Oracle Database Gateways. 7

9 Limiting Sensitive Data Exposure in Applications Oracle Data Masking provides an excellent solution for irreversible changing data so that it can be moved into test and development environments. However, enforcing consistent handling of sensitive data in production applications across multiple development teams can be complex and error prone. In addition, changing existing applications to limit exposure of sensitive data may not always be possible. Advanced Security Data Redaction Oracle Advanced Security with Oracle Database 12c introduces a powerful new capability with data redaction. Data redaction complements Oracle Advanced Security transparent data encryption (TDE). While TDE helps protect information from database bypass attacks, data redaction helps protect information by enforcing controls inside the database that redact data before it is returned to the application. Since data is redacted before it is returned to the application, exposure of sensitive information is reduced. Take for example, a credit card number, using Oracle Advanced Security Data Redaction the first 12 digits can be redacted to the same value, with only the last 4 digits being shown in the clear. Data redaction is applicable to a wide range of sensitive data, including social security numbers, birthdates, bank account numbers, and drivers license number, to name a few. Oracle Advanced Security Data Redaction supports a number of different transformations that can redact all data in specified columns, preserve certain pieces of the data, or randomly generate replacement data. Data Redaction makes the business need-to-know decision based on declarative policy conditions that utilize rich runtime contexts available from the database and from the applications themselves. Examples include user identifiers, user roles, and client IP addresses. Context information available from Oracle Application Express (APEX), Oracle Real Application Security, and Oracle Label Security also can be utilized. Redacting APEX applications is straightforward because you can create policy conditions using the application users and application identifiers that APEX automatically tracks. Multiple runtime conditions can be joined together within a Data Redaction policy for fine-grained control over when redaction occurs. The policies are stored and managed inside of the database, and they go into effect immediately upon being enabled. Protecting Against Common Threats A common characteristic of many data breaches has been the use of privileged user credentials and their far-reaching access inside the database. Some of these data breaches were perpetrated by insiders, while others were executed by hackers. Privileged user accounts inside the database and their unimpeded 24/7 access to application data create prime targets for hackers and other groups. Consolidation has further complicated the situation by potentially exposing massive amounts of sensitive information should those accounts be targeted and compromised. In 8

10 addition, SQL injection vulnerabilities within applications have been frequent points of attack. These vulnerabilities can be even harder to detect and block because they are commonly passed through to the database by applications using credentials that are trusted. Protecting against these common types of attacks requires a defense-in-depth approach. The depth of the security controls required will depend on the application and sensitivity of the data. For example, while privileged user controls may be vital on production systems, they most likely are less applicable on test and development systems where sensitive data has been masked or swapped out with production like data. At the same time, multiple preventive controls may be applicable on highly sensitive systems, while a subset may be applicable on less sensitive systems. In addition, some controls may be applicable to both Oracle and non-oracle databases, while others may only be available in the Oracle database. Database Vault Privileged Account Controls Oracle Database Vault with Oracle Database 12c creates a highly restricted application environment ( Realm ) inside the Oracle database that prevents access to application data from privileged accounts while continuing to allow the regular authorized administrative activities on the database. Realms can be placed around all or specific application tables and schemas to protect them from unauthorized access while continuing to allow access to owners of those tables and schemas, including those who have been granted direct access to those objects. Oracle Database Vault Realms also place controls on powerful system privileges, roles and ad hoc account creation. Periodic access to production environments by IT support staff or application DBAs is a common requirement and is typically associated with patching activity or diagnosing a performance issue. This task may typically involve recreating indexes and triggers, patching PL/SQL packages, or adding new tables, views, and other objects. During such maintenance windows, security would be improved if there were an ability to seal off access to tables and views containing highly sensitive data, even to those with direct object grants or the application owner. This is an increasingly common security need driven by data governance requirements and cross country regulations. Oracle Database Vault with Oracle Database 12c introduces Mandatory Realms that effectively seal off application tables, views, or other objects from all access, including the object owner and privileged users, unless access has been specifically granted. Mandatory Realms can be preconfigured, enabled during maintenance operations or as temporary response to a known threat. Mandatory Realms can also be used as an additional line of defense to protect applications. In this case, they would not only prevent privileged user access, just like regular realms, but also provide an additional authorization check on all users who have access to the application including those with direct object grants and the application owner. These users can be authorized to the Mandatory Realm and additional checks can be performed before allowing access to application data. 9

11 Database Vault Command Controls Oracle Database Vault Command Controls can be used to block or enforce additional checks on SQL commands that may impact the security and availability of the application and the database. Oracle Database Vault Command Controls introduce an additional layer of rules and checks before the SQL command is executed. Command controls can be used to block activity such as ad hoc creation of database links or the creation of tables using a create table as select * from syntax. These types of operations can be indicators of potential threats originating from inside the organizations or by someone who has penetrated the perimeter firewall. Command Controls can also be used to restrict access to databases from a specific subnet, application server, and program, creating a trusted path from the application to the database. Built-in factors, such as IP address, host name and session user name can be used in conjunction with command controls. Oracle Label Security user label factors can also be used to control activity based on the security clearance of the database session. In addition, Oracle APEX native functions and factors can be used with Oracle Database Vault Command Controls to determine whether to allow access to specific DML or DDL statements. Audit Vault and Database Firewall Detective Controls Oracle Audit Vault and Database Firewall provides a first line of defense for databases and consolidates audit data from databases, operating systems, and directories. Database activity monitored on the network is combined with detailed audit data for comprehensive compliance reporting and alerting. With Oracle Audit Vault and Database Firewall, auditing and monitoring controls can be easily tailored to meet enterprise security requirements. Oracle Audit Vault and Database Firewall consolidates database activity from audit logs that includes privileged user activity inside the database. Oracle Audit Vault and Database Firewall can also consolidates audit data from Microsoft Active Directory, Microsoft Windows, Oracle Solaris, Linux, and Oracle ASM Cluster File System. A plug-in architecture consolidates custom audit data from application tables and other sources. Audit Vault and Database Firewall SQL Injection Prevention Oracle Audit Vault and Database Firewall provides a sophisticated next-generation SQL grammar analysis engine that inspects SQL statements going to the database and determines with high accuracy whether to allow, log, alert, substitute, or block the SQL. Oracle Database Firewall supports white list, black list, and exception list based polices. A white list is simply the set of approved SQL statements that the database firewall expects to see. These can be learned over time or developed in a test environment. A black list includes SQL statements from specific users, IP addresses, or specific types that are not permitted for the database. Exception listbased policies provide additional deployment flexibility to override the white list or black list policies. Policies can be enforced based upon attributes, including SQL category, time of day, application, user, and IP address. This flexibility, combined with highly accurate SQL grammar 10

12 analysis, enables organizations to minimize false alerts, and only collect data that is important. Database Firewall events are logged to the Audit Vault Server enabling reports to span information observed on the network alongside audit data. Security controls can be customized with in-line monitoring and blocking on some databases and monitoring only on other databases. The Database Firewall can be deployed in-line, out-ofband, or in proxy mode to work with the available network configurations. For monitoring remote servers, the Audit Vault Agent on the database server can forward the network traffic to the Database Firewall. Delivered as a soft appliance, a single Audit Vault Server can consolidate audit logs and firewall events from thousands of databases. Both Audit Vault Server and the Database Firewall can be configured in a HA mode for fault tolerance. Building More Secure Applications Most application today use 3-tier architectures, connecting as one big application user to the database. These users commonly have very powerful privileges within the database. Understanding these privileges, how and if they are used, is a complex task. In addition, application users, roles, and privileges are commonly all managed in custom application tables and are unknown to the underlying database. This model, while widely used, relies on the application for all security enforcement. Direct connections to the database generally result in unimpeded access to all application data. Database Vault Privilege Analysis Oracle Database Vault with Oracle Database 12c provides the ability to monitor privileges and roles used by applications, database users, and administrators through Privilege Analysis. Privilege Analysis can be used to analyze privileges and roles used database wide or condition based. Conditions can include a specific user name, program name, or any other value available through SYS_CONTEXT. This powerful new capability can be used to scope down the privileges and roles used by applications, database users, and database administrators. Scoping down the privileges and roles increased the security of the database by limiting the attack surface should an application account be breached. New views inside the database provide the ability to report on used and unused privileges and roles. Database Vault Privilege Analysis can be used to analyze the privileges and roles of existing applications and used throughout the development lifecycle of new applications. Code Based Access Control Oracle Database 12c Code Based Access Control enables database roles to be granted to stored procedures, functions, and packages. This new security feature enables limited privilege elevation within the stored program unit. Applications that rely on definers or invokers rights procedures can use this new feature to grant roles to the stored program unit. When the stored program unit 11

13 is invoked, the privileges associated with the granted role will be available in the runtime context of the stored program unit. Real Application Security Oracle Database 12c introduces the next generation Oracle virtual private database (VPD) with new security technology to support application security requirements. Oracle Database 12c Real Application Security (RAS) provides a declarative model that enables security policies that encompass not only the business objects being protected but also the principals (users and roles) that have permissions to operate on those business objects. RAS is more secure, scalable, and cost effective than traditional Oracle virtual private database technology. Unlike the traditional Oracle VPD, RAS provides a declarative interface that allows developers to define the data security policy, application roles, and application users without requiring application developers to create and maintain PL/SQL stored procedures. With RAS, the data security policies are defined inside the database kernel using the Oracle Database 12c RAS API. The permissions associated with business objects are stored in Access Control Lists (ACLs). ACLs are a key component of Real Application Security and store the privileges assigned to principals and control the type operations select, insert, update and delete that can be performed on the objects. Data Classification for Government and Defense Applications Enforcing access controls based on classification labels is a common requirement found in government and defense environments. Commonly referred to as multi-level security, access to rows in application tables is controlled based on a data classification label assigned to the data and a user label or security clearance assigned to the user. Label Security Access Control Oracle Label Security enables government and defense organizations to control access to data and enforce multi-level security. Label Security restricts access to data based on the classification of the data and the security clearance of the application user. Based on U.S. Department of Defense Multi-Level Security (MLS) concepts, Label Security assigns a data label or data classification to application data, enabling sensitive data to reside in the same table with less sensitive data. Oracle Label Security enforces control by comparing the data label with the label or security clearance of the user requesting access. Data Labels can be attached as hidden columns to existing tables, providing transparency to existing applications by mediating access based on the data label but not returning the actual data label in the SQL statement. Alternatively, the data label can be explicitly requested, but only for those rows the security clearance of the user permits. Data labels can be comprised of three components. The first component is a mandatory hierarchical level. Examples of Levels include public, confidential, and highly sensitive. The second 12

14 component is optional and is known as a compartment. Multiple compartments can be assigned to a data label and are used to enforce additional special access requirements. For example a data label protecting special customer accounts might be protected by a compartment. The third and final component of a label is optional and is known as a group. Multiple groups can be assigned to a label and typically correspond to ownership hierarchies, territories, or jurisdictions. User labels, or security clearances, can also be used as conditional factors within Oracle Advanced Security Data Redaction policies and Oracle Database Vault Command Rules, providing additional controls over whom sees redacted versus actual data and who can perform sensitive operations inside the database. Oracle Database 12c Secure By Default Oracle Database 12c has numerous enhancements that provided increased configuration security by default. Included in these enhancements are reduced dependency on SYSDBA, expanded support for SHA-512, stronger security on sensitive data dictionary tables, display of last login time after authentication in tools such as SQL*Plus, removal of the UNLIMITED TABLESPACE privilege from the RESOURCE role, support for multiple forms of authentication within the same database, and support for network encryption and strong authentication in the SE and EE editions of the database. Oracle Database 12c introduces new roles for separation of duty, including SYSDG (Data Guard), SYSBACKUP (RMAN), and SYSKM (Advanced Security Key Management), enabling more secure management of the database by reducing the frequency and conditions under which the SYSDBA role needs to be used. In addition, the AUDIT_ADMIN and AUDIT_VIEWER roles have been introduced for management and monitoring of the new Oracle Unified and Conditional auditing. Oracle Database Security and Applications Oracle Advanced Security TDE and Oracle Database Vault have been certified with many applications include Oracle E-Business Suite, Oracle Siebel Applications, Oracle PeopleSoft Applications, Oracle JDEdwards EnterpriseOne, Oracle Primavera, and Oracle Retek. Third party certifications include SAP and Finacle. Oracle Audit Vault and Database Firewall can be used for monitoring SQL traffic being sent to the database or consolidating audit data from the underlying operating system and directories supporting the application. Oracle Audit Vault and Database Firewall can also be used to consolidate audit data from tables inside application. 13

15 Conclusion Perimeter firewalls are insufficient in today s world of ubiquitous Internet access, technology awareness, and global economic competition. The push toward data consolidation and cloud computing combined with an ever-changing regulatory landscape require solutions to be highly transparent and cost effective to deploy. Securing databases requires a defense-in-depth approach spanning preventive, detective, and administrative controls. Attack vectors targeting privileged accounts inside and outside the database, application vulnerabilities, and data in test and development environments are just a few of the reasons why security must be moved closer to the data. Perimeter firewalls must be supplemented with additional controls that are aligned with the sensitivity of the data, its location, its environment, applicable regulations and business impact should the data be lost, stolen, or used for unauthorized purposes. 14

16 Security and Compliance with Oracle Database 12c June 2013 Oracle Corporation World Headquarters 500 Oracle Parkway Redwood Shores, CA U.S.A. Worldwide Inquiries: Phone: Fax: oracle.com Copyright 2013, Oracle and/or its affiliates. All rights reserved. This document is provided for information purposes only and the contents hereof are subject to change without notice. This document is not warranted to be error-free, nor subject to any other warranties or conditions, whether expressed orally or implied in law, including implied warranties and conditions of merchantability or fitness for a particular purpose. We specifically disclaim any liability with respect to this document and no contractual obligations are formed either directly or indirectly by this document. This document may not be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without our prior written permission. Oracle is a registered trademark of Oracle Corporation and/or its affiliates. Other names may be trademarks of their respective owners. 0109

An Oracle White Paper April 2014. Security and Compliance with Oracle Database 12c

An Oracle White Paper April 2014. Security and Compliance with Oracle Database 12c An Oracle White Paper April 2014 Security and Compliance with Oracle Database 12c Introduction... 2 Oracle Database 12c Security... 3 Protecting Against Database Bypass Threats... 3 Limiting Sensitive

More information

An Oracle White Paper June 2009. Oracle Database 11g: Cost-Effective Solutions for Security and Compliance

An Oracle White Paper June 2009. Oracle Database 11g: Cost-Effective Solutions for Security and Compliance An Oracle White Paper June 2009 Oracle Database 11g: Cost-Effective Solutions for Security and Compliance Protecting Sensitive Information Information ranging from trade secrets to financial data to privacy

More information

An Oracle White Paper January 2011. Oracle Database Firewall

An Oracle White Paper January 2011. Oracle Database Firewall An Oracle White Paper January 2011 Oracle Database Firewall Introduction... 1 Oracle Database Firewall Overview... 2 Oracle Database Firewall... 2 White List for Positive Security Enforcement... 3 Black

More information

Oracle Database 12c Security and Compliance O R A C L E W H I T E P A P E R F E B R U A R Y 2 0 1 5

Oracle Database 12c Security and Compliance O R A C L E W H I T E P A P E R F E B R U A R Y 2 0 1 5 Oracle Database 12c Security and Compliance O R A C L E W H I T E P A P E R F E B R U A R Y 2 0 1 5 Table of Contents Introduction 2 Oracle Database 12c Security 3 Preventing Database Bypass 3 Preventing

More information

An Oracle White Paper January 2012. Oracle Database Firewall

An Oracle White Paper January 2012. Oracle Database Firewall An Oracle White Paper January 2012 Oracle Database Firewall Introduction... 2 Oracle Database Firewall Overview... 3 Oracle Database Firewall... 3 White List for Positive Security Enforcement... 4 Black

More information

An Oracle White Paper June 2013. Encryption and Redaction in Oracle Database 12c with Oracle Advanced Security

An Oracle White Paper June 2013. Encryption and Redaction in Oracle Database 12c with Oracle Advanced Security An Oracle White Paper June 2013 Encryption and Redaction in Oracle Database 12c with Oracle Advanced Security Introduction... 1 Preventing Database Bypass with Encryption... 2 Oracle Advanced Security

More information

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Copyright 2013, Oracle and/or its affiliates. All rights reserved. 1 Security Inside-Out with Oracle Database 12c Denise Mallin, CISSP Oracle Enterprise Architect - Security The following is intended to outline our general product direction. It is intended for information

More information

An Oracle White Paper June 2011. Oracle Database Firewall 5.0 Sizing Best Practices

An Oracle White Paper June 2011. Oracle Database Firewall 5.0 Sizing Best Practices An Oracle White Paper June 2011 Oracle Database Firewall 5.0 Sizing Best Practices Introduction... 1 Component Overview... 1 Database Firewall Deployment Modes... 2 Sizing Hardware Requirements... 2 Database

More information

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Copyright 2013, Oracle and/or its affiliates. All rights reserved. 1 Security Inside Out Latest Innovations in Oracle Database 12c Jukka Männistö Database Architect Oracle Nordic Coretech Presales The 1995-2014 Security Landscape Regulatory Landscape HIPAA, SOX (2002),

More information

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Copyright 2013, Oracle and/or its affiliates. All rights reserved. 1 Solutions for securing and auditing Oracle database Edgars Ruņģis Technology Consultant Why Are Databases Vulnerable? 80% of IT Security Programs Don t Address Database Security Forrester Research Enterprises

More information

An Oracle White Paper May 2013. Oracle Audit Vault and Database Firewall 12.1 Sizing Best Practices

An Oracle White Paper May 2013. Oracle Audit Vault and Database Firewall 12.1 Sizing Best Practices An Oracle White Paper May 2013 Oracle Audit Vault and Database Firewall 12.1 Sizing Best Practices Introduction... 1 Component Overview... 2 Sizing Hardware Requirements... 3 Audit Vault Server Sizing...

More information

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information Proteggere i dati direttamente nel database Una proposta tecnologica Angelo Maria Bosis Sales Consulting Senior Manager

More information

Securing Data in Oracle Database 12c

Securing Data in Oracle Database 12c Securing Data in Oracle Database 12c Thomas Kyte http://asktom.oracle.com/ Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes

More information

<Insert Picture Here> Oracle Database Security Overview

<Insert Picture Here> Oracle Database Security Overview Oracle Database Security Overview Tammy Bednar Sr. Principal Product Manager tammy.bednar@oracle.com Data Security Challenges What to secure? Sensitive Data: Confidential, PII, regulatory

More information

An Oracle White Paper June 2014. Security and the Oracle Database Cloud Service

An Oracle White Paper June 2014. Security and the Oracle Database Cloud Service An Oracle White Paper June 2014 Security and the Oracle Database Cloud Service 1 Table of Contents Overview... 3 Security architecture... 4 User areas... 4 Accounts... 4 Identity Domains... 4 Database

More information

An Oracle White Paper April 2014. Oracle Audit Vault and Database Firewall

An Oracle White Paper April 2014. Oracle Audit Vault and Database Firewall An Oracle White Paper April 2014 Oracle Audit Vault and Database Firewall Introduction... 2 Oracle Audit Vault and Database Firewall Overview... 3 Auditing and Monitoring Overview... 3 Audit Vault... 4

More information

Oracle Database 11g: Security Release 2. Course Topics. Introduction to Database Security. Choosing Security Solutions

Oracle Database 11g: Security Release 2. Course Topics. Introduction to Database Security. Choosing Security Solutions Oracle Database 11g: Security Release 2 In this course, students learn how they can use Oracle Database features to meet the security, privacy and compliance requirements of their organization. The current

More information

An Oracle White Paper March 2009. Oracle Label Security in Government and Defense Environments

An Oracle White Paper March 2009. Oracle Label Security in Government and Defense Environments An Oracle White Paper March 2009 Oracle Label Security in Government and Defense Environments Protecting Sensitive Information... 2 Oracle Label Security Overview... 2 Getting Started with Oracle Label

More information

D50323GC20 Oracle Database 11g: Security Release 2

D50323GC20 Oracle Database 11g: Security Release 2 D50323GC20 Oracle Database 11g: Security Release 2 What you will learn In this course, you'll learn how to use Oracle Database features to meet the security, privacy and compliance requirements of their

More information

Database Security & Compliance with Audit Vault and Database Firewall. Pierre Leon Database Security

Database Security & Compliance with Audit Vault and Database Firewall. Pierre Leon Database Security Database Security & Compliance with Audit Vault and Database Firewall Pierre Leon Database Security 1 Topics Encryption Authentication Authorising highly privileged users Access control by data classification

More information

Oracle Database Security

Oracle Database Security Oracle Database Security Paul Needham, Senior Director, Product Management, Database Security Target of Data Breaches 2010 Data Breach Investigations Report Type Category % Breaches

More information

Oracle Database Security. Paul Needham Senior Director, Product Management Database Security

Oracle Database Security. Paul Needham Senior Director, Product Management Database Security Oracle Database Security Paul Needham Senior Director, Product Management Database Security Safe Harbor Statement The following is intended to outline our general product direction. It is intended for

More information

<Insert Picture Here> Oracle Database Vault

<Insert Picture Here> Oracle Database Vault Oracle Database Vault Kamal Tbeileh Senior Principal Product Manager, Database Security The following is intended to outline our general product direction. It is intended for information

More information

Oracle Database 11g: Security Release 2

Oracle Database 11g: Security Release 2 Oracle University Contact Us: 1.800.529.0165 Oracle Database 11g: Security Release 2 Duration: 5 Days What you will learn In this course, you'll learn how to use Oracle Database features to meet the security,

More information

The Oracle Mobile Security Suite: Secure Adoption of BYOD

The Oracle Mobile Security Suite: Secure Adoption of BYOD An Oracle White Paper April 2014 The Oracle Mobile Security Suite: Secure Adoption of BYOD Executive Overview BYOD (Bring Your Own Device) is the new mobile security imperative and every organization will

More information

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Copyright 2012, Oracle and/or its affiliates. All rights reserved. 1 The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any

More information

ORACLE ENTERPRISE MANAGER 10 g CONFIGURATION MANAGEMENT PACK FOR ORACLE DATABASE

ORACLE ENTERPRISE MANAGER 10 g CONFIGURATION MANAGEMENT PACK FOR ORACLE DATABASE ORACLE ENTERPRISE MANAGER 10 g CONFIGURATION MANAGEMENT PACK FOR ORACLE DATABASE CONFIGURATION MANAGEMENT PACK FEATURES Automated discovery of dependency relationships between services, systems and Oracle

More information

Protecting Sensitive Data Reducing Risk with Oracle Database Security

Protecting Sensitive Data Reducing Risk with Oracle Database Security Protecting Sensitive Data Reducing Risk with Oracle Database Security Antonio.Mata.Gomez@oracle.com Information Security Architect Agenda 1 2 Anatomy of an Attack Three Steps to Securing an Oracle Database

More information

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information The following is intended to outline our general product direction. It is intended for information purposes only,

More information

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information The following is intended to outline our general product direction. It is intended for information purposes only,

More information

An Oracle White Paper February 2014. Oracle Data Integrator 12c Architecture Overview

An Oracle White Paper February 2014. Oracle Data Integrator 12c Architecture Overview An Oracle White Paper February 2014 Oracle Data Integrator 12c Introduction Oracle Data Integrator (ODI) 12c is built on several components all working together around a centralized metadata repository.

More information

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Copyright 2012, Oracle and/or its affiliates. All rights reserved. 1 Oracle Database Security Advanced Security Option Thanos Terentes Printzios DB & Options Specialist A&C Technology Adoption Office Oracle Partner Business Development, ECEMEA 2 What is a customers INFORMATION

More information

A Comprehensive Solution for API Management

A Comprehensive Solution for API Management An Oracle White Paper March 2015 A Comprehensive Solution for API Management Executive Summary... 3 What is API Management?... 4 Defining an API Management Strategy... 5 API Management Solutions from Oracle...

More information

Data Security: Strategy and Tactics for Success

Data Security: Strategy and Tactics for Success Data Security: Strategy and Tactics for Success DatabaseVisions,Inc. Fairfax, Va Oracle Gold Partner Solution Provider Oracle Security Specialized www.databasevisions.com Overview Cloud Computing presents

More information

APPLICATION MANAGEMENT SUITE FOR SIEBEL APPLICATIONS

APPLICATION MANAGEMENT SUITE FOR SIEBEL APPLICATIONS APPLICATION MANAGEMENT SUITE FOR SIEBEL APPLICATIONS USER EXPERIENCE MANAGEMENT SERVICE LEVEL OBJECTIVE REAL USER MONITORING SYNTHETIC USER MONITORING SERVICE TEST KEY PERFORMANCE INDICATOR PERFORMANCE

More information

Oracle Role Manager. An Oracle White Paper Updated June 2009

Oracle Role Manager. An Oracle White Paper Updated June 2009 Oracle Role Manager An Oracle White Paper Updated June 2009 Oracle Role Manager Introduction... 3 Key Benefits... 3 Features... 5 Enterprise Role Lifecycle Management... 5 Organization and Relationship

More information

Oracle 1Z0-528 Exam Questions & Answers

Oracle 1Z0-528 Exam Questions & Answers Oracle 1Z0-528 Exam Questions & Answers Number: 1Z0-528 Passing Score: 660 Time Limit: 120 min File Version: 21.1 http://www.gratisexam.com/ Oracle 1Z0-528 Exam Questions & Answers Exam Name: Oracle Database

More information

An Oracle White Paper July 2013. Introducing the Oracle Home User in Oracle Database 12c for Microsoft Windows

An Oracle White Paper July 2013. Introducing the Oracle Home User in Oracle Database 12c for Microsoft Windows An Oracle White Paper July 2013 Introducing the Oracle Home User Introduction Starting with Oracle Database 12c Release 1 (12.1), Oracle Database on Microsoft Windows supports the use of an Oracle Home

More information

Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007

Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007 Oracle Identity Management for SAP in Heterogeneous IT Environments An Oracle White Paper January 2007 Oracle Identity Management for SAP in Heterogeneous IT Environments Executive Overview... 3 Introduction...

More information

An Oracle White Paper August 2010. Oracle Database Auditing: Performance Guidelines

An Oracle White Paper August 2010. Oracle Database Auditing: Performance Guidelines An Oracle White Paper August 2010 Oracle Database Auditing: Performance Guidelines Introduction Database auditing has become increasingly important as threats to applications become more sophisticated.

More information

Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules

Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules WHITE PAPER Thales e-security www.thalesesec.com/oracle TABLE OF CONTENT Introduction...3 Oracle Database 11g

More information

Oracle Database 11g: Security

Oracle Database 11g: Security Oracle University Contact Us: +27 (0)11 319-4111 Oracle Database 11g: Security Duration: 5 Days What you will learn In Oracle Database 11g: Security course students learn how to use Oracle database features

More information

An Oracle White Paper January 2013. A Technical Overview of New Features for Automatic Storage Management in Oracle Database 12c

An Oracle White Paper January 2013. A Technical Overview of New Features for Automatic Storage Management in Oracle Database 12c An Oracle White Paper January 2013 A Technical Overview of New Features for Automatic Storage Management in Oracle Database 12c TABLE OF CONTENTS Introduction 2 ASM Overview 2 Total Storage Management

More information

Oracle Audit Vault and Database Firewall. Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska

Oracle Audit Vault and Database Firewall. Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska Oracle Audit Vault and Database Firewall Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska The following is intended to outline our general product direction. It is intended for information

More information

Attestation of Identity Information. An Oracle White Paper May 2006

Attestation of Identity Information. An Oracle White Paper May 2006 Attestation of Identity Information An Oracle White Paper May 2006 Attestation of Identity Information INTRODUCTION... 3 CHALLENGES AND THE NEED FOR AUTOMATED ATTESTATION... 3 KEY FACTORS, BENEFITS AND

More information

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Protect the data that drives our customers business. Data Security. Imperva s mission is simple: The Imperva Story Who We Are Imperva is the global leader in data security. Thousands of the world s leading businesses, government organizations, and service providers rely on Imperva solutions to prevent

More information

APPLICATION MANAGEMENT SUITE FOR ORACLE E-BUSINESS SUITE APPLICATIONS

APPLICATION MANAGEMENT SUITE FOR ORACLE E-BUSINESS SUITE APPLICATIONS APPLICATION MANAGEMENT SUITE FOR ORACLE E-BUSINESS SUITE APPLICATIONS Oracle Application Management Suite for Oracle E-Business Suite delivers capabilities that helps to achieve high levels of application

More information

An Oracle White Paper July 2014. Oracle ACFS

An Oracle White Paper July 2014. Oracle ACFS An Oracle White Paper July 2014 Oracle ACFS 1 Executive Overview As storage requirements double every 18 months, Oracle customers continue to deal with complex storage management challenges in their data

More information

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Copyright 2012, Oracle and/or its affiliates. All rights reserved. 1 Introducing Oracle Audit Vault and Database Firewall Billions of Database Records Breached Globally 97% of Breaches Were Avoidable with Basic Controls 98% records stolen from databases 84% records breached

More information

An Oracle White Paper May 2012. Oracle Database Cloud Service

An Oracle White Paper May 2012. Oracle Database Cloud Service An Oracle White Paper May 2012 Oracle Database Cloud Service Executive Overview The Oracle Database Cloud Service provides a unique combination of the simplicity and ease of use promised by Cloud computing

More information

Oracle Database 11g: Security. What you will learn:

Oracle Database 11g: Security. What you will learn: Oracle Database 11g: Security What you will learn: In Oracle Database 11g: Security course students learn how they can use Oracle database features to meet the security, privacy and compliance requirements

More information

Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003

Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003 Oracle Identity Management Concepts and Architecture An Oracle White Paper December 2003 Oracle Identity Management Concepts and Architecture Introduction... 3 Identity management... 3 What is Identity

More information

Complete Database Security. Thomas Kyte http://asktom.oracle.com/

Complete Database Security. Thomas Kyte http://asktom.oracle.com/ Complete Database Security Thomas Kyte http://asktom.oracle.com/ Agenda Enterprise Data Security Challenges Database Security Strategy Oracle Database Security Solutions Defense-in-Depth Q&A 2 Copyright

More information

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Copyright 2013, Oracle and/or its affiliates. All rights reserved. 1 The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any

More information

SaaS Data Architecture. An Oracle White Paper Oct 2008

SaaS Data Architecture. An Oracle White Paper Oct 2008 SaaS Data Architecture An Oracle White Paper Oct 2008 SaaS Data Architecture Introduction... 3 DATA ARCHITECTURE APPROACHES... 3 Separate Databases... 4 Shared Database, Separate Schemas... 4 Shared Database,

More information

Oracle White Paper October 2010. Oracle Advanced Security with Oracle Database 11g Release 2

Oracle White Paper October 2010. Oracle Advanced Security with Oracle Database 11g Release 2 Oracle White Paper October 2010 Oracle Advanced Security with Oracle Database 11g Release 2 Introduction... 1 Oracle Advanced Security... 2 Transparent Data Encryption... 3 Support for hardware-based encryption

More information

Managed Storage Services

Managed Storage Services An Oracle White Paper January 2014 Managed Storage Services Designed to Meet Your Custom Needs for Availability, Reliability and Security A complete Storage Solution Oracle Managed Cloud Services (OMCS)

More information

Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory. Overview August 2008

Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory. Overview August 2008 Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory Overview August 2008 Introduction... 3 Centralizing DataBase Account Management using Existing Directories with OVD...

More information

Highmark Unifies Identity Data With Oracle Virtual Directory. An Oracle White Paper January 2009

Highmark Unifies Identity Data With Oracle Virtual Directory. An Oracle White Paper January 2009 Highmark Unifies Identity Data With Oracle Virtual Directory An Oracle White Paper January 2009 Highmark Unifies Identity Data With Oracle Virtual Directory Executive Summary... 3 The Challenge: A Single

More information

An Oracle White Paper March 2010. Oracle Transparent Data Encryption for SAP

An Oracle White Paper March 2010. Oracle Transparent Data Encryption for SAP An Oracle White Paper March 2010 Oracle Transparent Data Encryption for SAP Introduction Securing sensitive customer data has become more and more important in the last years. One possible threat is confidential

More information

An Oracle White Paper July 2011. Oracle Desktop Virtualization Simplified Client Access for Oracle Applications

An Oracle White Paper July 2011. Oracle Desktop Virtualization Simplified Client Access for Oracle Applications An Oracle White Paper July 2011 Oracle Desktop Virtualization Simplified Client Access for Oracle Applications Overview Oracle has the world s most comprehensive portfolio of industry-specific applications

More information

Making Database Security an IT Security Priority

Making Database Security an IT Security Priority Sponsored by Oracle Making Database Security an IT Security Priority A SANS Whitepaper November 2009 Written by Tanya Baccam Security Strategy Overview Why a Database Security Strategy? Making Databases

More information

Hayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks

Hayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks EXTENDING ACCESS WHILE ENHANCING CONTROL FOR YOUR ORGANIZATION S DATA LEVERAGE THE POWER OF F5 AND ORACLE TO DELIVER SECURE ACCESS TO APPLICATIONS AND DATABASES Hayri Tarhan, Sr. Manager, Public Sector

More information

Database Security Questions HOUG 2016. Fehér Lajos. Copyright 2015, Oracle and/or its affiliates. All rights reserved.

Database Security Questions HOUG 2016. Fehér Lajos. Copyright 2015, Oracle and/or its affiliates. All rights reserved. Database Security Questions HOUG 2016 Fehér Lajos 1 How Data Gets Compromised? Source: Verizon Data Breach Investigations Report Copyright 2015, Oracle and/or 2its affiliates. All rights reserved. Where

More information

Lowering E-Discovery Costs Through Enterprise Records and Retention Management. An Oracle White Paper March 2007

Lowering E-Discovery Costs Through Enterprise Records and Retention Management. An Oracle White Paper March 2007 Lowering E-Discovery Costs Through Enterprise Records and Retention Management An Oracle White Paper March 2007 Lowering E-Discovery Costs Through Enterprise Records and Retention Management Exponential

More information

Oracle Secure Backup 10.2 Policy-Based Backup Management. An Oracle White Paper December 2007

Oracle Secure Backup 10.2 Policy-Based Backup Management. An Oracle White Paper December 2007 Policy-Based Backup Management An Oracle White Paper December 2007 Policy-Based Backup Management Product Highlights Fastest, most efficient Oracle database backups to tape Heterogeneous file system protection

More information

Oracle Whitepaper April 2015. Security and the Oracle Database Cloud Service

Oracle Whitepaper April 2015. Security and the Oracle Database Cloud Service Oracle Whitepaper April 2015 Security and the Oracle Database Cloud Service Table of Contents Overview... 3 Security architecture... 4 User areas... 4 Accounts... 4 Identity Domains... 4 Database Cloud

More information

An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service

An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service An Oracle White Paper Dec 2013 Oracle Access Management Security Token Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,

More information

Security It s an ecosystem thing

Security It s an ecosystem thing Security It s an ecosystem thing Joseph Alhadeff Vice President Global Public Policy, Chief Privacy Strategist The Security challenge in the before time. Today s Threat Environment

More information

MySQL Security: Best Practices

MySQL Security: Best Practices MySQL Security: Best Practices Sastry Vedantam sastry.vedantam@oracle.com Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes

More information

Migrating Non-Oracle Databases and their Applications to Oracle Database 12c O R A C L E W H I T E P A P E R D E C E M B E R 2 0 1 4

Migrating Non-Oracle Databases and their Applications to Oracle Database 12c O R A C L E W H I T E P A P E R D E C E M B E R 2 0 1 4 Migrating Non-Oracle Databases and their Applications to Oracle Database 12c O R A C L E W H I T E P A P E R D E C E M B E R 2 0 1 4 1. Introduction Oracle provides products that reduce the time, risk,

More information

ORACLE OPS CENTER: PROVISIONING AND PATCH AUTOMATION PACK

ORACLE OPS CENTER: PROVISIONING AND PATCH AUTOMATION PACK ORACLE OPS CENTER: PROVISIONING AND PATCH AUTOMATION PACK KEY FEATURES PROVISION FROM BARE- METAL TO PRODUCTION QUICKLY AND EFFICIENTLY Controlled discovery with active control of your hardware Automatically

More information

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control

More information

New Oracle 12c Security Features Oracle E-Business Suite Perspective

New Oracle 12c Security Features Oracle E-Business Suite Perspective New Oracle 12c Security Features Oracle E-Business Suite Perspective December 18, 2014 Michael Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer Integrigy Corporation

More information

Evolution from the Traditional Data Center to Exalogic: An Operational Perspective

Evolution from the Traditional Data Center to Exalogic: An Operational Perspective An Oracle White Paper July, 2012 Evolution from the Traditional Data Center to Exalogic: 1 Disclaimer The following is intended to outline our general product capabilities. It is intended for information

More information

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications

More information

How To Achieve Pca Compliance With Redhat Enterprise Linux

How To Achieve Pca Compliance With Redhat Enterprise Linux Achieving PCI Compliance with Red Hat Enterprise Linux June 2009 CONTENTS EXECUTIVE SUMMARY...2 OVERVIEW OF PCI...3 1.1. What is PCI DSS?... 3 1.2. Who is impacted by PCI?... 3 1.3. Requirements for achieving

More information

Oracle Database 10g: Security Release 2

Oracle Database 10g: Security Release 2 Oracle University Chiamaci: 800 672 253 Oracle Database 10g: Security Release 2 Duration: 4 Days Description In this course, the students learn how they can use Oracle database features to meet the security

More information

Oracle On Demand Infrastructure: Virtualization with Oracle VM. An Oracle White Paper November 2007

Oracle On Demand Infrastructure: Virtualization with Oracle VM. An Oracle White Paper November 2007 Oracle On Demand Infrastructure: Virtualization with Oracle VM An Oracle White Paper November 2007 Oracle On Demand Infrastructure: Virtualization with Oracle VM INTRODUCTION Oracle On Demand Infrastructure

More information

Introduction. Automated Discovery of IT assets

Introduction. Automated Discovery of IT assets ORACLE DATABASE LIFECYCLE MANAGEMENT PACK ORACLE DATABASE LIFECYCLE MANAGEMENT PACK KEY FEATURES Auto Discovery of hosts and databases Inventory tracking and reporting Database provisioning Schema and

More information

An Oracle White Paper July 2010. Data Masking Best Practices

An Oracle White Paper July 2010. Data Masking Best Practices An Oracle White Paper July 2010 Data Masking Best Practices Executive Overview... 1 Introduction... 1 The Challenges of Masking Data... 2 Implementing Data Masking... 2 Comprehensive Enterprise-wide Discovery

More information

Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements

Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements A Forrester Consulting Thought Leadership Paper Commissioned By Oracle Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements

More information

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan WHITE PAPER Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan Introduction to Data Privacy Today, organizations face a heightened threat landscape with data

More information

ORACLE CLOUD MANAGEMENT PACK FOR ORACLE DATABASE

ORACLE CLOUD MANAGEMENT PACK FOR ORACLE DATABASE ORACLE CLOUD MANAGEMENT PACK FOR ORACLE DATABASE Oracle Enterprise Manager is Oracle s integrated enterprise IT management product line, and provides the industry s first complete cloud lifecycle management

More information

Online Transaction Processing in SQL Server 2008

Online Transaction Processing in SQL Server 2008 Online Transaction Processing in SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 provides a database platform that is optimized for today s applications,

More information

An Oracle White Paper December 2010. Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance

An Oracle White Paper December 2010. Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance An Oracle White Paper December 2010 Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance Executive Overview... 1 Health Information Portability and Accountability Act Security

More information

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

defending against advanced persistent threats: strategies for a new era of attacks agility made possible defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been

More information

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Copyright 2012, Oracle and/or its affiliates. All rights reserved. 1 Seguridad en profundidad Jaime Briggs MSc CS, CISSP, CCSK Sales Manager Strategic accounts Agenda Los Controles ISO 27001 Defensa en Profundidad Productos que dan respuesta Roadmap a seguridad Q&A 3

More information

Oracle Primavera Gateway

Oracle Primavera Gateway Oracle Primavera Gateway Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is

More information

Safeguard Sensitive Data in EBS: A Look at Oracle Database Vault, Transparent Data Encryption, and Data Masking. Lucy Feng

Safeguard Sensitive Data in EBS: A Look at Oracle Database Vault, Transparent Data Encryption, and Data Masking. Lucy Feng Delivering Oracle Success Safeguard Sensitive Data in EBS: A Look at Oracle Database Vault, Transparent Data Encryption, and Data Masking Lucy Feng RMOUG Training Days February 2012 About DBAK Oracle Solution

More information

An Oracle White Paper June 2013. Oracle Linux Management with Oracle Enterprise Manager 12c

An Oracle White Paper June 2013. Oracle Linux Management with Oracle Enterprise Manager 12c An Oracle White Paper June 2013 Oracle Linux Management with Oracle Enterprise Manager 12c Introduction... 1 Oracle Enterprise Manager 12c Overview... 3 Managing Oracle Linux with Oracle Enterprise Manager

More information

How To Protect Data From Attack On A Computer System

How To Protect Data From Attack On A Computer System Information Management White Paper Understanding holistic database security 8 steps to successfully securing enterprise data sources 2 Understanding holistic database security News headlines about the

More information

Oracle Audit Vault Administrator s Guide Oracle Audit Vault Auditor s Guide Oracle Enterprise Manager Cloud Control Administrator s Guide

Oracle Audit Vault Administrator s Guide Oracle Audit Vault Auditor s Guide Oracle Enterprise Manager Cloud Control Administrator s Guide Oracle Enterprise Manager System Monitoring Plug-in Installation Guide for Oracle Audit Vault Release 12.1 (12.1.0.2.0) E26595-02 September 2012 Oracle Audit Vault is used to transparently collect and

More information

Securing and protecting the organization s most sensitive data

Securing and protecting the organization s most sensitive data Securing and protecting the organization s most sensitive data A comprehensive solution using IBM InfoSphere Guardium Data Activity Monitoring and InfoSphere Guardium Data Encryption to provide layered

More information

Oracle Fusion Human Capital Management Overview and Frequently Asked Questions

Oracle Fusion Human Capital Management Overview and Frequently Asked Questions Oracle Fusion Human Capital Management Overview and Frequently Asked Questions Oracle Fusion Human Capital Management (Oracle Fusion HCM) was built from the ground up to help your organization know its

More information

Real-Time Database Protection and. Overview. 2010 IBM Corporation

Real-Time Database Protection and. Overview. 2010 IBM Corporation Real-Time Database Protection and Monitoring: IBM InfoSphere Guardium Overview Agenda Business drivers for database security InfoSphere Guardium architecture Common applications The InfoSphere portfolio

More information

ORACLE BUSINESS INTELLIGENCE SUITE ENTERPRISE EDITION PLUS

ORACLE BUSINESS INTELLIGENCE SUITE ENTERPRISE EDITION PLUS ORACLE BUSINESS INTELLIGENCE SUITE ENTERPRISE EDITION PLUS PRODUCT FACTS & FEATURES KEY FEATURES Comprehensive, best-of-breed capabilities 100 percent thin client interface Intelligence across multiple

More information

Oracle Audit Vault and Database Firewall

Oracle Audit Vault and Database Firewall Oracle Audit Vault and Database Firewall Angelo Maria Bosis Sales Consulting Director Oracle Italia Billions of Database Records Breached Globally 97% of Breaches Were Avoidable with

More information

Stronger database security is needed to accommodate new requirements

Stronger database security is needed to accommodate new requirements Enterprise Database Security A Case Study Abstract This Article is a case study about an Enterprise Database Security project including the strategy that addresses key areas of focus for database security

More information