White Paper. Auditing the DBA in Oracle Applications: A Guide for Compliance and Audit Managers. By Cameron Larner. Absolute Technologies, Inc.
|
|
|
- Byron Houston
- 9 years ago
- Views:
Transcription
1 White Paper Auditing the DBA in Oracle Applications: A Guide for Compliance and Audit Managers By Cameron Larner Absolute Technologies, Inc. Copyright 2014 by Cameron Larner Page 1 of 28
2 Table of Contents Introduction... 3 Intended Audience... 3 Background... 3 Objectives... 3 DBA and Database Basics... 4 DBA s Primary Functions... 4 Database Objects... 4 Database Access... 7 Database Operations... 7 DBA Access to Oracle / E-Business Suite... 8 Approaches to Auditing the DBA SQL Audit Database Triggers Log Miner Fine Grained Auditing (FGA) AUDIT_SYS_OPERATIONS Recommendations Segregate DBA Duties and Access Activate AUDIT_SYS_OPERATIONS Protect the AUDIT_FILE_DEST Log Directory from the DBA Limit Use of SYSDBA Limit OS User Assignment of the DBA Group Utilize Named Accounts with the DBA Role Define and Enforce a Password Security Policy Audit DBA Activity on Key Application Objects Monitor Key Initialization Parameters Conclusion References About the Author About Absolute Technologies [ 28 Copyright 2014 by Cameron Larner Page 2 of 28
3 Introduction In these days of Sarbanes-Oxley (SOX) regulations, Governance, Risk and Compliance (GRC) managers for Oracle E-Business Suite have the assignment to develop and maintain proper controls for their information systems that align with best practices so their organizations can attain compliance. These individuals may be well suited to design, approve and enforce business process-related controls, but they may not fully understand how to audit and control technical professionals like Database Administrators (DBA) and Information Technology (IT) Staff. DBAs and IT Staff access and manipulate enterprise data using methods that may be confusing or unknown to managers with less technical knowledge. Therefore, it is essential to introduce and support appropriate and effective system based controls by creating and maintaining a secure audit trail of transactions and operations within corporate databases that can be overseen by non-technical managers. To accomplish this, those managers and auditors tasked with compliance must gain a better understanding of the DBA s role, privileges, and capabilities, and how to effectively audit DBA activity in the database. They cannot simply rely on DBAs to audit themselves. This would violate basic segregation of duties principles. [For the purposes of brevity, references to the term DBA shall include DBAs and other IT Staff with administrative or privileged access to the database.] Intended Audience As the title suggests, this paper will benefit compliance and audit managers, nontechnical managers and business analysts who are tasked with securing Oracle E- Business Suite for SOX and Segregation of Duties compliance purposes, but are not familiar with the general details of the Oracle database, nor with the capabilities and privileges of the DBA. Specifically, this paper speaks to those who have or are implementing controls for application end users where the next step is to design and implement a strategy for deploying controls for DBA and IT staff users. Background In the context of recent Sarbanes-Oxley legislation (SOX), external auditors have scrutinized DBA access and have required controls and systematic proof of those controls before certifying SOX or GRC compliance. After all, the systematic controls for application end users have little impact on your DBA s ability to tamper with financial records in the database. Objectives To facilitate the implementation of such controls, this paper will familiarize the reader with important attributes of the Oracle Database and the available roles and privileges of an Oracle DBA. It reviews and discusses approaches and mechanisms to limit DBA power, segregate DBA duties, and audit DBA activity. With this information, it is possible to mitigate the risk that a DBA could modify or circumvent Copyright 2014 by Cameron Larner Page 3 of 28
4 end user controls without detection, obstruct audit mechanisms, or compromise the audit trail itself. DBA and Database Basics If the reader feels that he or she has an adequate understanding of the significant constructs of the Oracle Database and the primary functions and powers of the DBA within, then the reader may wish to skip ahead to the section entitled, Approaches to Auditing the DBA. DBA s Primary Functions The DBA role encompasses many functions, all of which may be performed by one or many individuals in an organization, utilizing one or many different methods of access to the database. Those smaller organizations that only have one or two DBAs will usually face greater scrutiny by auditors from a segregation of duties point of view because these DBAs typically have unrestricted access to the database, and no peers to validate their work. The DBA role consists of the following functions: Database Creation, Startup and Shutdown Application Implementation/Upgrade Migration of Data and Program Changes to Production Maintenance, Backup & Recovery Performance Optimization Security/Database User, and often Application User, Management Trouble Shooting Database Objects Depending on the privileges granted, the DBA may have access to all data in the database. But, what exactly does all data mean? The Oracle database is comprised of Objects. Some of these objects may be familiar, like tables, some may not, like roles. Nevertheless, it is important to have a general understanding of them in order to accurately assess the risk of granting access to these objects to the DBA or anyone. Database Objects fall into four general categories: Those which contain data (Business data or Metadata, which is data about data) Those which refer to other objects Those which programmatically manipulate data Those which grant access to data Here is a brief description of some of the key objects in each category. Data Containing Objects Tables Copyright 2014 by Cameron Larner Page 4 of 28
5 Most E-Business Suite users are familiar with the concept of a table, the database construct that holds records of information segmented by columns. Tables essentially hold all the valuable application (financial and business) content of the database, and thus are the most important object of focus when considering compliance initiatives. Indexes An Index contains technical data about a table. They facilitate quick access to an individual record or subset of records in a table. They may also be used to enforce a unique value for a single column or set of columns in the table to prevent duplicate records. The loss or modification of indexes can have a serious impact on system performance. Sequences When called, a sequence returns a unique ascending or descending integer from the initial or previously returned integer. It is often used to generate a unique identifier for the primary key column of a table. Object Referencing Objects Views A View is a construct that looks like a table to an end user, and has similar column and row properties containing values, but actually contains no data itself. In contrast, it is merely a logical table based on one or more actual tables or other views. It can provide a user who does not have direct access to a table, indirect access to the table via the view. Views are often used to de-normalize the relational data of several related tables into a single, end user friendly, logical table. Synonyms A Synonym is an alias or alternative name for another database object. Typically, it is used to alias an object owned by another user such that the current user need not specify the schema owner of the non-owned object whenever referenced. Schemas A Schema is a collection of all the database objects owned by a single user. The Schema name is the same as the user name. Data Manipulating Objects Procedures A Procedure is a stored block of PL/SQL which can be executed by name. PL/SQL is Oracle s programming language which can be used to insert, update and/or delete records from tables, and/or create, alter or drop database objects. Functions A Function is similar to a procedure, except that a function returns a single value when executed, and thus may be used in SQL select statements to generate a selected value or a where clause operand value. Packages A Package is a collection of related procedures and functions encapsulated in a single object, where each procedure or function is executable as an individual object. Copyright 2014 by Cameron Larner Page 5 of 28
6 Triggers A Trigger is a stored block of PL/SQL which is associated with a table or a system level event. Oracle automatically executes the trigger when a specified SQL statement is issued against the table, or when a specified system event occurs. System events include database startup and shutdown, user login and logoff, server error, DDL execution, etc Data Access Objects Users A User is an account through which an authorized individual can directly connect to the database, and to which database privileges can be assigned. A User which owns database objects may be referred to as a Schema. Thus, there are really three general categories of Users: those which connect to the database to browse or make transactions, those which contain the database objects of an application, and those which do both. It is worth noting that the database user account defined above, is distinct from an application end user account. For example, Oracle E-Business Suite provides for the creation of an application user account by which the end user logs onto the application. This application user does not correspond to a database user, and does not provide direct database access, but rather is used by the application to validate access to the application at the application level. Once validated by the application, the application automatically connects to a master database user account, called APPS in this case, giving the application user indirect access to the database via their secure application connection. Roles A Role is a set of privileges that can be granted to users and/or other roles. Database Links A Database Link is an object in the local database, which allows one to connect as a specified user, without the password, to a remote database to access objects in that remote database. Copyright 2014 by Cameron Larner Page 6 of 28
7 Database Access The only way to gain access to the database is to connect as a User. However, even if one has a valid User account, the user cannot access individual objects or execute SQL commands without first having been given privileges to do so. Oracle comes packaged with a wide selection of privileges. These privileges are typically granted to the user by a DBA or System Administrator. The ability to grant a privilege to a user is a privilege in and of itself, thus any user with such privilege could administer privileges. The Oracle database comes packaged with several default users, some of which, SYS and SYSTEM for example, have been seeded with such administrative privileges. Although privileges cannot be created, modified, or deleted as independent entities, they can be bundled as Roles, and granted to or revoked from users as Roles to ease the burden of privilege administration. User Role Privilege Privilege Database Operations When it come to developing controls for access to and use of the database, it s essential that one understands the basic types of operations (transactions) that may be performed by a DBA or any user. Here is a review of the general database operations in Oracle: Select A user can query and view rows and column values from tables and views. The selection of data does not change it. You may be concerned about selection if your organization must restrict legally defined sensitive or private information to authorized personnel and exclude DBAs or IT Staff. DML [Data Manipulation Language] A user can insert, update, and delete table records. Using DML, a user can directly modify financial transactions; setups that drive financial transactions; reporting setups; and application user, role and responsibility assignment records. The assignment records govern all security and end user access at the application layer. DDL [Data Definition Language] Copyright 2014 by Cameron Larner Page 7 of 28
8 A user can create, alter, and drop database objects. The user can also Grant Privileges to users and roles, and Revoke Privileges. Using DDL, a user can alter programs stored in the database that are used in the calculation and creation of financial transactions. In fact, a knowledgeable user could introduce Trojan horse stored programs which could create fraudulent transactions to the benefit of the user, and which could subsequently remove themselves from the database, leaving no trace of their existence. Additionally, a user could create another temporary user, grant powerful privileges to the user, execute fraudulent or unauthorized transactions as the user, then drop the user. Startup and Shutdown Database Database shutdown can be executed in different modes, which if executed inappropriately, could lead to a loss of pending transactions, and interfere with the normal course of business operations. DBA Access to Oracle / E-Business Suite There are many ways a DBA can gain access to the Oracle database of which the reader should be aware. Individuals vested with implementing controls for the DBA and IT staff should be keenly aware of each and every entry point and privilege to which these technical individuals may have access. This is the only way to design preventive controls to attain a reasonable assurance of security. Default Database Users/Schemas The Oracle Database comes equipped with several default users/schemas, which are initialized with standard, published passwords. It is imperative to security that these passwords are changed immediately after install, and it is highly recommended that they be changed periodically. [Note: For E-Business Suite Releases 11i and 12, both the APPS and APPLSYS users must have identical passwords. These database passwords, along with those from each application module, must be reset at the Application level and the database level.] User Name Default Password Description Oracle Database Administrative Users (Granted DBA Role) SYS CHANGE_ON_INSTALL Oracle Master Administrator SYSTEM MANAGER Oracle System Administrator CTXSYS CTXSYS Oracle InterMedia Text Administrator E-Business Suite 11i Database Users APPS APPS E-Business Suite Master Account APPLSYSPUB PUB Application User Login Validation APPLSYS APPS Application Object Library GL GL General Ledger AP AP Payables AR AR Receivables PO PO Purchasing INV INV Inventory CE CE Cash Management Partial Table of Default Database Users for Oracle and Oracle E-Business Suite Copyright 2014 by Cameron Larner Page 8 of 28
9 The most important of these default users is SYS, the Oracle Database s master account. It owns the data dictionary, in which all details about all database objects are stored. It is endowed with all privileges, and thus any user who has access to SYS can perform any transaction or operation in the database against any object no matter who owns it. The second most important of the default users is SYSTEM. The SYSTEM user has been granted all database privileges, owns a few objects of its own, can view SYS owned objects, but cannot alter them. Another important default user is PUBLIC. Actually, PUBLIC is really more of a schema than a user. For instance, one cannot connect to the database as PUBLIC. There is no PUBLIC password. The PUBLIC user acts as a schema repository for particular database objects that are to be granted to all database users. For example, a database user may create a PUBLIC database link or a PUBLIC synonym that is available to all users. The Oracle E-Business Suite s (EBS) master application database user account is APPS. Although the different modules of EBS each install their associated database objects into a module-specific schema, like GL, AP, or AR, the APPS user has been granted privileges to the objects in each of these modules. Thus, using this architecture a single application end user need only connect to the APPS user to gain access to any module in the application. [When an application end user logs on to EBS, the user is connected to the database as APPS.] Once connected to EBS as APPS, EBS uses application level responsibilities, roles, menus, functions and forms to determine what data the application end user can access. However, any user with the APPS password can connect to APPS directly using a SQL utility like SQL*Plus or Toad, and thus gain unrestricted access to all the database objects within EBS. Another important default user account for EBS installations is APPLSYS. This user/schema owns all the Application Objects Library (AOL) tables and Objects. The AOL module is responsible for, among many other things, the allocation and management of application end user access to the EBS application. Thus, an individual who can connect to the APPLSYS user can create, delete, and modify application users and their responsibility assignments, possibly infringing upon Segregation of Duties rules and controls. Note that most EBS implementations also have database user accounts in addition to the Oracle or EBS defaults, created for use by third party software or customer initiatives to support custom modules or interfaces. These database accounts should be scrutinized for privileges that grant access to financial or sensitive data in EBS, and may contain such data themselves. Therefore, any security measures mentioned within this paper should also be applied to these types of accounts. Copyright 2014 by Cameron Larner Page 9 of 28
10 End User SYS APPS SCOTT PUBLIC SYSTEM APPLSY S GL AP AR E-Business Suite Partial Schema Map Copyright 2014 by Cameron Larner Page 10 of 28
11 Administrative Privileges Although we have discussed a few important default database users, when it comes to the SYS user in an Oracle 9i or greater environment, we must also discuss the newer concept of administrative privileges. Prior to 9i, a user would connect to SYS directly. Now, as an enhanced security measure, a user must specify under which administrative privilege to connect, as SYSDBA or as SYSOPER. For example, from the SQL prompt: SQL> connect sys as sysdba A user connecting as SYSDBA is connected as the SYS user, and essentially has full reign of the database. SYSDBA can create the database, start and shutdown the database, perform archive and recovery tasks, and access and alter any user s data. A user connecting as SYSOPER, by contrast, is connected as the PUBLIC user, and has most of the same database management privileges as SYSDBA, but it cannot view or alter any other user s data. Thus, the SYSOPER administrative privilege may be an important tool in facilitating required DBA activities while significantly reducing the risk of fraud or controls breach. Administrative Roles Distinct from Administrative Privileges are Administrative Roles. These are predefined Roles that have been created specifically for administrative/dba use, without SYS access, which provide further flexibility in achieving security initiatives without tying the hands of the DBA. Here is a partial list of Admin Roles: DBA This Role provides all system privileges with the admin option. The admin option enables the assigned user to grant the same privilege to other users. The SYS and SYSTEM user, by default, have been granted this role. SELECT_CATALOG_ROLE This Role provides select access to the Data Dictionary (SYS) views. EXECUTE_CATALOG_ROLE This Role provides execute privileges on Data Dictionary (SYS) packages and procedures. DELETE_CATALOG_ROLE This Role provides delete access to the SYS owned AUD$ table, which is designed to contain database audit trail records. Oracle comes equipped with a standard audit trail feature which may be activated by setting a database initialization parameter, and configured using SQL based audit commands to audit certain database transactions. This Role essentially enables the user to purge the audit table. The reader will learn more about this subsequently. Connection Authentication for Administrators Copyright 2014 by Cameron Larner Page 11 of 28
12 The functional reader of this paper may find it surprising that an administrator can actually log into the database with admin privileges without a database password. In fact, in most cases you will find that DBAs today rarely use a database password to connect to the database. They rely on operating system (OS) level authentication to connect versus database level authentication via a password file. As the terms imply, OS authentication enables an administrator with access to the OS of the database server to connect directly to the local database from the server without a password. In contrast, database authentication requires the administrator to provide a valid database password, but the administrator may connect locally or remotely. Fortunately, OS connection authentication in Oracle is restricted to OS users who belong to one of two account groups, OSDBA ( dba in Unix) and OSOPER ( oper in Unix). If an OS user has been assigned to the OSDBA group, that user can connect to Oracle as SYSDBA without providing a database password. Alternatively, an OS user assigned to the OSOPER group can connect to Oracle as SYSOPER without providing a database password. Furthermore, the Oracle database is installed on the OS server using an OS user account called oracle, referred to as the oracle binary account. The OS oracle account owns all the files that comprise the Oracle database and it is assigned to the OSDBA group. Therefore, any individual with password access to the oracle account also has direct access to the Oracle database as SYSDBA and does not need the SYSDBA password. Unfortunately, it is all too common that DBAs are provided with the oracle OS user password. From a security perspective, the problem is twofold: 1) the DBA gains direct access to SYSDBA and 2) there is no way to uniquely identify the individual, since they are only known to the server as oracle and to the database as SYS. Therefore, it is very important to not only restrict and tightly manage database access to SYS, but also to do the same for OS access to the oracle OS account. Whenever possible, create named accounts at both the OS and database levels, and assign privileges to the named accounts accordingly. Named accounts are created for use by a single individual, often made up of the individual s actual name. For instance, name the user clarner or camlarner for Cam Larner. As we will later show, this will greatly increase visibility to user connection and transaction activity, as well as discourage fraudulent or unauthorized activity. Connection authentication to the SYS user can be configured using the database Initialization Parameter called REMOTE_LOGIN_PASSWORDFILE. This parameter takes one of three arguments: 1. None This is the default, which disables the admin database password file, thus forcing OS level authentication, and therefore SYS connections to the database must be via the local server. 2. Exclusive With this option, the admin database password file can be used with the local database only. The password file can contain the names of users other than SYS, supporting named account DBA access if the SYS password is not Copyright 2014 by Cameron Larner Page 12 of 28
13 shared. This option allows SYSDBA and SYSOPER administrative privileges to be granted to individual users so they can connect as themselves from the local server or from a remote server or client. However, from an audit trail perspective, any transactions performed using this connection method will not contain the named account of the user, but rather SYS, which makes identification by user name impossible. [The Oracle Administrator s Guide recommends this option to attain the highest level of security.] 3. Shared With this option, the admin database password file may be shared across multiple databases, but the file will only recognize the SYS user entry, so individual named accounts are not supported. This may be an appropriate option if SYS access is restricted to a single DBA who must manage multiple databases. Otherwise, it is not recommended from a security point of view. Regardless of the option configured, it is very important to note this excerpt from the Oracle Database Administrator's Guide. Operating system authentication takes precedence over password file authentication. Specifically, if you are a member of the OSDBA or OSOPER group for the operating system, and you connect as SYSDBA or SYSOPER, you will be connected with associated administrative privileges regardless of the username/password that you specify. Another important initialization parameter affecting connection authentication is O7_DICTIONARY_ACCESSIBILITY. This parameter is designed to provide backward compatibility to version 7 for Oracle database versions 8 and above with respect to SYS and Data Dictionary accessibility. In other words, release 7 of Oracle had lower security standards for Administrative access and setting this parameter to TRUE reenables those lower standards. For example, when set to TRUE, any database user may be granted full access to SYS objects. If FALSE, only view access may be granted to other users. Additionally, when set to TRUE, an administrator can logon to SYS remotely or locally without OS authentication. Some Oracle E-Business Suite documentation instructs Administrators to set this parameter to TRUE during installation and when installing patches. Afterwards, it should be re-set to FALSE to ensure maximum security. If this parameter is set to false and one needs to access objects in the SYS schema, then the user must be granted explicit object privileges. The following roles, which can be granted to the database administrator, also allow access to dictionary objects: SELECT_CATALOG_ROLE EXECUTE_CATALOG_ROLE DELETE_CATALOG_ROLE Application Files with Database Passwords DBA s and IT staff usually have OS account access to the server upon which the Oracle database is installed. On a UNIX server, all the E-Business Suite source files are typically stored under a single OS user account named appl or appl concatenated with the instance name, like appldev, appltest, or applprod. In Copyright 2014 by Cameron Larner Page 13 of 28
14 order to manage files required for patches, updates and customizations, DBAs and IT staff will typically have access to the default appl OS user account. Unfortunately, providing shared access to this default account provides unrestricted access to some directories and files which contain sensitive information or capabilities that should be secured. For example in EBS R11i, the file $ORACLE_HOME/reports60/server/CGIcmd.dat is used by the application to run reports. It contains a non-encrypted reference to the APPS password, as seen in the example below. Another R11i example is the file $IAS_ORACLE_HOME/Apache/modplsql/cfg/wdbsvr.app, which is used by the application web server to store database connection descriptors, including various user and password entries including the APPS password. Copyright 2014 by Cameron Larner Page 14 of 28
15 Fortunately, Oracle has removed these files and thus their reference to the APPS password in R12. However, newer standard EBS functions, like APPS.DECRYPT_PIN_FUNC, provide DBAs with the capability to derive the APPS password at will. Since DBAs are the folks who administer the application, it is understandable that they would have password access to the APPS user. However, is it necessary? Perhaps a named account with privileges similar to or the same as APPS would be worthwhile? This would help increase visibility to the individual user and help distinguish those transactions performed by the application as APPS verses a DBA connected as APPS. Nevertheless, it may be prudent also to secure the appl OS user account from shared usage. Named accounts can also be created at the OS level, and discriminately given access to necessary files and directories using OS groups. Additionally, in some cases it may be possible to encrypt and/or obfuscate passwords listed in files to prevent them from falling into unauthorized hands. Discuss these approaches with your Oracle support representative and your System Administrator. Application Access A DBA or IT staff member that is privy to the APPS password can essentially access, and/or insert, modify or delete any object within the domain of the APPS user, which covers all the application modules within E-Business Suite. The holder of such, can connect directly to the database using a SQL tool like SQL*Plus, could grant himself desired responsibilities, like System Administrator, or create a dummy unnamed application user, assign responsibilities to it, and perform transactions that would be very difficult to trace back. Additionally, if the user also has the SYSTEM password, he could use the $FND_TOP/bin/FNDCPASS executable to change application user passwords and log on as someone else. This executable is usually owned by the appl OS user account, and requires the APPS and SYSTEM passwords. On a more subtle level, if the application Examine utility is enabled, the user can use the APPS password to login to examine and update fields within forms without detection. The Examine utility is managed via the E-Business Suite System Administrator based profile option called Utilities:Diagnostics. Another possible unauthorized access point is Oracle Alert, and any other E- Business Suite module with a feature that allows one to enter and execute DML SQL. If a user has been granted the Oracle Alert responsibility, they need not know the APPS password to alter APPS data. When one defines an Oracle Alert, one may enter a SQL statement, which may select, update, insert, or delete records from any table under the APPS domain. When Alert executes the statement, it is already connected as APPS. The user could cover the trail of the unauthorized script afterwards by deleting the Alert log and the Alert itself from within the Oracle Alert module. From a database transaction perspective, any changes to tables will have been made by the generic APPS user, and will have no valid application user level identification such as last_updated_by or last_update_date. Copyright 2014 by Cameron Larner Page 15 of 28
16 Note that several other E-Business Suite forms allow the execution of user-defined SQL. Metalink Note contains a list of these forms. Approaches to Auditing the DBA When it comes to auditing the DBA or any database user, there are many standard options available in the Oracle database. Each approach has advantages and disadvantages. However none offer tamper proof mechanisms, in and of themselves, which can secure the audit trail from DBA access and manipulation. Additional custom and/or third party preventive measures and mechanisms are necessary to mitigate the risk that the DBA may violate audit trail security. SQL Audit The Oracle database comes equipped with a standard audit trail feature. To activate the feature, the initialization parameter named AUDIT_TRAIL must be set to TRUE or DB to maintain the audit trail records in the database table owned by SYS called AUD$. Alternatively, it may be set OS to maintain the audit trail in files located in the OS directory specified by the initialization parameter called AUDIT_FILE_DEST. These parameters must be set in the init.ora file, and the database must be shutdown and re-started for them to become effective. Once activated, SQL audit commands must be issued by a user who has been granted the audit system privilege to specify what is to be audited. SYS, SYSTEM and users granted the DBA role have this privilege by default. [Note: SQL Audit is a database level feature, and not the same mechanism as that called Audit Trail provided in the System Administrator responsibility of E-Business Suite. The application level Audit Trail feature relies upon Database Trigger technology, as described in the following section.] Four basic types of transactions may be audited. Session Connection Audit when a user logs in or out of the database. [Note: Connections using System Administration privileges, SYSDBA and SYSOPER, are always logged to the OS AUDIT_FILE_DEST directory even when the audit trail is disabled.] Example: SQL> audit session [by user]; Statement Audit when a user executes a specified DML or DDL statement against any object. Examples: SQL> audit update table, delete table [by user]; Privilege Audit when a user executes any statement using a specified privilege. Example: SQL> audit delete any table [by user]; Object Audit when a user executes any statement on specific object. Copyright 2014 by Cameron Larner Page 16 of 28
17 Example: SQL> audit select on hr. per_all_people_f; An audit trail record from the view DBA_AUDIT_TRAIL, based on the SYS. AUD$ table, will contain the following information: os_username - Operating system login user name of audited transaction username - Database User name of audited transaction userhost - Client host machine name terminal - Identifier for the user's terminal TIMESTAMP - Date/Time of the creation of the audit trail entry (Date/Time of the user's logon for entries created by AUDIT SESSION) in session's time zone Owner - Creator of object affected by the action obj_name - Name of the schema object accessed action - Numeric action type code. The corresponding name of the action type (CREATE TABLE, INSERT, etc.) is in the column ACTION_NAME action_name - Name of the action type corresponding to the numeric code in ACTION new_owner - The owner of the object named in the NEW_NAME column new_name - New name of object after RENAME, or name of underlying object (e.g. CREATE INDEX owner.obj_name ON new_owner.new_name) obj_privilege - Object privileges granted/revoked by a GRANT/REVOKE statement sys_privilege - System privileges granted/revoked by a GRANT/REVOKE statement admin_option - If role/sys_priv was granted WITH ADMIN OPTON, grantee - The name of the grantee specified in a GRANT/REVOKE statement audit_option - Auditing option set with the audit statement ses_actions - Session summary. A string of 12 characters, one for each action type, in this order: Alter, Audit, Comment, Delete, Grant, Index, Insert, Lock, Rename, Select, Update, Flashback. Values: "-" = None, "S" = Success, "F" = Failure, "B" = Both logoff_time - Timestamp for user logoff logoff_lread - Logical reads for the session logoff_pread - Physical reads for the session logoff_lwrite - Logical writes for the session logoff_dlock - Deadlocks detected during the session comment_text - Text comment on the audit trail entry. Also indicates how the user was authenticated sessionid - Numeric ID for each Oracle session Copyright 2014 by Cameron Larner Page 17 of 28
18 entryid - Numeric ID for each audit trail entry in the session statementid - Numeric ID for each statement run (a statement may cause many actions) returncode - Oracle error code generated by the action. Zero if the action succeeded priv_used - System privilege used to execute the action client_id - Client identifier in each Oracle session econtext_id - Execution Context Identifier for each action session_cpu - Amount of cpu time used by each Oracle session extended_timestamp - Timestamp of the creation of audit trail entry (Timestamp of the user's logon for entries created by AUDIT SESSION) in session's time zone proxy_sessionid - Proxy session serial number, if enterprise user has logged through proxy mechanism global_uid - Global user identifier for the user, if the user had logged in as enterprise user instance_number - Instance number as specified in the initialization parameter file ''init.ora'' os_process - Operating System process identifier of the Oracle server process transactionid - Transaction identifier of the transaction in which the object is accessed or modified SCN - SCN (System Change Number) of the query sql_bind - Bind variable data of the query sql_text - SQL text of the query obj_edition_name - Edition containing audited object dbid - Database Identifier of the audited database Unfortunately, a few issues with SQL Audit limit its usefulness as a compliance audit tool for auditors. 1. The AUD$ audit table is owned by SYS, and readily accessible to database users with DBA grade privileges. This creates a segregation of duties red flag, when the purpose of using such a mechanism is to audit the very DBAs who control it. It is akin to the wolf guarding the hen house. 2. The output of such auditing is often too vague to harvest details that reveal the impact the audited transaction had on the database. For instance, when a transaction updates the payroll table, SQL audit does not provide which columns, if any, where changed, not to mention the before and after values of the changed columns. All it provides is the user who performed the PAYROLL table UPDATE statement, the statement executed and the date and time. 3. In Oracle 9i, the ability to narrow the audit scope to detailed data driven conditions is not available, thus creating audit data overload, making it difficult for auditors to sift through all the records and determine which Copyright 2014 by Cameron Larner Page 18 of 28
19 transactions are questionable, unauthorized, or fraudulent. However, in 10g and beyond, fine grained auditing extends Oracle standard auditing capabilities by allowing the user to audit actions based on user-defined predicates. 4. SQL Audit has been known to impact system performance, so scope limitation is essential. 5. Although SQL Audit does come packaged with database views designed to facilitate reporting, it provides no end user reporting. Auditor end users may not consider those views easy to understand. 6. It is based upon SQL command line generated mechanisms which require creation and maintenance by a DBA or an equivalent technically minded resource. Database Triggers Database Triggers are another mechanism that is standard functionality in an Oracle database, as we have discussed above. They come in two types, table level and system level, and can audit both DML and DDL transactions. They are well suited for auditing and/or financial controls enforcement for the following reasons: They provide complete flexibility of audit scope and criteria. One can specify the precise condition upon which to audit a transaction. They provide record level and table column details, capturing the before and after impact on data of SQL statements, and any session level details desired. They provide a real time mechanism to create audit trails, transmit alerts, and prevent transactions. They have access to useful Oracle and E-Business Suite session details of the transaction, like EBS Username and Responsibility, which can help identify the source of the transaction. They can capture context/lookup data from other associated tables (foreign key references) upon the triggering event, to incorporate the then current context in user-friendly form, so end user auditors can understand the audit record immediately without additional research. Unfortunately, they too, have disadvantages, namely: 1. They are SQL command line generated mechanisms which require creation and maintenance by a DBA or equivalently technically minded resource with PL/SQL programming experience. 2. They are not secure from manipulation by a user with SYS access. The triggers themselves can be easily disabled or dropped, or the custom audit trail table may be deleted or changed. 3. DDL type triggers, also called system triggers, are configurable via the _SYSTEM_TRIG_ENABLED database initialization parameter. The default for this parameter is TRUE, but it may be disabled by a DBA after database shutdown. Copyright 2014 by Cameron Larner Page 19 of 28
20 4. A trigger, if not properly optimized and tested, can degrade its table s transaction performance. On the other hand, Absolute Technologies, Inc. and other third party software vendors, consulting practices and customer project teams have eliminated some or all of the above-mentioned disadvantages and demonstrated that the trigger approach is very effective. These vendors offer packaged solutions ready for end users. Log Miner Audit initiatives can use Log Miner, another Oracle Database component. It was designed to provide information necessary for performing recovery operations. Essentially, Log Miner is a SQL command line mechanism which can review both online and archive redo log files of the database to extract the history of all transactions over a period of time for the given log file. It is well suited for auditing for the following reasons: Depending on your audit content requirements, it places little to no additional impact on database transactions, though it can require significant system resources and place an indirect load on transactions while a mining session is active. It can provide history for both DML and DDL transactions, starting in Oracle 9.2. It can provide before and after record level column details. Because it uses existing redo logs, it inherently has access to all transactions affecting the database. Therefore, one need not specify audit criteria until actively mining the logs. The audit criteria can be as wide or as narrow as the audit user desires. For example, all transactions made by a given user may be selected at once without specifying which objects were impacted. Alternatively, the audit user may select only those transactions affecting a given table, where a specified column was changed. If an organization retains the historical series of redo logs, it can use Log Miner to analyze the logs as part of the audit. However, the disadvantages are: 1. Log Miner is a SQL command line based mechanism, which requires the expertise of a DBA or like-minded individual to maintain. 2. It is not secure from the DBA and users with SYS access, the very users, in this case, it is intended to audit. 3. Although Log Miner is equipped with views to access logged data, it provides no end user reporting. Copyright 2014 by Cameron Larner Page 20 of 28
21 4. To access logged transactions, one must initiate a Log Miner session from the SQL command line, make SQL style inquiries, then terminate the session when finished. The resulting output of the ad hoc inquiries is not saved. Therefore, to maintain an audit trail based upon desired audit criteria, a mechanism must be developed to load the results of such inquiries into a custom audit table to support future end user reporting and audit trail retention requirements. 5. Although Log Miner provides a transaction timestamp, it only ensures that transactions are sequenced in the order in which they were executed, making it an unreliable option to detect exactly when a change occurred. 6. Since redo log files only contain the data necessary to rebuild the database, they contain only a few of the session details available to triggers that could be used to identify the source of the transaction. For instance, values for terminal, module, program, application user, and responsibility, to name a few, are not available. 7. Unlike triggers, Log Miner lacks the ability to capture values from foreign key referenced tables at the time of transaction. By the time a Log Miner inquiry is made, the relevant data in the foreign key tables may have changed. 8. Log Miner is somewhat complex and tedious to use, resource intensive to maintain, and prone to administrator mistakes because each time it is initialized, the admin user must have and accurately specify each redo log file required for the given audit period. 9. Log Miner does not provide real time transaction auditing, but rather an after the fact view into the redo log files. For this reason, it does not support real time alerts or transaction prevention, though theoretically it could be used to undo an undesired or unauthorized transaction in certain circumstances. 10. It does not audit database user connections to the database. The bottom line is that Log Miner is a good choice for ad hoc audit purposes when the database needs to be scrutinized for transactions meeting specific criteria during a specified timeframe. In order for it to be practical as on always on, continuous mechanism to support compliance and control auditing and reporting requirements, however, it must be incorporated into a larger, more sophisticated, end user application. Fortunately, there are a few third party software vendors who have developed such applications that use Log Miner. Fine Grained Auditing (FGA) Fine Grained Auditing is a mechanism designed to audit SELECT access to tables at the record and column level. It is deployed and maintained by a DBA using packaged Oracle procedures from the SQL command line. This may be an important component of your audit strategy if you must maintain an audit trail of users who actually view sensitive or restricted data. However, it does require DBA level expertise to deploy and maintain, and has a performance impact that must be scrutinized and optimized. Copyright 2014 by Cameron Larner Page 21 of 28
22 AUDIT_SYS_OPERATIONS In all of the above approaches to auditing the DBA, we have made it clear that they all embody a conflict of interest in that they generally require a DBA to audit a DBA. This may be less of an issue for organizations that have the resources to assign a distinct individual the segregated role of Security and Audit Administrator, whereby such an individual would be tasked to audit all database users and activity, DBAs included. Yet, even with such segregation of duties by such administrators, the necessity that one or any of the administrators have SYS access continues to present a conflict. It seems there will always be at least one individual with the master key. Fortunately, Oracle provides yet another mechanism to add a layer of security and auditability to the database with the initialization parameter called AUDIT_SYS_OPERATIONS. The parameter enables all SYS activity in the database to be logged to the operating system, indiscriminately and regardless of the setting of the AUDIT_TRAIL initialization parameter. For UNIX, the audit files are placed in the $ORACLE_HOME/rdbms/audit by default. However, the AUDIT_FILE_DEST initialization parameter may also be used to set an alternative directory based upon your operating system. To change the directory from the UNIX default, the oracle binary account must have write privileges to the directory specified, or Oracle will return an error at database startup. Unfortunately, for UNIX, this directory is owned by the oracle binary account user, and thus is often accessible to DBAs. Additionally, given it s flat file structure, audit records generated using this method are not readily accessible or reportable by would be audit end users. Yet, an OS level mechanism owned by root may be deployed to synchronize, copy or move, the files to another directory owned by root and not accessible to the oracle binary user, thereby securing them. The utilities called Rsync or Unison may be of use in this effort. Of course, the mention of the all-powerful OS root user begs the next security question, who audits root? That topic, however, is thankfully out of the scope of this whitepaper and will thus be left for others to address. Recommendations Now that the reader has covered all the basics, options and issues regarding the database, the DBA s role and dominion over it, and the different approaches to control and/or audit the DBA, we can provide a summary of recommendations directed at segregating the power of the DBA and generating a secure and systematic audit trail to prove it. Segregate DBA Duties and Access Given the powerful privileges of the DBA and his or her role in database auditing, it should now be clear that a single all-powerful DBA is a security red flag. If possible, the easiest way to lower the risk threshold is by creating at least two distinct, non-overlapping DBA positions in your organization. The first, we ll call the Database and Application Support DBA, who deals with all the normal database maintenance, trouble shooting, patching, upgrading and performance optimizing tasks and, the second, we ll call the Security, Access and Auditing DBA, who deals Copyright 2014 by Cameron Larner Page 22 of 28
23 with granting system access to all users and invoking, maintaining and securing the audit trail mechanisms. In this way, the organization creates a balance of powers across the DBAs. Although this step sets a good precedent in segregating the documented role of each DBA, there remains the technical challenge of allocating administration level access between the two roles. As we have pointed out earlier, the SYS user is all-powerful, so, at least one individual will retain that power. This opens a nice segue into our next recommendation. Activate AUDIT_SYS_OPERATIONS This database initialization parameter, when set to TRUE, audits all activities performed by SYS and writes them to operating system log files in the default or user specified directory. Therefore, this step provides us with a check against the SYS user. However, this measure is only effective if the SYS user has no access to the audit files. This, in turn, brings us to our next step. Protect the AUDIT_FILE_DEST Log Directory from the DBA Depending on your operating system, you may be able to specify an audit directory that is inaccessible to the DBA via the oracle binary account or otherwise. However, for UNIX servers, the audit directory must be accessible to Oracle, and thus the oracle binary account. Therefore, the SYS user, without even an OS account, can actually read, alter, and delete audit files from a SQL connection, if desired, given that SYS essentially connects to the OS as the oracle binary account. Alternatively, any user with access to the oracle binary account can access the audit files. Therefore, in UNIX, this measure will not be sufficient alone. To protect the audit files, the OS root user must implement some OS level mechanism to copy, move, or synchronize the files to a root only accessible directory for safekeeping. Limit Use of SYSDBA In an earlier section, we warned that the above-mentioned approach to audit SYS did not provide an end user friendly mechanism for access and reporting. Nevertheless, it may be the only realistic and readily available approach, especially if it is complemented with a strict and enforced policy of limited access to the database as SYSDBA. In other words, if you seldom allow users to log onto the database as SYS, then you will generate minimal SYS audit transactions upon which to report and review. If such transactions begin to increase or become overwhelming, you know you have an access issue to resolve. Limit OS User Assignment of the DBA Group Do not fall into the trap of simply focusing on security at the database level. Remember that any OS user assigned to the DBA group has direct access to SYS, no database password needed. Include the restriction of this group in your high priority list of strictly enforced policies. Utilize Named Accounts with the DBA Role To improve visibility and accountability to DBA users, avoid providing shared access to the Oracle default accounts, both at the OS and database levels. Each individual Copyright 2014 by Cameron Larner Page 23 of 28
24 connecting to the OS or the database should do so via their own, individually named account. This may add to user access maintenance, but it will greatly reduce the risk of fraud. Specifically, instead of allowing DBAs to login to SYS as SYSDBA, provide them with a named account granted the DBA role. As a policy, query the database periodically to review and manage which users have been granted the DBA role. SQL> select * 2 from dba_role_privs 3 where granted_role = 'DBA' 4 / GRANTEE GRANTED_ROLE ADM DEF SYS DBA YES YES SCOTT DBA NO YES CTXSYS DBA NO YES SYSTEM DBA YES YES For database startup and shutdown operations, have the DBA connect as SYSOPER instead of SYSDBA. SYSOPER connects as the PUBLIC user, and has no access to the Data Dictionary or other schema s objects. Define and Enforce a Password Security Policy To tighten security across all default and named account users, systematic mechanisms should be deployed to ensure that passwords are changed periodically, are hard to guess, and are not reused with frequency. Oracle provides user Profiles that may be created, assigned to users, and maintained by the security DBA to establish systematic password protection in the following areas: Account Locking Password Aging and Expiration Password History Password Complexity Verification Audit DBA Activity on Key Application Objects Deploy an audit trail mechanism that can provide detailed record and column level audit records, as well as the ability to define precise audit criteria by which to narrow the generated audit output to those transactions that have a greater probability of being unauthorized. Both database triggers and Log Miner may be effectively used, separately or together, to achieve this. However, in either case, expect a significant development effort to create a maintainable, secure, and end user accessible solution. Alternatively, look to packaged software solutions which have already built a framework around these utilities to deliver a turn key database auditing solution. Copyright 2014 by Cameron Larner Page 24 of 28
25 For organizations running E-Business Suite, special audit attention may be warranted when transactions are performed using the APPS user via a backend connection to the database using a SQL tool like SQL*Plus or Toad verses a front end secure connection authenticated by E-Business Suite. As the reader may remember, E- Business Suite connects the application user to the database as APPS. The ability to distinguish between backend and front end connections using APPS can help identify unauthorized backend usage of the APPS user by DBAs or other privileged staff. In this case, triggers are the better audit mechanism for accurately detecting the difference because they have access to the full range of session details during the transaction. They can more accurately identify if the APPS user is logged on via a front end connection as an application user, and determine the application user s name and responsibility. Log Miner fall short because it only provides limited session information, and does not provide application level user details. Monitor Key Initialization Parameters Finally yet importantly, verify the values for key database initialization parameters discussed in this paper periodically and each time the database is restarted. Some parameters require that the database be shutdown and restarted to take effect, others can be modified while the database is up and running. Here is a simple SQL script which will get the job done. select name, decode(type,1,'yes','no') Require_Restart, value from v$parameter where name in ( 'audit_sys_operations', 'audit_file_dest', 'audit_trail', 'remote_login_passwordfile', '07_dictionary_accessibility', '_system_trig_enabled') / Copyright 2014 by Cameron Larner Page 25 of 28
26 Conclusion Many may say because the DBA role is a trusted role and since a talented DBA can overcome almost any control and compliance restrictions, including an audit trail deployed to monitor DBAs, why try to control them? Whether DBAs can be controlled or not, the reality is that external auditors do scrutinize DBA access and request systematically proven controls before certifying compliance. Any particular approach may not be "bullet proof", but each hurdle or preventive measure deployed reduces the overall risk and will assist in achieving compliance in the eyes of auditors. DBA Fraud Segregate DBA Duties Limit SYSDBA Usage Audit Secure Access & Audit Trail Transactions Use Named Accounts Hurdles to Mitigate Risk Copyright 2014 by Cameron Larner Page 26 of 28
27 References Oracle Database Administrator's Guide Release 2 (9 and 10g) Oracle New Features in Oracle Database Reference (9 and 10g) Oracle Advanced Security Administrator's Guide Release 2 (9 and 10g) Oracle SQL Reference Guide (9 and 10g) Oracle Database Reference (9 and 10g) Oracle Application Developer's Guide Fundamentals (9 and 10g) Oracle Privacy Security Auditing by Arup Nanda & Donald K. Burleson Copyright 2014 by Cameron Larner Page 27 of 28
28 About the Author Cameron Larner has over 25 years of extensive Oracle Applications experience. After earning a B.S. degree in Economics at the University of California at Berkeley in 1988, he joined a dynamic and rapidly growing Oracle Corporation, holding positions in Finance, Information Systems, and Applications Development. In 1993, he left Oracle Corporation, to pursue an independent consulting role assisting companies implementing Oracle Applications, both domestically and internationally. In 1997, he founded Absolute Technologies, Inc., an Oracle Applications solutions provider. As president of Absolute, he has developed and released several packaged software extensions for Oracle E-Business Suite, licensing them to over 30 customers. The first solution, BBB Intelligence, was first released in It provides Oracle Order Management users with critical, yet underdeveloped, reporting for Bookings, Backlog, and Billings transactions. The second solution, Application Auditor, was first released in 2005 to help customers comply with Sarbanes-Oxley regulations. It provides an automated approach to audit database transactions which may affect financial reporting or setups, and user assignment to application functionality which violates user defined Segregation of Duties controls. In 2006, Absolute released SOD Violations Manager to specifically and efficiently identify and resolve user access violations to segregation of duties compliance policy. In 2012, Absolute released ProVision Responsibilities and ProVision Resources, both designed to automate the request, approval and provisioning processes of critical system and non-system based resources to individuals, both employees and affiliates. Mr. Larner continues to reside as president of Absolute, overseeing the design, development, support, marketing and sales of its software solutions. He has participated in user group activities throughout his career, and has written and presented several whitepapers on various subjects relating to Oracle Applications. About Absolute Technologies [ Absolute Technologies, Inc., helps companies increase user productivity through software extensions to Oracle E-Business Suite in the areas of GRC Auditing and Certification, Self Service Provisioning, and Revenue Visibility. Our innovative solutions dramatically simplify and automate critical business functions, reducing costs and time spent. We specialize in placing experts on the front line of support, so each customer gets fast and accurate resolution to their questions and issues. Founded in 1997 by professionals from Oracle, our commitment to affordable, easily deployable solutions supported by experts continues to drive our customers satisfaction and success. Our customers are diverse in size and industry, representing companies large and small. Absolute Technologies is an OAUG member and Oracle Partner headquartered in Palo Alto, California. Copyright 2014 by Cameron Larner Page 28 of 28
Oracle Database: SQL and PL/SQL Fundamentals NEW
Oracle University Contact Us: 001-855-844-3881 & 001-800-514-06-97 Oracle Database: SQL and PL/SQL Fundamentals NEW Duration: 5 Days What you will learn This Oracle Database: SQL and PL/SQL Fundamentals
Oracle. Brief Course Content This course can be done in modular form as per the detail below. ORA-1 Oracle Database 10g: SQL 4 Weeks 4000/-
Oracle Objective: Oracle has many advantages and features that makes it popular and thereby makes it as the world's largest enterprise software company. Oracle is used for almost all large application
Guide to Auditing and Logging in the Oracle E-Business Suite
Guide to Auditing and Logging in the Oracle E-Business Suite February 13, 2014 Stephen Kost Chief Technology Officer Integrigy Corporation Mike Miller Chief Security Officer Integrigy Corporation Phil
All About Oracle Auditing A White Paper February 2013
A White Paper February 2013 Sr Staff Consultant Database Specialists, Inc http:www.dbspecialists.com [email protected] Many organizations keep their most sensitive and valuable information in an
ORACLE DATABASE 11G: COMPLETE
ORACLE DATABASE 11G: COMPLETE 1. ORACLE DATABASE 11G: SQL FUNDAMENTALS I - SELF-STUDY COURSE a) Using SQL to Query Your Database Using SQL in Oracle Database 11g Retrieving, Restricting and Sorting Data
Security Analysis. Spoofing Oracle Session Information
November 12, 2006 Security Analysis Spoofing Oracle Session Information OVERVIEW INTRODUCTION Oracle Database session information includes database user name, operating system user name, host, terminal,
Oracle Database 12c: Admin, Install and Upgrade Accelerated
Oracle University Contact Us: + 38516306373 Oracle Database 12c: Admin, Install and Upgrade Accelerated Duration: 5 Days What you will learn This Oracle Database 12c: Admin, Install and Upgrade Accelerated
Monitoring Audit Trails Using Enterprise Manager
Enhancing Database Security: Monitoring Audit Trails Using Enterprise Manager Peter J. Magee, CDA SQRIBE Technologies Gail VanderKolk Reynolds & Reynolds Abstract Maintaining the security and integrity
Oracle 11g Database Administration
Oracle 11g Database Administration Part 1: Oracle 11g Administration Workshop I A. Exploring the Oracle Database Architecture 1. Oracle Database Architecture Overview 2. Interacting with an Oracle Database
Safeguard Sensitive Data in EBS: A Look at Oracle Database Vault, Transparent Data Encryption, and Data Masking. Lucy Feng
Delivering Oracle Success Safeguard Sensitive Data in EBS: A Look at Oracle Database Vault, Transparent Data Encryption, and Data Masking Lucy Feng RMOUG Training Days February 2012 About DBAK Oracle Solution
Restore and Recovery Tasks. Copyright 2009, Oracle. All rights reserved.
Restore and Recovery Tasks Objectives After completing this lesson, you should be able to: Describe the causes of file loss and determine the appropriate action Describe major recovery operations Back
Oracle E-Business Suite APPS, SYSADMIN, and oracle Securing Generic Privileged Accounts. Stephen Kost Chief Technology Officer Integrigy Corporation
Oracle E-Business Suite APPS, SYSADMIN, and oracle Securing Generic Privileged Accounts May 15, 2014 Mike Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer Integrigy
Oracle Audit in a Nutshell - Database Audit but how?
Oracle Audit in a Nutshell - Database Audit but how? DOAG + SOUG Security-Lounge Stefan Oehrli Senior Consultant Discipline Manager Trivadis AG Basel 24. April 2012 BASEL BERN LAUSANNE ZÜRICH DÜSSELDORF
Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals
Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals November 13, 2014 Michael Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer
Chapter 6: Developing a Proper Audit Trail for your EBS Environment
Chapter 6: Developing a Proper Audit Trail for your EBS Environment In Chapter 2, we looked at the inherent architecture of EBS and some implications regarding the lack of a detailed audit trail. Three
All About Oracle Auditing Everything You Need to Know
All About Oracle Auditing Everything You Need to Know Mike Dean Database Specialists, Inc. www.dbspecialists.com RMOUG February 12, 2013 Who Am I? Oracle 11g Certified Professional DBA More than 15 years
UNIVERSITY AUTHORISED EDUCATION PARTNER (WDP)
Audience Data Warehouse Administrator Database Administrators Database Designers Support Engineer Technical Administrator Related Training Required Prerequisites Working knowledge of SQL and use of PL/SQL
D12C-AIU Oracle Database 12c: Admin, Install and Upgrade Accelerated NEW
D12C-AIU Oracle Database 12c: Admin, Install and Upgrade Accelerated NEW Duration: 5 Days What you will learn This Oracle Database 12c: Admin, Install and Upgrade Accelerated course will provide you with
Database Programming with PL/SQL: Learning Objectives
Database Programming with PL/SQL: Learning Objectives This course covers PL/SQL, a procedural language extension to SQL. Through an innovative project-based approach, students learn procedural logic constructs
Oracle Database: Introduction to SQL
Oracle University Contact Us: 1.800.529.0165 Oracle Database: Introduction to SQL Duration: 5 Days What you will learn This Oracle Database: Introduction to SQL training teaches you how to write subqueries,
CHAPTER 2 DATABASE MANAGEMENT SYSTEM AND SECURITY
CHAPTER 2 DATABASE MANAGEMENT SYSTEM AND SECURITY 2.1 Introduction In this chapter, I am going to introduce Database Management Systems (DBMS) and the Structured Query Language (SQL), its syntax and usage.
Oracle(PL/SQL) Training
Oracle(PL/SQL) Training 30 Days Course Description: This course is designed for people who have worked with other relational databases and have knowledge of SQL, another course, called Introduction to
Oracle Database: Introduction to SQL
Oracle University Contact Us: 1.800.529.0165 Oracle Database: Introduction to SQL Duration: 5 Days What you will learn View a newer version of this course This Oracle Database: Introduction to SQL training
Securing Oracle E-Business Suite in the Cloud
Securing Oracle E-Business Suite in the Cloud November 18, 2015 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy Corporation Agenda The
Database Auditing - 1 - Report submitted by: D. Murali Krishna - 200505017 S.M Siva Rama Krishna - 200505015
- 1 - Database Auditing Report submitted by: D. Murali Krishna - 200505017 S.M Siva Rama Krishna - 200505015 Course : Information Security Audit and Assurance Faculty : Prof. Bruhadeshwar - 2 - Contents:
Oracle Database 11g: Administration Workshop I 11-2
Objectives This lesson is a starting point for learning about Oracle Security. Additional information is provided in the following documentation: Oracle Database Concepts 11g Release 1 (11.1) Oracle Database
Oracle Education @ USF
Oracle Education @ USF Oracle Education @ USF helps increase your employability and also trains and prepares you for the competitive job market at a much lower cost compared to Oracle University. Oracle
An Oracle White Paper August 2010. Oracle Database Auditing: Performance Guidelines
An Oracle White Paper August 2010 Oracle Database Auditing: Performance Guidelines Introduction Database auditing has become increasingly important as threats to applications become more sophisticated.
Fine Grained Auditing In Oracle 10G
Fine Grained Auditing In Oracle 10G Authored by: Meenakshi Srivastava ([email protected]) 2 Abstract The purpose of this document is to develop an understanding of Fine Grained Auditing(FGA)
Oracle Database 12c: Administration Workshop NEW
Oracle University Contact Us: 1.800.529.0165 Oracle Database 12c: Administration Workshop NEW Duration: 5 Days What you will learn The Oracle Database 12c: Administration Workshop will teach you about
COURCE TITLE DURATION. Oracle Database 11g: Administration Workshop I
COURCE TITLE DURATION DBA 11g Oracle Database 11g: Administration Workshop I 40 H. What you will learn: This course is designed to give students a firm foundation in basic administration of Oracle Database
PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:
A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine
Oracle Database: Introduction to SQL
Oracle University Contact Us: +381 11 2016811 Oracle Database: Introduction to SQL Duration: 5 Days What you will learn Understanding the basic concepts of relational databases ensure refined code by developers.
IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015. Integration Guide IBM
IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015 Integration Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 93.
Oracle Database 10g: Introduction to SQL
Oracle University Contact Us: 1.800.529.0165 Oracle Database 10g: Introduction to SQL Duration: 5 Days What you will learn This course offers students an introduction to Oracle Database 10g database technology.
IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM
IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016 Integration Guide IBM Note Before using this information and the product it supports, read the information
Oracle Database 12c: Introduction to SQL Ed 1.1
Oracle University Contact Us: 1.800.529.0165 Oracle Database 12c: Introduction to SQL Ed 1.1 Duration: 5 Days What you will learn This Oracle Database: Introduction to SQL training helps you write subqueries,
Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite. www.lepide.com/2020-suite/
Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite 7. Restrict access to cardholder data by business need to know PCI Article (PCI DSS 3) Report Mapping How we help 7.1 Limit access to system
Internal Controls, Fraud Detection and ERP
Internal Controls, Fraud Detection and ERP Recently the SEC adopted Section 404 of the Sarbanes Oxley Act. This law requires each annual report of a company to contain 1. A statement of management's responsibility
<Insert Picture Here> Oracle Database Security Overview
Oracle Database Security Overview Tammy Bednar Sr. Principal Product Manager [email protected] Data Security Challenges What to secure? Sensitive Data: Confidential, PII, regulatory
Logi Ad Hoc Reporting System Administration Guide
Logi Ad Hoc Reporting System Administration Guide Version 11.2 Last Updated: March 2014 Page 2 Table of Contents INTRODUCTION... 4 Target Audience... 4 Application Architecture... 5 Document Overview...
mission critical applications mission critical security Internal Auditor Primer: Oracle E-Business Suite Security Risks Primer
mission critical applications mission critical security Internal Auditor Primer: Oracle E-Business Suite Security Risks Primer Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director
Database security tutorial. Part I
Database security tutorial Part I Oracle Tutorials, June 4 th 2012 Daniel Gómez Blanco Agenda Authentication Roles and privileges Auditing 2 Authentication Basis of any security model Process of confirming
Oracle Database 10g: Program with PL/SQL
Oracle University Contact Us: Local: 1800 425 8877 Intl: +91 80 4108 4700 Oracle Database 10g: Program with PL/SQL Duration: 5 Days What you will learn This course introduces students to PL/SQL and helps
Oracle Database 11g SQL
AO3 - Version: 2 19 June 2016 Oracle Database 11g SQL Oracle Database 11g SQL AO3 - Version: 2 3 days Course Description: This course provides the essential SQL skills that allow developers to write queries
Oracle Database 12c: Administration Workshop NEW. Duration: 5 Days. What you will learn
Oracle Database 12c: Administration Workshop NEW Duration: 5 Days What you will learn The Oracle Database 12c: Administration Workshop will teach you about the Oracle Database architecture. You will discover
WHITE PAPER. Guide to Auditing and Logging in the Oracle E-Business Suite
WHITE PAPER Guide to Auditing and Logging in the Oracle E-Business Suite APRIL 2016 GUIDE TO AUDITING AND LOGGING IN THE ORACLE E-BUSINESS SUITE Version 1.0 March 2003 Version 1.1 February 2004 Version
Restoring To A Different Location With EBU And RMAN An AppsDBA Consulting White Paper
An White Paper Contents 1. OVERVIEW... 1 1.1 DEFINITIONS... 1 2. ENTERPRISE BACKUP UTILITY... 2 2.1 ARCHITECTURE... 2 2.1.1 Target Database... 2 2.1.2 Catalog... 2 2.1.3 Media Management Layer (MML)...
Oracle E-Business Suite: SQL Forms Risks and. Presented by: Jeffrey T. Hare, CPA CISA CIA
Oracle E-Business Suite: SQL Forms Risks and Controls Presented by: Jeffrey T. Hare, CPA CISA CIA Presentation Agenda Overview: Introductions Overall system risks Audit Trails Change Management Implementation
DBMS Questions. 3.) For which two constraints are indexes created when the constraint is added?
DBMS Questions 1.) Which type of file is part of the Oracle database? A.) B.) C.) D.) Control file Password file Parameter files Archived log files 2.) Which statements are use to UNLOCK the user? A.)
Teleran PCI Customer Case Study
Teleran PCI Customer Case Study Written by Director of Credit Card Systems for Large Credit Card Issuer Customer Case Study Summary A large credit card issuer was engaged in a Payment Card Industry Data
Oracle Database 11g: Security
Oracle University Contact Us: +27 (0)11 319-4111 Oracle Database 11g: Security Duration: 5 Days What you will learn In Oracle Database 11g: Security course students learn how to use Oracle database features
Oracle Database 11g: Administration Workshop I
Oracle University Entre em contato: 0800 891 6502 Oracle Database 11g: Administration Workshop I Duração: 5 Dias Objetivos do Curso This course is designed to give students a firm foundation in basic administration
How To Secure A Database From A Leaky, Unsecured, And Unpatched Server
InfoSphere Guardium Ingmārs Briedis ([email protected]) IBM SW solutions Agenda Any questions unresolved? The Guardium Architecture Integration with Existing Infrastructure Summary Any questions
Oracle Database: Program with PL/SQL
Oracle University Contact Us: +33 15 7602 081 Oracle Database: Program with PL/SQL Duration: 5 Days What you will learn This course is available in Training On Demand format This Oracle Database: Program
Oracle Database: Program with PL/SQL
Oracle University Contact Us: +52 1 55 8525 3225 Oracle Database: Program with PL/SQL Duration: 5 Days What you will learn View a newer version of this course This Oracle Database: Program with PL/SQL
SEER Enterprise Shared Database Administrator s Guide
SEER Enterprise Shared Database Administrator s Guide SEER for Software Release 8.2 SEER for IT Release 2.2 SEER for Hardware Release 7.3 March 2016 Galorath Incorporated Proprietary 1. INTRODUCTION...
Security and Control Issues within Relational Databases
Security and Control Issues within Relational Databases David C. Ogbolumani, CISA, CISSP, CIA, CISM Practice Manager Information Security Preview of Key Points The Database Environment Top Database Threats
Oracle Database 11g: Security Release 2
Oracle University Contact Us: 1.800.529.0165 Oracle Database 11g: Security Release 2 Duration: 5 Days What you will learn In this course, you'll learn how to use Oracle Database features to meet the security,
Oracle Database: SQL and PL/SQL Fundamentals
Oracle University Contact Us: +966 12 739 894 Oracle Database: SQL and PL/SQL Fundamentals Duration: 5 Days What you will learn This Oracle Database: SQL and PL/SQL Fundamentals training is designed to
Oracle Database: Program with PL/SQL
Oracle University Contact Us: 1.800.529.0165 Oracle Database: Program with PL/SQL Duration: 5 Days What you will learn View a newer version of this course /a/b/p/p/b/pulli/lili/lili/lili/lili/lili/lili/lili/lili/lili/lili/lili/li/ul/b/p/p/b/p/a/a/p/
WHITE PAPER. Guide to Auditing and Logging in the Oracle E-Business Suite
WHITE PAPER Guide to Auditing and Logging in the Oracle E-Business Suite FEBRUARY 2014 GUIDE TO AUDITING AND LOGGING IN THE ORACLE E-BUSINESS SUITE Version 1.0 March 2003 Version 1.1 February 2004 Version
Oracle Database: SQL and PL/SQL Fundamentals NEW
Oracle University Contact Us: + 38516306373 Oracle Database: SQL and PL/SQL Fundamentals NEW Duration: 5 Days What you will learn This Oracle Database: SQL and PL/SQL Fundamentals training delivers the
Monitor Oracle Event Logs using EventTracker
Monitor Oracle Event Logs using EventTracker Publication Date: Oct 23, 2013 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract The purpose of this paper is to highlight
Workflow Templates Library
Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security
Oracle Database: Program with PL/SQL
Oracle University Contact Us: 0845 777 7711 Oracle Database: Program with PL/SQL Duration: 5 Days What you will learn This course starts with an introduction to PL/SQL and proceeds to list the benefits
Oracle Database: Develop PL/SQL Program Units
Oracle University Contact Us: 1.800.529.0165 Oracle Database: Develop PL/SQL Program Units Duration: 3 Days What you will learn This Oracle Database: Develop PL/SQL Program Units course is designed for
SPICE EduGuide EG0015 Security of Administrative Accounts
This SPICE EduGuide applies to HSC information systems, specifically Administrative login accounts; (aka Admin accounts) and the faculty, staff and students who use them. Admin accounts are logon IDs and
Oracle security done right. Secure database access on the (unix and linux) operating system level.
Oracle security done right. Secure database access on the (unix and linux) operating system level. By Frits Hoogland, VX Company Security is an important part of modern database administration, and is
RMAN What is Rman Why use Rman Understanding The Rman Architecture Taking Backup in Non archive Backup Mode Taking Backup in archive Mode
RMAN - What is Rman - Why use Rman - Understanding The Rman Architecture - Taking Backup in Non archive Backup Mode - Taking Backup in archive Mode - Enhancement in 10g For Rman - 9i Enhancement For Rman
Division of IT Security Best Practices for Database Management Systems
Division of IT Security Best Practices for Database Management Systems 1. Protect Sensitive Data 1.1. Label objects containing or having dedicated access to sensitive data. 1.1.1. All new SCHEMA/DATABASES
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may
State of Wisconsin Database Hosting Services Roles and Responsibilities
State of Wisconsin Hosting Services oles and esponsibilities Document evision History (Major Post Publishing evisions Only) Date Version reator Notes 12/9/2010 1.0 This document describes the Hosting Services
Virtual Private Database Features in Oracle 10g.
Virtual Private Database Features in Oracle 10g. SAGE Computing Services Customised Oracle Training Workshops and Consulting. Christopher Muir Senior Systems Consultant Agenda Modern security requirements
Oracle Database: SQL and PL/SQL Fundamentals
Oracle University Contact Us: 1.800.529.0165 Oracle Database: SQL and PL/SQL Fundamentals Duration: 5 Days What you will learn This course is designed to deliver the fundamentals of SQL and PL/SQL along
MyOra 3.0. User Guide. SQL Tool for Oracle. Jayam Systems, LLC
MyOra 3.0 SQL Tool for Oracle User Guide Jayam Systems, LLC Contents Features... 4 Connecting to the Database... 5 Login... 5 Login History... 6 Connection Indicator... 6 Closing the Connection... 7 SQL
Security Target for. Security Evaluations Oracle Corporation 500 Oracle Parkway Redwood Shores, CA 94065
Security Target for Oracle Database 11g Release 2 (11.2.0.2) Standard Edition and Standard Edition One October 2011 Version 1.3 Security Evaluations Oracle Corporation 500 Oracle Parkway Redwood Shores,
Oracle Database 11g: New Features for Administrators DBA Release 2
Oracle Database 11g: New Features for Administrators DBA Release 2 Duration: 5 Days What you will learn This Oracle Database 11g: New Features for Administrators DBA Release 2 training explores new change
Oracle 11g New Features - OCP Upgrade Exam
Oracle 11g New Features - OCP Upgrade Exam This course gives you the opportunity to learn about and practice with the new change management features and other key enhancements in Oracle Database 11g Release
Avatier Identity Management Suite
Avatier Identity Management Suite Migrating AIMS Configuration and Audit Log Data To Microsoft SQL Server Version 9 2603 Camino Ramon Suite 110 San Ramon, CA 94583 Phone: 800-609-8610 925-217-5170 FAX:
Top Ten Fraud Risks in the Oracle E Business Suite
Top Ten Fraud Risks in the Oracle E Business Suite Jeffrey T. Hare, CPA CISA CIA Industry Analyst, Author, Consultant ERP Risk Advisors Stephen Kost Chief Technology Officer Integrigy Corporation February
The safer, easier way to help you pass any IT exams. Exam : 1Z0-067. Upgrade Oracle9i/10g/11g OCA to Oracle Database 12c OCP.
http://www.51- pass.com Exam : 1Z0-067 Title : Upgrade Oracle9i/10g/11g OCA to Oracle Database 12c OCP Version : DEMO 1 / 7 1.Which two statements are true about scheduling operations in a pluggable database
Setting up SQL Translation Framework OBE for Database 12cR1
Setting up SQL Translation Framework OBE for Database 12cR1 Overview Purpose This tutorial shows you how to use have an environment ready to demo the new Oracle Database 12c feature, SQL Translation Framework,
Making Database Security an IT Security Priority
Sponsored by Oracle Making Database Security an IT Security Priority A SANS Whitepaper November 2009 Written by Tanya Baccam Security Strategy Overview Why a Database Security Strategy? Making Databases
Credit Cards and Oracle E-Business Suite Security and PCI Compliance Issues
Credit Cards and Oracle E-Business Suite Security and PCI Compliance Issues August 16, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy
RMAN BACKUP & RECOVERY. Recovery Manager. Veeratteshwaran Sridhar
RMAN Recovery Manager BACKUP & RECOVERY Veeratteshwaran Sridhar Why Backup & Recovery? The purpose of a backup and recovery strategy is to protect the database against data loss and reconstruct the database
ORACLE USER PRODUCTIVITY KIT USAGE TRACKING ADMINISTRATION & REPORTING RELEASE 3.6 PART NO. E17087-01
ORACLE USER PRODUCTIVITY KIT USAGE TRACKING ADMINISTRATION & REPORTING RELEASE 3.6 PART NO. E17087-01 FEBRUARY 2010 COPYRIGHT Copyright 1998, 2009, Oracle and/or its affiliates. All rights reserved. Part
An Oracle White Paper June 2014. Security and the Oracle Database Cloud Service
An Oracle White Paper June 2014 Security and the Oracle Database Cloud Service 1 Table of Contents Overview... 3 Security architecture... 4 User areas... 4 Accounts... 4 Identity Domains... 4 Database
enicq 5 System Administrator s Guide
Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide
DriveLock and Windows 8
Why alone is not enough CenterTools Software GmbH 2013 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
Auditing Data Access Without Bringing Your Database To Its Knees
Auditing Data Access Without Bringing Your Database To Its Knees Black Hat USA 2006 August 1-3 Kimber Spradlin, CISA, CISSP, CPA Sr. Manager Security Solutions Dale Brocklehurst Sr. Sales Consultant Agenda
VMware Mirage Web Manager Guide
Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
Oracle Database 11g: Administration Workshop I Release 2
Oracle University Contact Us: 1.800.529.0165 Oracle Database 11g: Administration Workshop I Release 2 Duration: 5 Days What you will learn This Oracle Database 11g: Administration Workshop I Release 2
MS-40074: Microsoft SQL Server 2014 for Oracle DBAs
MS-40074: Microsoft SQL Server 2014 for Oracle DBAs Description This four-day instructor-led course provides students with the knowledge and skills to capitalize on their skills and experience as an Oracle
Oracle Database Links Part 2 - Distributed Transactions Written and presented by Joel Goodman October 15th 2009
Oracle Database Links Part 2 - Distributed Transactions Written and presented by Joel Goodman October 15th 2009 About Me Email: [email protected] Blog: dbatrain.wordpress.com Application Development
HP Service Manager. Software Version: 9.40 For the supported Windows and Linux operating systems. Application Setup help topics for printing
HP Service Manager Software Version: 9.40 For the supported Windows and Linux operating systems Application Setup help topics for printing Document Release Date: December 2014 Software Release Date: December
Oracle Database 11g: Administration Workshop I Release 2
Oracle University Contact Us: (+202) 35 35 02 54 Oracle Database 11g: Administration Workshop I Release 2 Duration: 5 Days What you will learn This course is designed to give you a firm foundation in basic
Audit Logging. Overall Goals
Audit Logging Security Training by Arctec Group (www.arctecgroup.net) 1 Overall Goals Building Visibility In Audit Logging Domain Model 2 1 Authentication, Authorization, and Auditing 3 4 2 5 6 3 Auditing
MyOra 3.5. User Guide. SQL Tool for Oracle. Kris Murthy
MyOra 3.5 SQL Tool for Oracle User Guide Kris Murthy Contents Features... 4 Connecting to the Database... 5 Login... 5 Login History... 6 Connection Indicator... 6 Closing the Connection... 7 SQL Editor...
