Detecting and Stopping Cyber Attacks against Oracle Databases
|
|
|
- Claud O’Brien’
- 10 years ago
- Views:
Transcription
1 Detecting and Stopping Cyber Attacks against Oracle Databases Oracle OpenWorld 2015 Stephen Kost Chief Technology Officer Integrigy Corporation
2 Agenda How and Why Prevention Q&A Targeted Attack Detection
3 About Integrigy ERP Applications Oracle E-Business Suite Databases Oracle and Microsoft SQL Server Products Services AppSentry ERP Application and Database Security Auditing Tool AppDefend Enterprise Application Firewall for the Oracle E-Business Suite Validates Security Protects Oracle EBS Verify Security Ensure Compliance Build Security Security Assessments ERP, Database, Sensitive Data, Pen Testing Compliance Assistance SOX, PCI, HIPAA Security Design Services Auditing, Encryption, DMZ You
4 Integrigy Published Security Alerts Security Alert Versions Security Vulnerabilities Critical Patch Update April x Oracle E-Business Suite security architecture issue Critical Patch Update July x Oracle E-Business Suite security configuration issue Critical Patch Update October x 2 Oracle E-Business Suite security weaknesses Critical Patch Update July 2008 Critical Patch Update April 2008 Critical Patch Update July 2007 Oracle 11g x 12.0.x x Issues in Oracle RDBMS Authentication 2 Oracle E-Business Suite vulnerabilities 8 vulnerabilities, SQL injection, XSS, information disclosure, etc. 11 vulnerabilities, SQL injection, XSS, information disclosure, etc. Critical Patch Update October x, Default configuration issues Critical Patch Update July x, SQL injection vulnerabilities and Information disclosure Critical Patch Update April x, SQL injection vulnerabilities and Information disclosure Critical Patch Update Jan x, SQL injection vulnerabilities Oracle Security Alert #68 Oracle 8i, 9i, 10g Buffer overflows Listener information leakage Oracle Security Alert # x, SQL injection vulnerabilities Oracle Security Alert # x, Buffer overflow in FNDWRR.exe Oracle Security Alert # Multiple vulnerabilities in AOL/J Setup Test Obtain sensitive information (valid session) Oracle Security Alert # , 11.0.x No authentication in FNDFS program Retrieve any file from O/S
5 Agenda How and Why Prevention Q&A Targeted Attack Detection
6 Targeted Attack
7 Targeted Attack Advanced Persistent Threat (APT) Organized Crime State Sponsored Anonymous, LulzSec, Legion of Doom,
8 What are they after? Credit Card Fraud Credit Card Data Identify Theft/Tax Fraud Personally Identifiable Information (PII) Credit Card Number Primary Account Number (PAN) CVV/CV2/CID 3 digits on the back for Visa/MC 4 digits on the front for AMEX Magnetic Stripe Data First and last name Date of Birth Plus one of the following: Social security number Bank account number Financial account number Driver license or state ID number Health Insurance Fraud Health Information First and last name Plus one of the following (Protected Health Information) the past, present, or future physical or mental health, or condition of an individual provision of health care to an individual payment for the provision of health care to an individual
9 In 2013, the health care industry accounted for 44% of all breaches - Identity Theft Resource Center
10 What is your data worth? Credit Cards Credit Card Price Black Market Classification $20 $45 Freshly acquired $10 $12 Flooded $2 $7 Clearance ( stale data) Source: Krebs on Security
11 What is your data worth? Identify Theft $1 $5 First and last name Social Security number Tax information (e.g., 1099) $20 $40 $30 $100 First and last name Social Security number Current address Date of birth First and last name Social Security number Current address Date of birth Bank account number or credit card number Salary Human Resources Health care Payroll
12 FY million fraudulent tax returns FY 2013 $5.8 billion in fraudulent tax refunds Identity Protection PIN not available until Tax Year General Accounting Office (GAO) Report Identity Protection PIN If you live in DC, Florida, or Georgia GET ONE NOW!
13 Database Valuation Calculate the black market value of the data contained in your database to help evaluate risk. Data Type Formula Credit Cards (number of unique, unexpired cards) * $10 Social Security Numbers (number of unique SSN + Name + DoB) * $20 or (number of unique SSN + Bank) * $50
14 Agenda How and Why Prevention Q&A Targeted Attack Detection
15 Methods of Database Compromise Direct Direct compromise of the database through direct database access Obtain credentials to the database and escalate privileges Indirect Compromise is through an application, ancillary system, or operating system Application and ancillary system compromise most often will be SQL injection Operating system typically is theft of database files
16 Anatomy of the Targeted Attack Point of Entry Persistence Lateral Movement Breach the perimeter network through a network compromise, phishing attack, or social engineering. Once inside, establish a beach-head and maintain the compromise over time (days, months, years). Expand the compromise to more devices and systems. 4 Asset and Data Discovery The Targeted Attack has already identified data of interest and will being searching for it. How to do this without detection? 5 Data Exfiltration Once the data of interest has been gathered, it must be transferred externally without being detected. How do you quietly steal gigabytes or terabytes of data?
17 Asset (Database) Discovery Techniques Passive Search internal knowledge repositories for architecture diagrams, design documents, code repositories, etc. Find TNSNAMES.ORA files Compromise DBA credentials through phishing or social engineering attacks Active Install malware on DBA machines and steal credentials, such as saved in SQL Developer Use Nmap to scan internal network for Oracle Databases on default port 1521 very noisy
18 Demo Search for TNSNAMES.ORA Files Findings tnsnames.ora files using internal search engines or wiki s search: tnsnames filetype:ora site:.edu
19 Demo Search Source Code Obtaining passwords from internal source code repositories search: alter user identified by
20 Demo Decrypt SQL Developer Passwords Decrypt SQL Developer passwords show-me-password-sqldev-jdev Use extension in SQL Developer
21 Demo Scan for Databases on Port 1521 Using Nmap to find Oracle databases nmap -st -sv -p T4 -v -n -Pn -open
22 Demo Brute Force SID Using Nmap to brute force SID nmap -p v --script oracle-sid-brute
23 Detect Brute Force SID listener.log <msg time=' t10:28: :00' org_id='oracle' comp_id='tnslsnr' type='unknown' level='16' host_id='testdb' host_addr=' '> <txt>13-apr :28:44 * (CONNECT_DATA=(SID=ORCL1)(CID=(PROGRAM=)(HOST= jdbc )(USER=))) * (ADDRESS=(PROTOCOL=tcp)(HOST= )(PORT=17927)) * establish * ORCL1 * </txt> </msg> <msg time=' t10:28: :00' org_id='oracle' comp_id='tnslsnr' type='unknown' level='16' host_id='testdb' host_addr=' '> <txt>tns-12505: TNS:listener does not currently know of SID given in connect descriptor </txt> </msg>
24 Default Oracle Password Statistics Database Account Default Password Exists in Database % Default Password % SYS CHANGE_ON_INSTALL 100% 3% SYSTEM MANAGER 100% 4% DBSNMP DBSNMP 99% 52% OUTLN OUTLN 98% 43% MDSYS MDSYS 77% 18% ORDPLUGINS ORDPLUGINS 77% 16% ORDSYS ORDSYS 77% 16% XDB CHANGE_ON_INSTALL 75% 15% DIP DIP 63% 19% WMSYS WMSYS 63% 12% CTXSYS CTXSYS 54% 32% * Sample of 120 production databases
25 Demo Brute forcing Oracle Database Passwords Integrigy internal tool google: oracle password cracker free tools: woraauthbf, orabf
26 Demo Using Nmap for Database Password Guessing nmap -p v --script oracle-brute --script-args oracle-brute.sid=orcl
27 Detect Password Brute Force Database Audit Trail OS_USERNAME USERNAME USERHOST TIMESTAMP ACTION ACTION_NAME RETURNCODE nmap_22032 ZX nmap_target 25-OCT LOGON 1017 nmap_18405 ZSA nmap_target 25-OCT LOGON 1017 nmap_20933 ZPB nmap_target 25-OCT LOGON 1017 nmap_16072 ZFA nmap_target 25-OCT LOGON 1017 nmap_3103 XTR nmap_target 25-OCT LOGON 1017 nmap_8908 YCAMPOS nmap_target 25-OCT LOGON 1017 nmap_26995 XNS nmap_target 25-OCT LOGON 1017 nmap_17004 YSANCHEZ nmap_target 25-OCT LOGON nmap_16306 XNM nmap_target 25-OCT LOGON 1017 nmap_24233 XNP nmap_target 25-OCT LOGON 1017 nmap_11503 SYSMAN nmap_target 25-OCT LOGON 1017 nmap_8458 XNI nmap_target 25-OCT LOGON 1017 nmap_11510 XNB nmap_target 25-OCT LOGON 1017 nmap_23924 XNC nmap_target 25-OCT LOGON 1017 nmap_10518 XLE nmap_target 25-OCT LOGON 1017 nmap_23234 XDO nmap_target 25-OCT LOGON 1017 nmap_23125 XLA nmap_target 25-OCT LOGON 28000
28 What Do I Need and How Did I Get It? IP Address Port SID/Service Name User Name Password Privileges 1. Scanning Nmap 2. TNSNAMES.ORA 3. Internal resources 1. Default port 1521 Nmap 2. TNSNAMES.ORA 3. Internal resources 1. TNSNAMES.ORA 2. Internal resources 3. SID brute force 1. Default user names (1,000+) 2. Inside the database (all_users) 3. Internal resources 1. Default passwords 2. Password guessing 3. Source code 1. Get lucky with an account 2. Missing security patches 3. Application vulnerabilities
29 TNS Poisoning Attack One-off April 30, 2012 Vuln # Component Protocol Package and/or Privilege Required Remote Exploit without Auth.? CVE Listener Oracle Net None Yes Base Score Access Vector Access Complexity CVSS VERSION 2.0 RISK Authentication Confidentiality Integrity Availability Last Affected Patch set (per Supported Release) 7.5 Network Low None Partial+ Partial+ Partial ALL VERSIONS This vulnerability is not patched by a SPU or PSU. The TNS Listener configuration must be secured. ALL VERSIONS of the Oracle Database are affected. 12c and protected by default, but vulnerable when Valid Node Checking Registration (VNCR) is disabled.
30 TNS Poisoning Attack Illustrated Attacker TNS Proxy capture and inject Database TNS LISTENER PROD = localhost User SQL*NET App
31 TNS Poisoning Attack Illustrated Attacker TNS Proxy 1 Database TNS LISTENER 1 Attacker dynamically registers Service with database. capture and inject PROD = localhost User PROD = badguy_ip SQL*NET App
32 TNS Poisoning Attack Illustrated Attacker TNS Proxy Database TNS LISTENER Attacker dynamically registers Service with database. capture and inject User PROD = localhost PROD = badguy_ip 2 User connects and is Load Balanced to attacker. SQL*NET App 2
33 TNS Poisoning Attack Illustrated Attacker TNS Proxy capture and inject User SQL*NET App 3 4 Database TNS LISTENER PROD = localhost PROD = badguy_ip 3 Attacker dynamically registers Service with database. User connects and is Load Balanced to attacker. User connect to attacker rather than database. 4 Attacker forwards to database.
34 TNS Poisoning Attack Illustrated Attacker TNS Proxy capture and inject User SQL*NET App Database TNS LISTENER PROD = localhost PROD = badguy_ip Attacker dynamically registers Service with database. User connects and is Load Balanced to attacker. User connect to attacker rather than database. 4 Attacker forwards to database.
35 TNS Poisoning Mitigation Database Version SSL Encrypt with Cert COST class of secure transport VNCR Valid node checking registration References See ASO (RAC) x x * (Enabled by default) x* * and 12c does not allow remote registration by default. (Enabled by default)
36 Demo TNS Poisoning Attack
37 Exploit Information Joxean Koret Oracle TNS Poison un-auth proof on concept (Oracle 9i, 10g and 11g)/joxeankoret.com/research.html tnspoisonv1.py Used to poison the remote database listener proxy.py Proxy on attacker machine to accept client connections and forward to database server
38 Stealth Password Cracking Bug October 2012 Vuln # Component Protocol Package and/or Privilege Required Remote Exploit without Auth.? CVE Oracle RDBMS Oracle Net None Yes Base Score Access Vector Access Complexity CVSS VERSION 2.0 RISK Authentication Confidentiality Integrity Availability Last Affected Patch set (per Supported Release) 10.0 Network Low None Complete Complete Complete x Vulnerable if using 11G passwords (see USER$) x is also vulnerable if using Enterprise User Security (EUS) with an SHA-1 password verifier.
39 Stealth Password Attack Illustrated Flaw in the 11g O5Logon protocol allows for brute forcing of the password using the authsess_key. Attacker Database 4 SQL*Net Trace capture auth_sesskey Password Cracker brute force auth_sesskey connect to SID send <username> receive auth_sesskey auth_sesskey = AES encrypt clear-text session key using user 11g password hash
40 Exploit Information SQL*Net Trace on client Capture SQL*Net connection and auth_sesskey TRACE_LEVEL_CLIENT = SUPPORT nmap Legendary network scanning tool oracle-brute-stealth script Retrieves auth_sesskey for selected users John the Ripper Legendary password cracking tool Use o5logon
41 Commonly Used Oracle Attack Tools Metasploit Oracle Modules SID brute force, password guessing, privilege escalation modules Nmap network scanning, SID brute force, password guessing modules ODAT (Oracle Database Attack Tool) SID brute force, password guessing, privilege escalation features
42 Agenda How and Why Prevention Q&A Targeted Attack Detection
43 Integrigy s #1 Security Recommendation Limit direct database access whenever possible Much harder to hack database if an attacker can not connect to it can t connect, can t hack it Would have to use another avenue such as a web application or reporting tool (e.g., OBIEE) Use firewalls in front of data center, network ACLs, TNS invited nodes, Oracle Connection Manager, Oracle Database Firewall, etc. DBAs should use bastion hosts to manage databases
44 Database Security Preventative Controls Check for default and weak passwords constantly Use multiple tools to check passwords Install database profiles to enforce strong passwords Harden database configurations Develop comprehensive database security standard Validate configurations on regular basis Apply Oracle Critical Patch Updates on a regular basis on all databases Reduce risk of compromise and escalation of privileges
45 How to Check Database Passwords Use Oracle s DBA_USERS_WITH_DEFPWD Limited set of accounts Single password for each account Command line tools (orabf, etc.) Command line only not easy to use Integrigy AppSentry 1. Checks all database accounts 2. Uses passwords lists - > 1 million passwords 3. Allows custom passwords
46 Agenda How and Why Prevention Q&A Targeted Attack Detection
47 Framework for Auditing and Logging Payment Card (PCI DSS) SOX (COBIT) HIPAA (NIST ) FISMA (NIST ) IT Security (ISO 27001) Foundation security events and actions (logins, logoffs, account creation, privileges, etc.) Database Application Native Auditing Syslog DB log files Signon AuditTrails Navigation Centralized Logging Solution Protected Audit Data Alerting & Monitoring Reporting Correlation Framework for Auditing and Logging
48 Foundation Security Events and Actions The foundation of the framework is a set of key security events and actions derived from and mapped to compliance and security requirements that are critical for all organizations. E1 - Login E2 - Logoff E3 - Unsuccessful login E4 - Modify auth mechanisms E5 - Create user account E6 - Modify user account E7 - Create role E8 - Modify role E9 - Grant/revoke user privileges E10 - Grant/revoke role privileges E11 - Privileged commands E12 - Modify audit and logging E13 - Create, Modify or Delete object E14 - Modify configuration settings
49 Foundation Security Events Mapping Security Events and Actions PCI DSS 10.2 SOX (COBIT) HIPAA (NIST ) IT Security (ISO 27001) FISMA (NIST ) E1 - Login A (c)(2) A AU-2 E2 - Logoff DS (c)(2) A AU-2 E3 - Unsuccessful login DS (c)(2) A A AC-7 E4 - Modify authentication mechanisms DS (c)(2) A AU-2 E5 Create user account DS (c)(2) A AU-2 E6 - Modify user account DS (c)(2) A AU-2 E7 - Create role DS (c)(2) A AU-2 E8 - Modify role DS (c)(2) A AU-2 E9 - Grant/revoke user privileges DS (c)(2) A AU-2 E10 - Grant/revoke role privileges DS (c)(2) A AU-2 E11 - Privileged commands DS (c)(2) A AU-2 E12 - Modify audit and logging DS (c)(2) A E13 - Objects Create/Modify/Delete DS (c)(2) A AU-2 AU-9 AU-2 AU-14 E14 - Modify configuration settings DS (c)(2) A AU-2
50 Foundation Database Logging Object Oracle Audit Statement Resulting Audited SQL Statements Session session Database logons and failed logons Users Roles Database Links Public Database Links user role database link public database link System alter system alter system create user alter user drop user create role alter role drop role create database link drop database link create public database link drop public database link Database alter database alter database Grants grant system grant (system privileges and roles) revoke create profile Profiles profile alter profile drop profile SYSDBA and SYSOPER sysdba sysoper All SQL executed with sysdba and sysoper privileges
51 Detecting Attacks IP Address Port SID User Name Password Privileges 1. Scanning Nmap 2. TNSNAMES.ORA 3. Internal resources 1. Default port 1521 Nmap 2. TNSNAMES.ORA 3. Internal resources 1. TNSNAMES.ORA 2. Internal resources 3. SID brute force 1. Default user names (1,000+) 2. Inside the database (all_users) 3. Internal resources 1. Default passwords 2. Password guessing 3. Source code 1. Get lucky with an account 2. Missing security patches 3. Application vulnerabilities Network intrusion detection (IDS) Network intrusion detection (IDS) Monitor listener logs for SID and service name errors Alert on any use of standard accounts like CTXSYS Monitor for logins to locked accounts Watch for horizontal and vertical failed password attempts Monitor for common security errors Monitor for security vulnerability exploits
52 Agenda How and Why Prevention Q&A Targeted Attack Detection
53 Contact Information Stephen Kost Chief Technology Officer Integrigy Corporation web: blog: integrigy.com/oracle-security-blog youtube: youtube.com/integrigy
Detecting and Stopping Cyber Attacks Against Oracle Databases June 25, 2015
Detecting and Stopping Cyber Attacks Against Oracle Databases June 25, 2015 Stephen Kost Chief Technology Officer Integrigy Corporation Agenda How and Why Prevention Q&A 1 2 3 4 5 Targeted Attack Detection
Oracle Database Security Myths
Oracle Database Security Myths December 13, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy Corporation About Integrigy ERP Applications
Oracle E-Business Suite APPS, SYSADMIN, and oracle Securing Generic Privileged Accounts. Stephen Kost Chief Technology Officer Integrigy Corporation
Oracle E-Business Suite APPS, SYSADMIN, and oracle Securing Generic Privileged Accounts May 15, 2014 Mike Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer Integrigy
Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals
Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals November 13, 2014 Michael Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer
Guide to Auditing and Logging in the Oracle E-Business Suite
Guide to Auditing and Logging in the Oracle E-Business Suite February 13, 2014 Stephen Kost Chief Technology Officer Integrigy Corporation Mike Miller Chief Security Officer Integrigy Corporation Phil
How to Audit the Top Ten E-Business Suite Security Risks
In-Source Your IT Audit Series How to Audit the Top Ten E-Business Suite Security Risks February 28, 2012 Jeffrey T. Hare, CPA CISA CIA Industry Analyst, Author, Consultant ERP Risk Advisors Stephen Kost
Obtaining Value from Your Database Activity Monitoring (DAM) Solution
Obtaining Value from Your Database Activity Monitoring (DAM) Solution September 23, 2015 Mike Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer Integrigy Corporation
Security Implications of Oracle Product Desupport April 23, 2015
Security Implications of Oracle Product Desupport April 23, 2015 Stephen Kost Chief Technology Officer Integrigy Corporation About Integrigy ERP Applications Oracle E-Business Suite Databases Oracle and
Top Ten Fraud Risks in the Oracle E Business Suite
Top Ten Fraud Risks in the Oracle E Business Suite Jeffrey T. Hare, CPA CISA CIA Industry Analyst, Author, Consultant ERP Risk Advisors Stephen Kost Chief Technology Officer Integrigy Corporation February
mission critical applications mission critical security Internal Auditor Primer: Oracle E-Business Suite Security Risks Primer
mission critical applications mission critical security Internal Auditor Primer: Oracle E-Business Suite Security Risks Primer Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development
Credit Cards and Oracle E-Business Suite Security and PCI Compliance Issues
Credit Cards and Oracle E-Business Suite Security and PCI Compliance Issues August 16, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy
Top 10 Database. Misconfigurations. [email protected]
Top 10 Database Vulnerabilities and Misconfigurations Mark Trinidad [email protected] Some Newsworthy Breaches From 2011 2 In 2012.. Hackers carry 2011 momentum in 2012 Data theft, hacktivism, espionage
AppSentry Application and Database Security Auditing
AppSentry Application and Database Security Auditing May 2014 Stephen Kost Chief Technology Officer Integrigy Corporation About Integrigy ERP Applications Oracle E-Business Suite Databases Oracle and Microsoft
Encrypting Sensitive Data in Oracle E-Business Suite
Encrypting Sensitive Data in Oracle E-Business Suite December 19, 2013 Stephen Kost Chief Technology Officer Integrigy Corporation About Integrigy ERP Applications Oracle E-Business Suite Databases Oracle
Oracle Security Tools
Introduction - Commercial Slide. UKOUG Conference, December 7 th 2007 Oracle Security Tools By Pete Finnigan Written Friday, 19 th October 2007 Founded February 2003 CEO Pete Finnigan Clients UK, States,
Securing Oracle E-Business Suite in the Cloud
Securing Oracle E-Business Suite in the Cloud November 18, 2015 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy Corporation Agenda The
MySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
All Things Oracle Database Encryption
All Things Oracle Database Encryption January 21, 2016 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy Corporation Agenda Database Encryption
Credit Cards and Oracle: How to Comply with PCI DSS. Stephen Kost Integrigy Corporation Session #600
Credit Cards and Oracle: How to Comply with PCI DSS Stephen Kost Integrigy Corporation Session #600 Background Speaker Stephen Kost CTO and Founder 16 years working with Oracle 12 years focused on Oracle
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
New Security Features in Oracle E-Business Suite 12.2
New Security Features in Oracle E-Business Suite 12.2 October 24, 2013 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy Corporation About
Integrigy Corporate Overview
mission critical applications mission critical security Application and Database Security Auditing, Vulnerability Assessment, and Compliance Integrigy Corporate Overview Integrigy Overview Integrigy Corporation
Need for Database Security. Whitepaper
Whitepaper 2 Introduction The common factor in today s global economy where most of the business is done electronically via B2B [Business to Business] or via B2C [business to consumer] or other more traditional
Database Security & Auditing
Database Security & Auditing Jeff Paddock Manager, Enterprise Solutions September 17, 2009 1 Verizon 2009 Data Breach Investigations Report: 285 million records were compromised in 2008 2 Agenda The Threat
How To Secure The Org Database
Oracle Database Security Checklist An Oracle White Paper June 2008 Oracle Database Security Checklist Protecting the database environment... 3 Install only what is required... 3 Lock and expire default
WHITE PAPER. Guide to Auditing and Logging Oracle Databases
WHITE PAPER Guide to Auditing and Logging Oracle Databases DECEMBER 2014 GUIDE TO AUDITING AND LOGGING ORACLE DATABASES Version 1.0 December 2014 Authors: Michael A. Miller, CISSP-ISSMP and Stephen Kost
WHITE PAPER. Guide to Auditing and Logging in the Oracle E-Business Suite
WHITE PAPER Guide to Auditing and Logging in the Oracle E-Business Suite FEBRUARY 2014 GUIDE TO AUDITING AND LOGGING IN THE ORACLE E-BUSINESS SUITE Version 1.0 March 2003 Version 1.1 February 2004 Version
WHITE PAPER. Guide to Auditing and Logging in the Oracle E-Business Suite
WHITE PAPER Guide to Auditing and Logging in the Oracle E-Business Suite APRIL 2016 GUIDE TO AUDITING AND LOGGING IN THE ORACLE E-BUSINESS SUITE Version 1.0 March 2003 Version 1.1 February 2004 Version
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
New Oracle 12c Security Features Oracle E-Business Suite Perspective
New Oracle 12c Security Features Oracle E-Business Suite Perspective December 18, 2014 Michael Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer Integrigy Corporation
Protecting Sensitive Data Reducing Risk with Oracle Database Security
Protecting Sensitive Data Reducing Risk with Oracle Database Security [email protected] Information Security Architect Agenda 1 2 Anatomy of an Attack Three Steps to Securing an Oracle Database
Security Analysis. Spoofing Oracle Session Information
November 12, 2006 Security Analysis Spoofing Oracle Session Information OVERVIEW INTRODUCTION Oracle Database session information includes database user name, operating system user name, host, terminal,
Database Auditing: Best Practices. Rob Barnes, CISA Director of Security, Risk and Compliance Operations [email protected]
Database Auditing: Best Practices Rob Barnes, CISA Director of Security, Risk and Compliance Operations [email protected] Verizon 2009 Data Breach Investigations Report: 285 million records were compromised
DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)
Title: Functional Category: Information Technology Services Issuing Department: Information Technology Services Code Number: xx.xxx.xx Effective Date: xx/xx/2014 1.0 PURPOSE 1.1 To appropriately manage
Oracle Security Auditing
Introduction - Commercial Slide. RISK 2008, Oslo, Norway, April 23 rd 2008 Oracle Security Auditing By Pete Finnigan Written Friday, 25th January 2008 Founded February 2003 CEO Pete Finnigan Clients UK,
Oracle Security Auditing
RISK 2008, Oslo, Norway, April 23 rd 2008 Oracle Security Auditing By Pete Finnigan Written Friday, 25th January 2008 1 Introduction - Commercial Slide. Founded February 2003 CEO Pete Finnigan Clients
USM IT Security Council Guide for Security Event Logging. Version 1.1
USM IT Security Council Guide for Security Event Logging Version 1.1 23 November 2010 1. General As outlined in the USM Security Guidelines, sections IV.3 and IV.4: IV.3. Institutions must maintain appropriate
Real-Time Database Protection and. Overview. 2010 IBM Corporation
Real-Time Database Protection and Monitoring: IBM InfoSphere Guardium Overview Agenda Business drivers for database security InfoSphere Guardium architecture Common applications The InfoSphere portfolio
Auditing Data Access Without Bringing Your Database To Its Knees
Auditing Data Access Without Bringing Your Database To Its Knees Black Hat USA 2006 August 1-3 Kimber Spradlin, CISA, CISSP, CPA Sr. Manager Security Solutions Dale Brocklehurst Sr. Sales Consultant Agenda
Internal Penetration Test
Internal Penetration Test Agenda Time Agenda Item 10:00 10:15 Introduction 10:15 12:15 Seminar: Web Application Penetration Test 12:15 12:30 Break 12:30 13:30 Seminar: Social Engineering Test 13:30 15:00
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
Implementing Database Security and Auditing
Implementing Database Security and Auditing A guide for DBAs, information security administrators and auditors Ron Ben Natan ELSEVIER DIGITAL PRESS Amsterdam Boston Heidelberg London New York Oxford P
Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan
WHITE PAPER Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan Introduction to Data Privacy Today, organizations face a heightened threat landscape with data
2012 Data Breach Investigations Report
2012 Data Breach Investigations Report A study conducted by the Verizon RISK Team with cooperation from the Australian Federal Police, Dutch National High Tech Crime Unit, Irish Reporting & Information
Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks [email protected]
Web Application Security Radovan Gibala Senior Field Systems Engineer F5 Networks [email protected] Security s Gaping Hole 64% of the 10 million security incidents tracked targeted port 80. Information Week
Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions
Security Awareness For Server Administrators State of Illinois Central Management Services Security and Compliance Solutions Purpose and Scope To present a best practice approach to securing your servers
CYBERTRON NETWORK SOLUTIONS
CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified
8/17/2010. Over 90% of all compromised merchants are PCI level 4 (small) merchants or merchants with less than 1 million transactions per year
Over 90% of all compromised merchants are PCI level 4 (small) merchants or merchants with less than 1 million transactions per year Over 80% of compromised systems were card present or in-person transactions
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
Auditing the Security of an SAP HANA Implementation
Produced by Wellesley Information Services, LLC, publisher of SAPinsider. 2015 Wellesley Information Services. All rights reserved. Auditing the Security of an SAP HANA Implementation Juan Perez-Etchegoyen
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Secret Server Qualys Integration Guide
Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server
SecurityMetrics Vision whitepaper
SecurityMetrics Vision whitepaper 1 SecurityMetrics Vision: Network Threat Sensor for Small Businesses Small Businesses at Risk for Data Theft Small businesses are the primary target for card data theft,
Cyber - Security and Investigations. Ingrid Beierly August 18, 2008
Cyber - Security and Investigations Ingrid Beierly August 18, 2008 Agenda Visa Cyber - Security and Investigations Today s Targets Recent Attack Patterns Hacking Statistics (removed) Top Merchant Vulnerabilities
Hacking databases for owning your data. Cesar Cerrudo Esteban Martinez Fayo Argeniss (www.argeniss.com)
Hacking databases for owning your data Cesar Cerrudo Esteban Martinez Fayo Argeniss (www.argeniss.com) Overview Introduction Why database security? How databases are hacked? Oracle Database Server attacks
NYOUG Spring 2015 Its Only Auditing - Don t Be Afraid
NYOUG Spring 2015 Its Only Auditing - Don t Be Afraid March 19, 2015 Mike Miller Chief Security Officer Integrigy Corporation Agenda Overview Now What? 1 2 3 4 Oracle Auditing Q&A About Integrigy ERP Applications
Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group
Securing Your Web Application against security vulnerabilities Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group Agenda Security Landscape Vulnerability Analysis Automated Vulnerability
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis? This paper presents a scenario in which an attacker attempts to hack into the internal network
Guidelines for Website Security and Security Counter Measures for e-e Governance Project
and Security Counter Measures for e-e Governance Project Mr. Lalthlamuana PIO, DoICT Background (1/8) Nature of Cyber Space Proliferation of Information Technology Rapid Growth in Internet Increasing Online
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
ITEC441- IS Security. Chapter 15 Performing a Penetration Test
1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and
Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur
Demystifying Penetration Testing for the Enterprise Presented by Pravesh Gaonjur Pravesh Gaonjur Founder and Executive Director of TYLERS Information Security Consultant Certified Ethical Hacker (CEHv8Beta)
Managing Oracle E-Business Suite Security
Managing Oracle E-Business Suite Security Erik Graversen, Senior Principal Software Developer Elke Phelps, Senior Principal Product Manager Oracle E-Business Suite Applications Technology Oracle Open World,
CRYPTUS DIPLOMA IN IT SECURITY
CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information
PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics
PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics About Us Matt Halbleib CISSP, QSA, PA-QSA Manager PCI-DSS assessments With SecurityMetrics for 6+ years SecurityMetrics Security
Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG
Database Security Guideline Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG Table of Contents Chapter 1 Introduction... 4 1.1 Objective... 4 1.2 Prerequisites of this Guideline...
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance
Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance Produced on behalf of New Net Technologies by STEVE BROADHEAD BROADBAND TESTING 2010 broadband testing and new net technologies
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
Security Solution Architecture for VDI
Solution Architecture for VDI A reference implementation of VMware BENEFITS Validated solution architecture provides unprecedented end-to-end security dashboard for virtual desktop infrastructure (VDI)
Metasploit The Elixir of Network Security
Metasploit The Elixir of Network Security Harish Chowdhary Software Quality Engineer, Aricent Technologies Shubham Mittal Penetration Testing Engineer, Iviz Security And Your Situation Would Be Main Goal
Copyright 2013, Oracle and/or its affiliates. All rights reserved.
1 Security Inside-Out with Oracle Database 12c Denise Mallin, CISSP Oracle Enterprise Architect - Security The following is intended to outline our general product direction. It is intended for information
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
RSA Security Anatomy of an Attack Lessons learned
RSA Security Anatomy of an Attack Lessons learned Malcolm Dundas Account Executive John Hurley Senior Technology Consultant 1 Agenda Advanced Enterprise/ Threats The RSA Breach A chronology of the attack
Securing SharePoint 101. Rob Rachwald Imperva
Securing SharePoint 101 Rob Rachwald Imperva Major SharePoint Deployment Types Internal Portal Uses include SharePoint as a file repository Only accessible by internal users Company Intranet External Portal
MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
PCI Compliance in Oracle E-Business Suite
PCI Compliance in Oracle E-Business Suite May 14, 2015 Mike Miller Chief Security Officer Integrigy Corporation David Kilgallon Oracle Integration Manager CardConnect Moderated by Phil Reimann, Director
Professional Penetration Testing Techniques and Vulnerability Assessment ...
Course Introduction Today Hackers are everywhere, if your corporate system connects to internet that means your system might be facing with hacker. This five days course Professional Vulnerability Assessment
Database Security and Auditing: Leading Practices. Rob Barnes Director, Enterprise Auditing Solutions Application Security, Inc.
Database Security and Auditing: Leading Practices Rob Barnes Director, Enterprise Auditing Solutions Application Security, Inc. Getting to Know Database Threats and Vulnerabilities Key Objectives Understand
<COMPANY> PR11 - Log Review Procedure. Document Reference Date 30th September 2014 Document Status. Final Version 3.
PR11 - Log Review Procedure Document Reference PR11 - Log Review Procedure Date 30th September 2014 Document Status Final Version 3.0 Revision History 1.0 12 January 2010 - Initial release. 1.1 14 September
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST Performed Between Testing start date and end date By SSL247 Limited SSL247 Limited 63, Lisson Street Marylebone London
Penetration: from Application down to OS
April 13, 2010 Penetration: from Application down to OS Getting OS Access Using Lotus Domino Application Server Vulnerabilities Digitаl Security Research Group (DSecRG) www.dsecrg.com Alexandr Polyakov.
Securing Database Servers. Database security for enterprise information systems and security professionals
Securing Database Servers Database security for enterprise information systems and security professionals Introduction: Database servers are the foundation of virtually every Electronic Business, Financial,
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Detailed Description about course module wise:
Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference
Microsoft Active Directory and Windows Security Integration with Oracle Database
Microsoft Active Directory and Windows Security Integration with Oracle Database Santanu Datta Vice President Server Technologies Christian Shay Principal Product Manager Server Technologies Safe Harbor
WHITEPAPER. Nessus Exploit Integration
Nessus Exploit Integration v2 Tenable Network Security has committed to providing context around vulnerabilities, and correlating them to other sources, such as available exploits. We currently pull information
Building a Robust Web Application Security Plan
Building a Robust Web Application Security Plan Author: Narainder Chandwani Senior Consultant Foundstone Professional Services 1 Table of Contents Introduction...3 Profiling...4 Approach...6 Testing Methodology...6
