Oracle Database 11g: Administration Workshop I 11-2
|
|
|
- Sylvia Morrison
- 10 years ago
- Views:
Transcription
1
2 Objectives This lesson is a starting point for learning about Oracle Security. Additional information is provided in the following documentation: Oracle Database Concepts 11g Release 1 (11.1) Oracle Database Administrator s Guide 11g Release 1 (11.1) Oracle Database Security Guide 11g Release 1 (11.1) Additional training is provided in the following courses: Oracle Database 11g: Administration Workshop II (D50079GC10) Oracle Database 11g: Security Oracle Database 11g: Administration Workshop I 11-2
3 Industry Security Requirements Security requirements have been a matter of individual concern until recently. Unless you were handling government or military data, there were few legal requirements. This is rapidly changing. A variety of laws have been passed to enforce the privacy and accuracy of data. Along with these laws, there is a requirement to audit the security measures that are in place. These laws vary by country, but the concerns are the same and many of the solutions are the same. Legal: Each of the laws listed here has specific requirements. This list is representative of many other laws that are being passed worldwide. Of course, security laws vary from place to place. Sarbanes-Oxley Act (SOX) requires that public companies strengthen and document internal controls to prevent individuals from committing fraudulent acts that may compromise an organization s financial position or the accuracy of its financial statements. The chief executive officer and the chief financial officer must attest to the adequacy of the internal controls and accuracy of the financial report. These officers are subject to fines and imprisonment for fraudulent reports. The details of SOX include requirements for providing the information that is used to generate the reports, as well as internal controls that are used to assure the integrity of the financial information. Oracle Database 11g: Administration Workshop I 11-3
4 Industry Security Requirements (continued) Health Information Portability and Accountability Act (HIPAA) is intended to protect personally identifiable health information from release or misuse. Information holders must provide audit trails of all who access this data. EU Data Directive is intended to protect individual privacy and sets a standard across all of the member countries of the European Union. UK Data Protection Act is intended to protect individual privacy by restricted access to individually identifiable data. It has eight points, one of which requires that data be kept secure. Norwegian Personal Data Act is compatible with and goes beyond the EU data directive in some areas. Other laws: - Family Educational Rights and Privacy Act (FERPA) covers health and personal information held by schools. - California Breach Law requires that an organization holding a variety of personal identity information (PII) (for example, credit card, driver s license, and government identity numbers) must protect that information. If the information has been compromised, the organization must notify all individuals involved. There are two laws, CA-SB-1386 and CA-AB-1950, that apply to organizations that hold PII. - Federal Information Security Management Act (FISMA) is creating security guidance and standards through Federal Information Processing Standard (FIPS) documents that are managed by the National Institute of Standards (NIST). These standards are applied to organizations that are processing information for the U.S. government. - Payment Card Industry (PCI) data security standard has become law in Minnesota; other states are considering similar measures. The PCI standard is enforced worldwide by contract. Auditing: Many of these laws include provisions requiring that security plans (internal controls) be audited periodically. SOX requirements are vague and subject to interpretation by the officers of the organization. The implementation details can vary widely, depending on the level of details that the officers require. Because SOX is vague but has severe penalties, it is important to protect your company. The cost of security measures must be balanced against the risk. No one will certify that you are 100% secure. A very good solution is industry consensus. If you meet the agreed-upon minimum security practices and have accomplished due diligence, you may be safe from the worst penalties of the law. Some good resources for industry-standard practices are the SANS Institute (SANS = SysAdmin, Audit, Network, Security), CERT/CC (operated by Carnegie Mellon University for the Department of Defense), and the ISO certification standard: The ISO certification standard is an international standard of security practices. It includes best practices, certification, and risk assessment. It covers a broad range of issues and includes prewritten policies. Oracle Database 11g: Administration Workshop I 11-4
5 Separation of Responsibilities These are the main requirements to satisfy the separation of duties. DBAs must be trusted: It is difficult to restrict a DBA. To do his or her job, the DBA requires highlevel privileges. A DBA has a position of trust and must be thoroughly vetted. Even a trusted DBA must have accountability. Consider the following: Abuse of trust: A DBA can potentially misuse the encrypted passwords from the DBA_USERS view. Audit trails protecting the trusted position: When auditing is carefully implemented and guidelines have been followed, the audit trail can show that a particular person has not violated procedures or committed a damaging act. If a malicious user tries to cast suspicion on a trusted user, well-designed audit trails catch the act. Oracle Database Vault: The Oracle Database Vault option can be purchased for situations in which the separation of duties must be enforced by the database, or for situations in which the DBA is not allowed to view data in some or all database schemas. Oracle Database 11g: Administration Workshop I 11-5
6 Database Security Oracle Database 11g provides the industry s best framework for a secure system. But for that framework to be effective, the database administrator must follow best practices and continually monitor database activity. Restricting Access to Data and Services All users must not have access to all data. Depending on what is stored in your database, restricted access can be mandated by business requirements, by customer expectations, and (increasingly) by legal restrictions. Credit card information, health-care data, identity information, and so on must be protected from unauthorized access. The Oracle database provides extremely fine-grained authorization controls to limit database access. Restricting access must include applying the principle of least privilege. Oracle Database 11g: Administration Workshop I 11-6
7 Database Security (continued) Authenticating Users To enforce access controls on sensitive data, the system must first know who is trying to access the data. Compromised authentication can render all other security precautions useless. The most basic form of user authentication is challenging users to provide something that they know, such as a password. Ensuring that passwords follow simple rules can greatly increase the security of your system. Stronger authentication methods include requiring users to provide something that they have, such as a token or public key infrastructure (PKI) certificate. An even stronger form of authentication is to identify users through a unique biometric characteristic such as a fingerprint, an iris scan, bone structure patterns, and so on. The Oracle database supports advanced authentication techniques (such as token-, biometric-, and certificate-based identification) through the Advanced Security option. User accounts that are not in use must be locked to prevent attempts to compromise authentication. Monitoring for Suspicious Activity Even authorized and authenticated users can sometimes compromise your system. Identifying unusual database activity (such as an employee who suddenly begins querying large amounts of credit card information, research results, or other sensitive information) can be the first step to detecting information theft. The Oracle database provides a rich set of auditing tools to track user activity and identify suspicious trends. Oracle Database 11g: Administration Workshop I 11-7
8 Principle of Least Privilege Apply the principle of least privilege, starting at the lowest levels and continuing at every level. There are always new security exploits that cannot be anticipated. By applying this principle, the possibility of the exploit is reduced and the damage may be contained. Install only required software on the machine: By reducing the number of software packages, you reduce maintenance, upgrades, the possibility of security holes, and software conflicts. Activate only required services on the machine: Fewer services imply fewer open ports and fewer attack vectors. Give operating system (OS) and database access to only those users that require access: Fewer users mean fewer passwords and accounts. This reduces the possibility of open or stale accounts. Fewer accounts make it easier for the administrator to keep the accounts current. Limit access to the root or administrator account: The administrator account must be carefully guarded, audited, and never shared. Limit access to the SYSDBA and SYSOPER accounts: Users who require access to these roles must each have their own account and be audited. Limit users access to only the database objects required to do their jobs: Users who have access to more objects and services than they require have an opportunity for mischief. Oracle Database 11g: Administration Workshop I 11-8
9 Applying the Principle of Least Privilege The principle of least privilege means that a user must be given only those privileges that are required to efficiently complete a task. This reduces the chances of users modifying or viewing data (either accidentally or maliciously) that they do not have the privilege to modify or view. Protect the data dictionary: The O7_DICTIONARY_ACCESSIBILITY parameter is set by default to FALSE. You must not allow this to be changed without a very good reason because it prevents users with the ANYTABLE system privileges from accessing the data dictionary base tables. It also ensures that the SYS user can log in only as SYSDBA. Revoke unnecessary privileges from PUBLIC: Several packages are extremely useful to applications that need them, but require proper configuration to be used securely. PUBLIC is granted execute privilege on the following packages: UTL_SMTP, UTL_TCP, UTL_HTTP, and UTL_FILE. In Oracle Database 11g, network access is controlled by an access control list (ACL) that may be configured to allow certain users access to specific network services. Network access is denied by default. An ACL must be created to allow network access. File through UTL_FILE access is controlled at two levels: at the OS level with permissions on files and directories, and in the database by DIRECTORY objects that allow access to specific file system directories.the DIRECTORY object may be granted to a user for read or for read and write. Execute privileges on other PL/SQL packages should be carefully controlled. Oracle Database 11g: Administration Workshop I 11-9
10 Applying the Principle of Least Privilege (continued) The more powerful packages that may potentially be misused include: UTL_SMTP: Permits arbitrary messages to be sent by using the database as a Simple Mail Transfer Protocol (SMTP) mail server. Use the ACL to control which machines may be accessed by which users. UTL_TCP: Permits outgoing network connections to be established by the database server to any receiving or waiting network service. Thus, arbitrary data can be sent between the database server and any waiting network service. Use the ACL to control access. UTL_HTTP: Allows the database server to request and retrieve data via HTTP. Granting this package to a user may permit data to be sent via HTML forms to a malicious Web site. Limit access by using the ACL. UTL_FILE: If configured improperly, allows text-level access to any file on the host operating system. When properly configured, this package limits user access to specific directory locations. Restrict access to OS directories: The DIRECTORY object inside the database enables DBAs to map directories to OS paths and to grant privileges on those directories to individual users. Limit users with administrative privileges: Do not provide database users more privileges than necessary. Nonadministrators must not be granted the DBA role. To implement least privilege, restrict the following types of privileges: Grants of system and object privileges SYS-privileged connections to the database, such as SYSDBA and SYSOPER Other DBA-type privileges, such as DROP ANY TABLE Restrict remote database authentication: The REMOTE_OS_AUTHENT parameter is set to FALSE by default. It must not be changed unless all clients can be trusted to authenticate users appropriately. With the advent of Secure External Password Store (available in Oracle Database 10g Release 2), there are few compelling reasons ever to allow remote OS authentication. In the remote authentication process: The database user is authenticated externally The remote system authenticates the user The user logs in to the database without further authentication Oracle Database 11g: Administration Workshop I 11-10
11 Setting Database Administrator Authentication Users with SYSDBA, SYSOPER, or SYSASM privileges must always be authenticated. When connecting locally, the user is authenticated by the local OS by being a member of a privileged OS group. If connecting remotely, a password file is used to authenticate privileged users. If the password file is configured, it will be checked first. In Oracle Database 11g, these passwords are case-sensitive. Oracle Database 11g provides other methods that make remote administrator authentication more secure and centralize the administration of these privileged users. When a database is created using the Database Configuration Assistant, the password file is casesensitive. If you upgrade from earlier database versions, be sure to make the password file casesensitive for remote connections: orapwd file=orapworcl entries=5 ignorecase=n If your concern is that the password file might be vulnerable or that the maintenance of many password files is a burden, strong authentication can be implemented: Grant OSDBA or OSOPER roles in Oracle Internet Directory. Use Kerberos tickets Use certificates over SSL The Advanced Security option is required if you want to use strong authentication methods. For more information about strong authentication, see the Oracle Database Advanced Security Administrator s Guide. Oracle Database 11g: Administration Workshop I 11-11
12 Monitoring for Compliance Auditing, which means capturing and storing information about what is happening in the system, increases the amount of work the system must do. Auditing must be focused so that only events that are of interest are captured. Properly focused auditing has minimal impact on system performance. Improperly focused auditing can significantly affect performance. Mandatory auditing: All Oracle databases audit certain actions regardless of other audit options or parameters. The reason for mandatory audit logs is that the database needs to record some database activities, such as connections by privileged users. Standard database auditing: Enabled at the system level by using the AUDIT_TRAIL initialization parameter. After you enable auditing, select the objects and privileges that you want to audit and set the auditing properties with the AUDIT command. Value-based auditing: Extends standard database auditing, capturing not only the audited event that occurred but also the actual values that were inserted, updated, or deleted. Value-based auditing is implemented through database triggers. Fine-grained auditing (FGA): Extends standard database auditing, capturing the actual SQL statement that was issued rather than only the fact that the event occurred DBA auditing: Separates the auditing duties between the DBA and an auditor or security administrator who monitors the DBA activities in an operating system audit trail Oracle Database 11g: Administration Workshop I 11-12
13 Standard Database Auditing After you enable database auditing and specify the auditing options (login events, exercise of system and object privileges, or the use of SQL statements), the database begins collecting audit information. If AUDIT_TRAIL is set to OS, the audit records are stored in the operating system s audit system. In a Windows environment, this is the event log. In a UNIX or Linux environment, audit records are stored in a file that is specified with the AUDIT_FILE_DEST parameter. If the AUDIT_TRAIL parameter is set to DB, you can review audit records in the DBA_AUDIT_TRAIL view, which is part of the SYS schema. If AUDIT_TRAIL is set to XML or to XML,EXTENDED, the audit records are written to XML files in the directory to which the AUDIT_FILE_DEST parameter points. The V$XML_AUDIT_TRAIL view allows you to view all the XML files in this directory. Maintaining the audit trail is an important administrative task. Depending on the focus of the audit options, the audit trail can grow very large very quickly. If not properly maintained, the audit trail can create so many records that it affects the performance of the system. Audit overhead is directly related to the number of records that are produced. Oracle Database 11g: Administration Workshop I 11-13
14 Enabling Auditing You must enable database auditing before audit settings will produce audit records. Oracle Database 11g: Administration Workshop I 11-14
15 Uniform Audit Trails To use database auditing, you must first set the static AUDIT_TRAIL parameter to point to a storage location for audit records. This enables database auditing. The Oracle database tracks the same fields for standard and fine-grained auditing, enabling you to easily analyze database activities. To accomplish this, both the standard audit trail and the finegrained audit trail have attributes that complement each other. The extra information that is collected by standard auditing includes: The system change number (SCN), which records every change to the system The exact SQL text executed by the user and the bind variables used with the SQL text. These columns appear only if you have specified AUDIT_TRAIL=DB_EXTENDED in your initialization parameter file. The extra information that is collected by fine-grained auditing includes: A serial number for each audit record A statement number that links multiple audit entries that originate from a single statement Common attributes include: A global time stamp in Universal Time Coordinates (UTC). This field is useful for monitoring across servers in separate geographic locations and time zones. An instance number that is unique for each Real Application Clusters (RAC) instance A transaction identifier that helps you group audit records of a single transaction The DBA_COMMON_AUDIT_TRAIL view combines standard and fine-grained audit log records. Oracle Database 11g: Administration Workshop I 11-15
16 Specifying Audited Options SQL statement auditing: The statement shown in the slide can audit any data definition language (DDL) statement that affects a table, including CREATE TABLE, DROP TABLE, TRUNCATE TABLE, and so on. SQL statement auditing can be focused by username or by success or failure: SQL> AUDIT TABLE BY hr WHENEVER NOT SUCCESSFUL; System-privilege auditing: Can be used to audit the exercise of any system privilege (such as DROP ANY TABLE). It can be focused by username or by success or failure. By default, auditing is BY ACCESS. Each time an audited system privilege is exercised, an audit record is generated. You can choose to group those records with the BYSESSION clause so that only one record is generated per session. (In this way, if a user updates 100,000 records in a table belonging to another user, you gather only one audit record.) Consider using the BYSESSION clause to limit the performance and storage impact of system-privilege auditing. Object-privilege auditing: Can be used to audit actions on tables, views, procedures, sequences, directories, and user-defined data types. This type of auditing can be focused by success or failure and grouped by session or access. Unlike system-privilege auditing, the default grouping is by session. You must explicitly specify BYACCESS if you want a separate audit trail record to be generated for each action. Oracle Database 11g: Administration Workshop I 11-16
17 Enterprise Manager Audit Page You can reach the Audit page from the Database Control Home page by clicking the Server tab and then clicking the Audit Settings link in the Security region. The Audit page contains the following regions: Configuration: Shows the current configuration parameter values and contains links to edit the parameter values Audit Trails: Provides easy-to-use access to the audit information that has been collected Use these tabbed pages to set and unset audit options: Audited Privileges: Shows privileges that are audited Audited Objects: Shows objects that are audited Audited Statements: Shows statements that are audited Oracle Database 11g: Administration Workshop I 11-17
18 Using and Maintaining Audit Information Best Practice Tip Auditing incurs a performance penalty proportional to the number of writes to the audit trail. To tailor the audit options to the needs of your site, enable only those options that are necessary to meet the security policy. Focus the auditing to reduce the number of audit trail entries. Oracle Database 11g: Administration Workshop I 11-18
19 Value-Based Auditing Database auditing records the inserts, updates, and deletes that have occurred in audited objects but does not capture the actual values that are changed. To extend database auditing, value-based auditing leverages database triggers (event-driven PL/SQL constructs) to capture the changed values. When a user inserts, updates, or deletes data from a table with the appropriate trigger attached, the trigger works in the background to copy audit information to a table that is designed to contain the audit information. Value-based auditing tends to degrade performance more than standard database auditing because the audit trigger code must be executed each time the insert, update, or delete operation occurs. The degree of degradation depends on the efficiency of the trigger code. Valuebased auditing must be used only in situations in which the information captured by standard database auditing is insufficient. Value-based auditing is implemented by user or third-party code. The Oracle database provides the PL/SQL constructs to allow value-based audit systems to be built. Oracle Database 11g: Administration Workshop I 11-19
20 Value-Based Auditing (continued) The key to value-based auditing is the audit trigger, which is simply a PL/SQL trigger that is constructed to capture audit information. Example of a typical audit trigger: CREATE OR REPLACE TRIGGER system.hrsalary_audit AFTER UPDATE OF salary ON hr.employees REFERENCING NEW AS NEW OLD AS OLD FOR EACH ROW BEGIN IF :old.salary!= :new.salary THEN INSERT INTO system.audit_employees VALUES (sys_context('userenv','os_user'), sysdate, sys_context('userenv','ip_address'), :new.employee_id ' salary changed from ' :old.salary ' to ' :new.salary); END IF; END; / This trigger focuses auditing to capture changes to the salary column of the hr.employees table. When a row is updated, the trigger checks the salary column. If the old salary is not equal to the new salary, the trigger inserts an audit record into the audit_employees table (created via a separate operation in the SYSTEM schema). The audit record includes the username, the IP address from which the change is made, the primary key identifying which record is changed, and the actual salary values that are changed. Database triggers can also be used to capture information about user connections in cases where standard database auditing does not gather sufficient data. With login triggers, the administrator can capture data that identifies the user who is connecting to the database. Examples include the following: IP address of the person logging in First 48 characters of the program name that is used to connect to the instance Terminal name that is used to connect to the instance For a complete list of user parameters, see the section titled SYS_CONTEXT in the Oracle Database SQL Reference. Value-based triggers have been superceded in many cases by the fine-grained auditing (FGA) feature. Oracle Database 11g: Administration Workshop I 11-20
21 Fine-Grained Auditing Database auditing records the fact that an operation has occurred but does not capture information about the statement that caused the operation. Fine-grained auditing (FGA) extends that capability to enable the capture of actual SQL statements that query or manipulate data. FGA also allows auditing to be more narrowly focused than standard or value-based database auditing. FGA options can be focused by individual columns in a table or view, and can even be conditional so that audits are captured only if certain administrator-defined specifications are met. More than one relevant column is supported for an FGA policy. By default, if any one of these columns is present in the SQL statement, it is audited. DBMS_FGA.ALL_COLUMNS and DBMS_FGA.ANY_COLUMNS are provided to audit on the basis of whether any or all of the relevant columns are used in the statement. Use the DBMS_FGA PL/SQL package to create an audit policy on the target table or view. If any of the rows returned from a query block match the audited column and the specified audit condition, an audit event causes an audit record to be created and stored in the audit trail. As an option, the audit event can also execute a procedure. FGA automatically focuses auditing at the statement level. A SELECT statement that returns thousands of rows thus generates only one audit record. Oracle Database 11g: Administration Workshop I 11-21
22 FGA Policy The example in the slide shows the creation of a fine-grained auditing policy with the DBMS_FGA.ADD_POLICY procedure, which accepts the following arguments. Policy Name You assign each FGA policy a name when you create it. The example in the slide names the policy AUDIT_EMPS_SALARY by using the following argument: policy_name => 'audit_emps_salary' Audit Condition The audit condition is a SQL predicate that defines when the audit event must fire. In the slide example, all rows in department 10 are audited by using the following condition argument: audit_condition => 'department_id = 10' Oracle Database 11g: Administration Workshop I 11-22
23 FGA Policy (continued) Audit Column The audit column defines the data that is being audited. An audit event occurs if this column is included in the SELECT statement or if the audit condition allows the selection. The example in the slide audits two columns by using the following argument: audit_column => 'SALARY,COMMISION_PCT' This argument is optional. If it is not specified, only the AUDIT_CONDITION argument determines whether an audit event must occur. Object The object is the table or view that is being audited. It is passed as two arguments: The schema that contains the object The name of the object The example in the slide audits the hr.employees table by using the following arguments: object_schema => 'hr' object_name => 'employees' Handler An optional event handler is a PL/SQL procedure that defines additional actions that must be taken during auditing. For example, the event handler can send an alert page to the administrator. If it is not defined, an audit event entry is inserted into the audit trail. If an audit event handler is defined, the audit entry is inserted into the audit trail and the audit event handler is executed. The audit event entry includes the FGA policy that caused the event, the user executing the SQL statement, and the SQL statement and its bind variables. The event handler is passed as two arguments: The schema that contains the PL/SQL program unit The name of the PL/SQL program unit The example in the slide executes the SECURE.LOG_EMPS_SALARY procedure by using the following arguments: handler_schema => 'secure' handler_module => 'log_emps_salary' By default, audit trail always writes the SQL text and SQL bind information to LOBs. The default can be changed (for example, if the system would suffer performance degradation). Status The status indicates whether the FGA policy is enabled. In the slide example, the following argument enables the policy: enable => TRUE Oracle Database 11g: Administration Workshop I 11-23
24 Audited DML Statement: Considerations With an FGA policy defined for DML statements, a DML statement is audited if the data rows (both new and old) that are being manipulated meet the policy predicate criteria. However, if relevant columns are also specified in the policy definition, the statement is audited when the data meets the FGA policy predicate and the statement references the relevant columns defined. For DELETE statements, specifying relevant columns during policy definition is not useful because all columns in a table are touched by a DELETE statement. Therefore, a DELETE statement is always audited regardless of the relevant columns. MERGE statements are supported by FGA. The underlying INSERT and UPDATE statements are audited if they meet the defined INSERT or UPDATE FGA policies. Using the previously defined FGA policy, the first statement is not audited whereas the second one is. None of the employees in department 10 receive a commission, but employee_id=200 specifies an employee in department 10. Oracle Database 11g: Administration Workshop I 11-24
25 FGA Guidelines For the SELECT statements, FGA captures the statement itself and not the actual rows. However, when FGA is combined with Flashback Query, the rows can be reconstructed as they existed at that point in time. For more details about Flashback Query, see the lesson titled Performing Flashback. For more details about the DBMS_FGA package, see the Oracle Database PL/SQL Packages and Types Reference. Oracle Database 11g: Administration Workshop I 11-25
26 DBA Auditing The SYSDBA and SYSOPER users have privileges to start up and shut down the database. Because they may make changes while the database is closed, the audit trail for these privileges must be stored outside the database. The Oracle database automatically captures login events by the SYSDBA and SYSOPER users. This provides a valuable way to track authorized or unauthorized SYSDBA and SYSOPER actions, but it is useful only if the OS audit trail is reviewed. The Oracle database always captures the login events of privileged users. Other actions are captured if DBA auditing is specifically enabled. Enable auditing of the SYSDBA and SYSOPER users by setting the initialization parameter: audit_sys_operations=true (The default is FALSE.) If the SYS operations are audited, the audit_file_dest initialization parameter controls the storage location of the audit records. On a Windows platform, the audit trail defaults to the Windows event log. On UNIX and Linux platforms, audit records are stored in $ORACLE_HOME/rdbms/audit. Oracle Database 11g: Administration Workshop I 11-26
27 Maintaining the Audit Trail Each type of audit trail must be maintained. Basic maintenance must include reviewing the audit records and removing older records from the database or operating system. Audit trails can grow to fill the available storage. If the file system is full, the system may crash or simply cause performance problems. If the database audit trail fills the tablespace, audited actions do not complete. If the audit trail fills the system tablespace, the performance of other operations is affected before audit operations halt. The audit trail for standard auditing is stored in the AUD$ table. The audit trail for FGA is the FGA_LOG$ table. Both these tables are created in the SYSTEM tablespace by default. You can move these tables to another tablespace by using the Data Pump export and import utilities. Note: Moving the audit tables out of the SYSTEM tablespace is not supported. Audit records can be lost during the process of removing records from the audit tables. Best Practice Tip Use an export based on a time stamp, and then delete rows from the audit trail based on the same time stamp. Oracle Database 11g: Administration Workshop I 11-27
28 Security Updates Oracle Critical Patch Updates (CPUs) contain an assessment of the risk and degree of exposure associated with the vulnerability, along with a severity rating. The CPUs help to mitigate this risk; you can manage patches with Oracle Enterprise Manager. Oracle Corporation includes in the CPU an acknowledgement of the individual or organization that notified it of the vulnerability. CPU information is posted on the Oracle Technology Network site and on Oracle MetaLink. Although CPU information is publicly available for anyone interested in the updates, only customers with a current Customer Support Identification (CSI) number can download a patch. Oracle appreciates your cooperation in keeping its products secure through prompt, complete, and confidential notification of potential security vulnerabilities. If you discover a security vulnerability with any Oracle product, we encourage you to submit a service request through MetaLink. You can also send to [email protected]. Oracle Database 11g: Administration Workshop I 11-28
29 Applying Security Patches Critical Patch Update Process Oracle initiated the CPU process in January The process bundles together critical patches on a quarterly basis. (This program replaced the Security Alert patch releases.) These patches are cumulative and include commonly requested and required prerequisite patches. The quarterly patch release comes with a risk assessment matrix to enable you to determine for your site the impact and security risks. (See MetaLink Note: Security Alerts and Critical Patch Updates Frequently Asked Questions. ) You must subscribe to MetaLink to receive Critical Patch Updates. Apply All Security Patches and Workarounds Always apply all relevant and current security patches for both the operating system on which the database resides and the Oracle software, and for all installed options and components. Contact the Oracle Security Products Team If you believe that you have found a security vulnerability in Oracle software, follow the instructions provided from the Reporting Security Vulnerabilities link at this URL: Oracle Database 11g: Administration Workshop I 11-29
30 Oracle Database 11g: Administration Workshop I 11-30
31 Oracle Database 11g: Administration Workshop I 11-31
32
Oracle Database 11g: Administration Workshop I
Oracle Database 11g: Administration Workshop I Volume 2 - Student Guide D50102GC10 Edition 1.0 September 2007 D52684 L$ Authors Priya Vennapusa James Spiller Maria Billings Technical Contributors and Reviewers
All About Oracle Auditing A White Paper February 2013
A White Paper February 2013 Sr Staff Consultant Database Specialists, Inc http:www.dbspecialists.com [email protected] Many organizations keep their most sensitive and valuable information in an
Fine Grained Auditing In Oracle 10G
Fine Grained Auditing In Oracle 10G Authored by: Meenakshi Srivastava ([email protected]) 2 Abstract The purpose of this document is to develop an understanding of Fine Grained Auditing(FGA)
Database security tutorial. Part I
Database security tutorial Part I Oracle Tutorials, June 4 th 2012 Daniel Gómez Blanco Agenda Authentication Roles and privileges Auditing 2 Authentication Basis of any security model Process of confirming
D50323GC20 Oracle Database 11g: Security Release 2
D50323GC20 Oracle Database 11g: Security Release 2 What you will learn In this course, you'll learn how to use Oracle Database features to meet the security, privacy and compliance requirements of their
Oracle Database 11g: Security Release 2. Course Topics. Introduction to Database Security. Choosing Security Solutions
Oracle Database 11g: Security Release 2 In this course, students learn how they can use Oracle Database features to meet the security, privacy and compliance requirements of their organization. The current
Oracle Database 11g: Security Release 2
Oracle University Contact Us: 1.800.529.0165 Oracle Database 11g: Security Release 2 Duration: 5 Days What you will learn In this course, you'll learn how to use Oracle Database features to meet the security,
An Oracle White Paper August 2010. Oracle Database Auditing: Performance Guidelines
An Oracle White Paper August 2010 Oracle Database Auditing: Performance Guidelines Introduction Database auditing has become increasingly important as threats to applications become more sophisticated.
Oracle Database 11g: Security. What you will learn:
Oracle Database 11g: Security What you will learn: In Oracle Database 11g: Security course students learn how they can use Oracle database features to meet the security, privacy and compliance requirements
<Insert Picture Here> Oracle Database Security Overview
Oracle Database Security Overview Tammy Bednar Sr. Principal Product Manager [email protected] Data Security Challenges What to secure? Sensitive Data: Confidential, PII, regulatory
Oracle Audit in a Nutshell - Database Audit but how?
Oracle Audit in a Nutshell - Database Audit but how? DOAG + SOUG Security-Lounge Stefan Oehrli Senior Consultant Discipline Manager Trivadis AG Basel 24. April 2012 BASEL BERN LAUSANNE ZÜRICH DÜSSELDORF
Oracle Database 11g: Security
Oracle University Contact Us: +27 (0)11 319-4111 Oracle Database 11g: Security Duration: 5 Days What you will learn In Oracle Database 11g: Security course students learn how to use Oracle database features
Making Database Security an IT Security Priority
Sponsored by Oracle Making Database Security an IT Security Priority A SANS Whitepaper November 2009 Written by Tanya Baccam Security Strategy Overview Why a Database Security Strategy? Making Databases
Oracle Database Security. Nathan Aaron ICTN 4040 Spring 2006
Oracle Database Security Nathan Aaron ICTN 4040 Spring 2006 Introduction It is important to understand the concepts of a database before one can grasp database security. A generic database definition is
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may
Virtual Private Database Features in Oracle 10g.
Virtual Private Database Features in Oracle 10g. SAGE Computing Services Customised Oracle Training Workshops and Consulting. Christopher Muir Senior Systems Consultant Agenda Modern security requirements
All About Oracle Auditing Everything You Need to Know
All About Oracle Auditing Everything You Need to Know Mike Dean Database Specialists, Inc. www.dbspecialists.com RMOUG February 12, 2013 Who Am I? Oracle 11g Certified Professional DBA More than 15 years
Oracle Audit Vault and Database Firewall
Oracle Audit Vault and Database Firewall Angelo Maria Bosis Sales Consulting Director Oracle Italia Billions of Database Records Breached Globally 97% of Breaches Were Avoidable with
Introduction to IT Security
Marek Rychly [email protected] Strathmore University, @ilabafrica & Brno University of Technology, Faculty of Information Technology Enterprise Security 30 November 2015 Marek Rychly ES, 30 November
Restore and Recovery Tasks. Copyright 2009, Oracle. All rights reserved.
Restore and Recovery Tasks Objectives After completing this lesson, you should be able to: Describe the causes of file loss and determine the appropriate action Describe major recovery operations Back
Securing Oracle E-Business Suite in the Cloud
Securing Oracle E-Business Suite in the Cloud November 18, 2015 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy Corporation Agenda The
Oracle Health Sciences Network. 1 Introduction. 1.1 General Security Principles
Oracle Health Sciences Network Security Guide Release 2.0.0.0 E50290-02 September 2015 1 Introduction The main challenge sponsors face in clinical trials is the elapsed time from the start of the protocol
Oracle. Brief Course Content This course can be done in modular form as per the detail below. ORA-1 Oracle Database 10g: SQL 4 Weeks 4000/-
Oracle Objective: Oracle has many advantages and features that makes it popular and thereby makes it as the world's largest enterprise software company. Oracle is used for almost all large application
Mitigating Risks and Monitoring Activity for Database Security
The Essentials Series: Role of Database Activity Monitoring in Database Security Mitigating Risks and Monitoring Activity for Database Security sponsored by by Dan Sullivan Mi tigating Risks and Monitoring
Database Auditing and Compliance in a Mainframe Environment. Craig S. Mullins, Corporate Technologist, NEON Enterprise Software, Inc.
Database Auditing and Compliance in a Mainframe Environment Craig S. Mullins, Corporate Technologist, NEON Enterprise Software, Inc. Table of Contents Introduction................................................................................
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
Need for Database Security. Whitepaper
Whitepaper 2 Introduction The common factor in today s global economy where most of the business is done electronically via B2B [Business to Business] or via B2C [business to consumer] or other more traditional
How To Secure The Org Database
Oracle Database Security Checklist An Oracle White Paper June 2008 Oracle Database Security Checklist Protecting the database environment... 3 Install only what is required... 3 Lock and expire default
Guide to Auditing and Logging in the Oracle E-Business Suite
Guide to Auditing and Logging in the Oracle E-Business Suite February 13, 2014 Stephen Kost Chief Technology Officer Integrigy Corporation Mike Miller Chief Security Officer Integrigy Corporation Phil
Oracle Database 11g: Security
Oracle University Entre em contato: 0800 891 6502 Oracle Database 11g: Security Duração: 5 Dias Objetivos do Curso In Oracle Database 11g: Security course students learn how they can use Oracle database
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
Auditing Data Access Without Bringing Your Database To Its Knees
Auditing Data Access Without Bringing Your Database To Its Knees Black Hat USA 2006 August 1-3 Kimber Spradlin, CISA, CISSP, CPA Sr. Manager Security Solutions Dale Brocklehurst Sr. Sales Consultant Agenda
Securing Data in Oracle Database 12c
Securing Data in Oracle Database 12c Thomas Kyte http://asktom.oracle.com/ Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
An Oracle White Paper June 2009. Oracle Database 11g: Cost-Effective Solutions for Security and Compliance
An Oracle White Paper June 2009 Oracle Database 11g: Cost-Effective Solutions for Security and Compliance Protecting Sensitive Information Information ranging from trade secrets to financial data to privacy
CONTENTS. PCI DSS Compliance Guide
CONTENTS PCI DSS COMPLIANCE FOR YOUR WEBSITE BUILD AND MAINTAIN A SECURE NETWORK AND SYSTEMS Requirement 1: Install and maintain a firewall configuration to protect cardholder data Requirement 2: Do not
Database Auditing: Best Practices. Rob Barnes, CISA Director of Security, Risk and Compliance Operations [email protected]
Database Auditing: Best Practices Rob Barnes, CISA Director of Security, Risk and Compliance Operations [email protected] Verizon 2009 Data Breach Investigations Report: 285 million records were compromised
Secret Server Qualys Integration Guide
Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server
Database Auditing - 1 - Report submitted by: D. Murali Krishna - 200505017 S.M Siva Rama Krishna - 200505015
- 1 - Database Auditing Report submitted by: D. Murali Krishna - 200505017 S.M Siva Rama Krishna - 200505015 Course : Information Security Audit and Assurance Faculty : Prof. Bruhadeshwar - 2 - Contents:
<Insert Picture Here> Oracle Database Vault
Oracle Database Vault Kamal Tbeileh Senior Principal Product Manager, Database Security The following is intended to outline our general product direction. It is intended for information
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)
MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...
Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals
Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals November 13, 2014 Michael Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer
Monitoring Audit Trails Using Enterprise Manager
Enhancing Database Security: Monitoring Audit Trails Using Enterprise Manager Peter J. Magee, CDA SQRIBE Technologies Gail VanderKolk Reynolds & Reynolds Abstract Maintaining the security and integrity
NYOUG Spring 2015 Its Only Auditing - Don t Be Afraid
NYOUG Spring 2015 Its Only Auditing - Don t Be Afraid March 19, 2015 Mike Miller Chief Security Officer Integrigy Corporation Agenda Overview Now What? 1 2 3 4 Oracle Auditing Q&A About Integrigy ERP Applications
Oracle Database Auditing Performance Guidelines
Oracle Database Auditing Performance Guidelines Anjo Miguel Consultant July 2011 Enabling Oracle Database Audit could potentially have an impact on database performance, but how much? Is it measurable?
MySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
Nixu SNS Security White Paper May 2007 Version 1.2
1 Nixu SNS Security White Paper May 2007 Version 1.2 Nixu Software Limited Nixu Group 2 Contents 1 Security Design Principles... 3 1.1 Defense in Depth... 4 1.2 Principle of Least Privilege... 4 1.3 Principle
SonicWALL PCI 1.1 Implementation Guide
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
Security standards PCI-DSS, HIPAA, FISMA, ISO 27001. End Point Corporation, Jon Jensen, 2014-07-11
Security standards PCI-DSS, HIPAA, FISMA, ISO 27001 End Point Corporation, Jon Jensen, 2014-07-11 PCI DSS Payment Card Industry Data Security Standard There are other PCI standards beside DSS but this
Credit Cards and Oracle: How to Comply with PCI DSS. Stephen Kost Integrigy Corporation Session #600
Credit Cards and Oracle: How to Comply with PCI DSS Stephen Kost Integrigy Corporation Session #600 Background Speaker Stephen Kost CTO and Founder 16 years working with Oracle 12 years focused on Oracle
Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services
Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services February 30, 2012 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation
White Paper. Protecting Databases from Unauthorized Activities Using Imperva SecureSphere
Protecting Databases from Unauthorized Activities Using Imperva SecureSphere White Paper As the primary repository for the enterprise s most valuable information, the database is perhaps the most sensitive
Lotus Domino Security
An X-Force White Paper Lotus Domino Security December 2002 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 Introduction Lotus Domino is an Application server that provides groupware
Oracle Database Security Myths
Oracle Database Security Myths December 13, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy Corporation About Integrigy ERP Applications
New Oracle 12c Security Features Oracle E-Business Suite Perspective
New Oracle 12c Security Features Oracle E-Business Suite Perspective December 18, 2014 Michael Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer Integrigy Corporation
IBM Connections Cloud Security
IBM Connections White Paper September 2014 IBM Connections Cloud Security 2 IBM Connections Cloud Security Contents 3 Introduction 4 Security-rich Infrastructure 6 Policy Enforcement Points Provide Application
Secure Messaging Server Console... 2
Secure Messaging Server Console... 2 Upgrading your PEN Server Console:... 2 Server Console Installation Guide... 2 Prerequisites:... 2 General preparation:... 2 Installing the Server Console... 2 Activating
Oracle(PL/SQL) Training
Oracle(PL/SQL) Training 30 Days Course Description: This course is designed for people who have worked with other relational databases and have knowledge of SQL, another course, called Introduction to
Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan
WHITE PAPER Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan Introduction to Data Privacy Today, organizations face a heightened threat landscape with data
RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief
RSA SecurID Authentication in Action: Securing Privileged User Access RSA SecurID solutions not only protect enterprises against access by outsiders, but also secure resources from internal threats The
Oracle Database Security
breaking through barriers to progress By Raman Jathar an award winning '2004 Future 50 Company' 18650 W. Corporate Drive Suite 120 Brookfield, WI 53045 262.792.0200 Database Security Lately, database security
APPLICATION COMPLIANCE AUDIT & ENFORCEMENT
TELERAN SOLUTION BRIEF Building Better Intelligence APPLICATION COMPLIANCE AUDIT & ENFORCEMENT For Exadata and Oracle 11g Data Warehouse Environments BUILDING BETTER INTELLIGENCE WITH BI/DW COMPLIANCE
Protecting Sensitive Data Reducing Risk with Oracle Database Security
Protecting Sensitive Data Reducing Risk with Oracle Database Security [email protected] Information Security Architect Agenda 1 2 Anatomy of an Attack Three Steps to Securing an Oracle Database
White Paper. Managing Risk to Sensitive Data with SecureSphere
Managing Risk to Sensitive Data with SecureSphere White Paper Sensitive information is typically scattered across heterogeneous systems throughout various physical locations around the globe. The rate
Oracle Database 10g: Security Release 2
Oracle University Chiamaci: 800 672 253 Oracle Database 10g: Security Release 2 Duration: 4 Days Description In this course, the students learn how they can use Oracle database features to meet the security
OTM Security in an Evolving Threat Landscape. Anoop Jangamakote Ryan Haney
OTM Security in an Evolving Threat Landscape Anoop Jangamakote Ryan Haney Introduction Table of Contents 1. What is Information Security? Why is it important? 2. Introduction to OTM Security 3. OTM Threat
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG
Database Security Guideline Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG Table of Contents Chapter 1 Introduction... 4 1.1 Objective... 4 1.2 Prerequisites of this Guideline...
Safeguard Sensitive Data in EBS: A Look at Oracle Database Vault, Transparent Data Encryption, and Data Masking. Lucy Feng
Delivering Oracle Success Safeguard Sensitive Data in EBS: A Look at Oracle Database Vault, Transparent Data Encryption, and Data Masking Lucy Feng RMOUG Training Days February 2012 About DBAK Oracle Solution
Copyright 2013, Oracle and/or its affiliates. All rights reserved.
1 Security Inside-Out with Oracle Database 12c Denise Mallin, CISSP Oracle Enterprise Architect - Security The following is intended to outline our general product direction. It is intended for information
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
Real-Time Database Protection and. Overview. 2010 IBM Corporation
Real-Time Database Protection and Monitoring: IBM InfoSphere Guardium Overview Agenda Business drivers for database security InfoSphere Guardium architecture Common applications The InfoSphere portfolio
Copyright 2013, Oracle and/or its affiliates. All rights reserved.
1 Solutions for securing and auditing Oracle database Edgars Ruņģis Technology Consultant Why Are Databases Vulnerable? 80% of IT Security Programs Don t Address Database Security Forrester Research Enterprises
Credit Cards and Oracle E-Business Suite Security and PCI Compliance Issues
Credit Cards and Oracle E-Business Suite Security and PCI Compliance Issues August 16, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy
IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM
IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016 Integration Guide IBM Note Before using this information and the product it supports, read the information
Securing Your Oracle Database to Protect your Data
Securing Your Oracle Database to Protect your Data Michael Messina Senior Managing Consultant, Rolta-AdvizeX [email protected] / [email protected] Introduction Michael Messina Senior Managing Consultant
The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance
Date: 07/19/2011 The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance PCI and HIPAA Compliance Defined Understand
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
Oracle Database Security Services
Oracle Database Security Services BUSINESS CHALLENGES Public announcements of major IT security breaches have become an almost daily occurrence. The causes of publicized breaches are diverse and include
Oracle Database. Security Guide 11g Release 1 (11.1) B28531-21
Oracle Database Security Guide 11g Release 1 (11.1) B28531-21 January 2014 Oracle Database Security Guide 11g Release 1 (11.1) B28531-21 Copyright 2006, 2014, Oracle and/or its affiliates. All rights reserved.
Database Security Guide
Institutional and Sector Modernisation Facility ICT Standards Database Security Guide Document number: ISMF-ICT/3.03 - ICT Security/MISP/SD/DBSec Version: 1.10 Project Funded by the European Union 1 Document
BM482E Introduction to Computer Security
BM482E Introduction to Computer Security Lecture 7 Database and Operating System Security Mehmet Demirci 1 Summary of Lecture 6 User Authentication Passwords Password storage Password selection Token-based
Oracle Database Security Solutions
Oracle Database Security Solutions Eric Cheung Senior Manager, Technology Sales Consulting [email protected] May 2008 Key Drivers for Data Security Privacy and Compliance Sarbanes-Oxley
Oracle 1Z0-528 Exam Questions & Answers
Oracle 1Z0-528 Exam Questions & Answers Number: 1Z0-528 Passing Score: 660 Time Limit: 120 min File Version: 21.1 http://www.gratisexam.com/ Oracle 1Z0-528 Exam Questions & Answers Exam Name: Oracle Database
An Oracle White Paper June 2014. Security and the Oracle Database Cloud Service
An Oracle White Paper June 2014 Security and the Oracle Database Cloud Service 1 Table of Contents Overview... 3 Security architecture... 4 User areas... 4 Accounts... 4 Identity Domains... 4 Database
enicq 5 System Administrator s Guide
Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide
Defending the Database Techniques and best practices
ISACA Houston: Grounding Security & Compliance Where The Data Lives Mark R. Trinidad Product Manager [email protected] March 19, 2009 Agenda Understanding the Risk Changing threat landscape The target
Teleran PCI Customer Case Study
Teleran PCI Customer Case Study Written by Director of Credit Card Systems for Large Credit Card Issuer Customer Case Study Summary A large credit card issuer was engaged in a Payment Card Industry Data
Workflow Templates Library
Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security
www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012
www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,
FormFire Application and IT Security. White Paper
FormFire Application and IT Security White Paper Contents Overview... 3 FormFire Corporate Security Policy... 3 Organizational Security... 3 Infrastructure and Security Team... 4 Application Development
Oracle E-Business Suite APPS, SYSADMIN, and oracle Securing Generic Privileged Accounts. Stephen Kost Chief Technology Officer Integrigy Corporation
Oracle E-Business Suite APPS, SYSADMIN, and oracle Securing Generic Privileged Accounts May 15, 2014 Mike Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer Integrigy
modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:
SERVER SECURITY STANDARD Security Standards are mandatory security rules applicable to the defined scope with respect to the subject. Overview Scope Purpose Instructions Improperly configured systems,
Payment Card Industry (PCI) Compliance. Management Guidelines
Page 1 thehelpdeskllc.com 855-336-7435 Payment Card Industry (PCI) Compliance Management Guidelines About PCI Compliance Payment Card Industry (PCI) compliance is a requirement for all businesses that
Top 10 Database. Misconfigurations. [email protected]
Top 10 Database Vulnerabilities and Misconfigurations Mark Trinidad [email protected] Some Newsworthy Breaches From 2011 2 In 2012.. Hackers carry 2011 momentum in 2012 Data theft, hacktivism, espionage
