How To Ensure Data Security On Anor
|
|
|
- Daniela Parker
- 5 years ago
- Views:
Transcription
1 Oracle Database Security How much would you like? DOAG + SOUG Security-Lounge Stefan Oehrli Senior Consultant Discipline Manager Trivadis AG Basel 24. April 2012 BASEL BERN LAUSANNE ZÜRICH DÜSSELDORF FRANKFURT A.M. FREIBURG I.BR. HAMBURG MÜNCHEN STUTTGART WIEN
2 Trivadis facts & figures 11 Trivadis locations with more than 600 employees Hamburg Financially independent and sustainably profitable Key figures 2011 Dusseldorf ~200 employees Revenue CHF 104 / EUR 84 Mio. Frankfurt Services for more than 800 clients in over 1,900 projects Stuttgart 200 Service Level Agreements Freiburg Munich Vienna More than 4,000 training participants Basel Bern Zurich Lausanne ~380 employees ~30 employees Research and development budget: CHF 5.0 / EUR 4 Mio. 2
3 Why we are special Customer-specific solution competence and vendor independence Technology competence Solution and integration expertise offers substantiated techniques and skills as well as self-developed approaches guarantees repeatable quality and a safe execution offers more than 18 years of expertise in Oracle and Microsoft has its own Technology Center and strives for technological excellence has a wide and cross-sectorial customer basis and more than 1900 projects every year spanning a broad range of goals, complexity and corresponding framework conditions Combines technological expertise with an understanding of the specific business needs of the client Support for the entire IT project lifecycle has a modular portfolio of services for the entire IT project lifecycle provides the appropriate combination of solutions and services for every level of maturity 3
4 AGENDA 1. Overview 2. Risk analysis and categorization 3. Risk Matrix 4. Risk minimization 5. Review
5 Overview Oracle offers several features within the database to ensure data security VPD, ASO, TDE, DBV, AV,... J Some of the feature is only available in Enterprise Edition, some require additional license There are also other Oracle and external products And of course third party solutions But what do I need for my database? And how many different databases do I have?
6 Overview
7 Overview Do you know you data? respectively its sensitivity? How much of our data is public, confidential, internal or secret? Like this? or more like this?
8 AGENDA 1. Overview 2. Risk analysis and categorization 3. Risk Matrix 4. Risk minimization 5. Review
9 Risk analysis and categorization The data owner (application owner) must know and define the sensitiveness of his data It is not always an easy job, everybody think his data is the most important and most critical, Therefore it is advisable to perform a risk analysis At Trivadis we use the Trivadis First Cut Risk analysis Easy to perform In "Business-Language" Risks are identified quickly Does not go into the technical details, but afterwards its clear on what to focus
10 Risk analysis and categorization Topics that are questioned (i.e.): Are personal data or sensitive personal data processed (Healthcare, Religion,...)? What happens in case of loss of confidentiality? (competitive disadvantages, business damage, disorder of public trust, liability,...)? What happens in case of loss of integrity? (wrong management decisions, additional costs, business interruption)? What happens in case of loss availability (recover data and service,...)? The data owner is rating all points in a 3-point scale (from not critical over critical to business critical) It is also possible to deposit values for material damage that often helps in assessing
11 Risk analysis and categorization
12 Risk analysis and categorization
13 Classification By the risk analysis is the classification of data (-bases) into security classes possible Typically one uses the following classes: Public (data is visible over the internet but definitely not manipulated) Internal (data can be accessed by any employee) Confidential (data can only be accessed by defined circle of employees) Secret (If they are lost, this could endanger the existence of the company, e.g. the recipe for Coca Cola)
14 AGENDA 1. Overview 2. Risk analysis and categorization 3. Risk Matrix 4. Risk minimization 5. Review
15 Risk matrix (1) Head of the matrix defines the classes and risks which have to be reduced
16 Risk matrix (2) In the further steps security measures are defined which are used to reduce the risks
17 Risk matrix (3) It is important to define the consequences (and costs)
18 AGENDA 1. Overview 2. Risk analysis and categorization 3. Risk Matrix 4. Risk minimization 5. Review
19 Risk minimization - Authentication All user are using a common / application user Each user has his own personal account In the database and on the OS There is a central account management Manage a central directory Login through directory - E.g. Enterprise Users Or provisioning of user into the databases - E.g. CUA4DB (Centralized User Administration for Database Strong authentication (more than just username and password) Risk Attention: Authentication is the basis for everything else!
20 Risk minimization - Passwords There is no password rule A password complexity rule exists Minimal length Numbers, special characters,. Common words are not allowed All passwords must be changed on a regular basis Passwords may not used again Passwords must distinct from the old passwords Not interactive unused accounts are locked (or an impossible password is set) Also valid for oracle default schema s Risk
21 Risk minimization Data access User can access / modify any data User can only access data for which the have privileges (on table level): Role concept No public grants Risk User can only access data for which the have privileges (on table level (on row level): Virtual Private Database (Security Policies) Label Security Administrators do only have limited access Database Vault Encryption before data is stored in the database (Encrypted by the application or a encryption appliance like SafeNet) Tokenization
22 Risk minimization Data access - Comments It important to see how somebody has gained access to data : Table owner Direct grant on the table Over a role (cascades) Public grants Over a view or a package Using system privileges (select any table) Using high privileges / roles (DBA, SYSDBA) Do not forget role changes (trainees do have the most rights...) Use tools to analyze data access an privileges e.g. Oracle Identity Analytics
23 Risk minimization - Auditing No auditing Only basic operations are audited (e.g.. connect) Audit critical operations Use of ANY privileges User- and role management SYSDBA access Access on critical objects are monitored Critical objects are defined Rules when access must be audited are defined Central Auditing Oracle Audit Vault SYSLOG Auditing McAfee Database Activity Monitoring Risk
24 Risk minimization - Auditing - Comments It s common to audit only certain conditions Use Fine Grained Auditing (FGA) Regularly review audit data Reporting functionality when using a central auditing tool (Oracle Audit Vault) Interpretation / Tools when using SYSLOG server Manuel reporting if audit is stored in a database Raise alarms for problems / violations! And how long should the audit data be kept? Defined retention policies for raw data and reports Automated Housekeeping Archiving
25 Risk minimization - Patching Security patch s and patch sets are not installed Regularly installation of patch sets ( ) Regularly of CPUs or PSUs Prompt installation of all CPUs resp. PSUs E.g. max. one month after CPUs has been released Virtual Patching McAfee Database Activity Monitoring (additional protection for CPU/PSU) Risk
26 Risk minimization Oracle Software & Optionen Any Software and options are installed Only required options are installed in the database Critical e.g. Java, XDB,... Only required software is installed in the oracle home Required options are harden No public grants (regularly done by default for some options) Role concept, grant privileges to user only if the require the functionality Network Callouts (Mail, TCP,...) are limited Risk
27 Risk minimization Parameter Initialization parameter can have any values Define a baseline for security critical parameters, eg 07_DICTIONARY_ACCESSIBILITY AUDIT_SYS_OPERATIONS, AUDIT_TRAIL DB_BLOCK_CHECKING REMOTE_OS_AUTHENT REMOTE_OS_ROLES UTL_FILE_DIR Enforce baseline Exceptions must be (eg required by an application) justified and documented Risk
28 Risk minimization more options Network: Database Firewall (Oracle, Imperva) Encryption (Advanced Security Option) Zoning concept Release Management: Who can when access as schema owner (which should be locked anyway) Documentation of processes Anonymizing test data (Oracle Data Masking) Protect data files, exports, dumps and backup with encryption
29 AGENDA 1. Overview 2. Risk analysis and categorization 3. Risk Matrix 4. Risk minimization 5. Review
30 Verify the defined security measures Compliance with the defined security measures should be checked on a regular basis or even automatically Tor this purpose Trivadis offers TVDSecAudit
31 Conclusion: Security must be implemented comprehensively in many places. First of all you have to know what you need This is not always easy... But we are happy to assist you J
32 ? Questions?
33 THANK YOU. Trivadis AG Stefan Oehrli Europa-Strasse 5 CH-8152 Glattbrugg Tel [email protected] BASEL BERN LAUSANNE ZÜRICH DÜSSELDORF FRANKFURT A.M. FREIBURG I.BR. HAMBURG MÜNCHEN STUTTGART WIEN
Oracle Audit in a Nutshell - Database Audit but how?
Oracle Audit in a Nutshell - Database Audit but how? DOAG + SOUG Security-Lounge Stefan Oehrli Senior Consultant Discipline Manager Trivadis AG Basel 24. April 2012 BASEL BERN LAUSANNE ZÜRICH DÜSSELDORF
Audit Management with DBMS_AUDIT_MGMT
Audit Management with DBMS_AUDIT_MGMT Stefan Oehrli Senior Consultant & Discipline Manager Security [email protected] Zürich, March 24, 2011 Basel Baden Brugg Bern Lausanne Zürich Düsseldorf Frankfurt/M.
Using TimesTen between your Application and Oracle. between your Application and Oracle. DOAG Conference 2011
DOAG Conference 2011 Using TimesTen between your Application and Oracle Jan Ott, Roland Stirnimann Senior Consultants Trivadis AG BASEL 1 BERN LAUSANNE ZÜRICH DÜSSELDORF FRANKFURT A.M. FREIBURG I.BR. HAMBURG
Oracle Database 11g: Security Release 2. Course Topics. Introduction to Database Security. Choosing Security Solutions
Oracle Database 11g: Security Release 2 In this course, students learn how they can use Oracle Database features to meet the security, privacy and compliance requirements of their organization. The current
D50323GC20 Oracle Database 11g: Security Release 2
D50323GC20 Oracle Database 11g: Security Release 2 What you will learn In this course, you'll learn how to use Oracle Database features to meet the security, privacy and compliance requirements of their
Oracle Database 11g: Security Release 2
Oracle University Contact Us: 1.800.529.0165 Oracle Database 11g: Security Release 2 Duration: 5 Days What you will learn In this course, you'll learn how to use Oracle Database features to meet the security,
Securing Data in Oracle Database 12c
Securing Data in Oracle Database 12c Thomas Kyte http://asktom.oracle.com/ Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
Oracle E-Business Suite APPS, SYSADMIN, and oracle Securing Generic Privileged Accounts. Stephen Kost Chief Technology Officer Integrigy Corporation
Oracle E-Business Suite APPS, SYSADMIN, and oracle Securing Generic Privileged Accounts May 15, 2014 Mike Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer Integrigy
Sichere Software- Entwicklung für Java Entwickler
Sichere Software- Entwicklung für Java Entwickler Dominik Schadow Senior Consultant Trivadis GmbH 05/09/2012 BASEL BERN LAUSANNE ZÜRICH DÜSSELDORF FRANKFURT A.M. FREIBURG I.BR. HAMBURG MÜNCHEN STUTTGART
Oracle Database 11g: Security. What you will learn:
Oracle Database 11g: Security What you will learn: In Oracle Database 11g: Security course students learn how they can use Oracle database features to meet the security, privacy and compliance requirements
Securing Oracle E-Business Suite in the Cloud
Securing Oracle E-Business Suite in the Cloud November 18, 2015 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy Corporation Agenda The
Secure Test Data Management with ORACLE Data Masking
Secure Test Data Management with ORACLE Data Masking Michael Schellin Consultant, OCM DOAG Regio München, Dec 2009 Baden Basel Bern Brugg Lausanne Zürich Düsseldorf Frankfurt/M. Freiburg i. Br. Hamburg
Safeguard Sensitive Data in EBS: A Look at Oracle Database Vault, Transparent Data Encryption, and Data Masking. Lucy Feng
Delivering Oracle Success Safeguard Sensitive Data in EBS: A Look at Oracle Database Vault, Transparent Data Encryption, and Data Masking Lucy Feng RMOUG Training Days February 2012 About DBAK Oracle Solution
<Insert Picture Here> Oracle Database Security Overview
Oracle Database Security Overview Tammy Bednar Sr. Principal Product Manager [email protected] Data Security Challenges What to secure? Sensitive Data: Confidential, PII, regulatory
<Insert Picture Here> How to protect sensitive data, challenges & risks
How to protect sensitive data, challenges & risks Lars Klumpes CISSP Security Strategy Consultant EMEA Disclaimer The following is intended to outline our general product direction.
Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals
Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals November 13, 2014 Michael Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer
Oracle Database Security Solutions
Oracle Database Security Solutions Eric Cheung Senior Manager, Technology Sales Consulting [email protected] May 2008 Key Drivers for Data Security Privacy and Compliance Sarbanes-Oxley
SOUG-SIG Data Replication With Oracle GoldenGate Looking Behind The Scenes Robert Bialek Principal Consultant Partner
SOUG-SIG Data Replication With Oracle GoldenGate Looking Behind The Scenes Robert Bialek Principal Consultant Partner BASEL BERN BRUGG DÜSSELDORF FRANKFURT A.M. FREIBURG I.BR. GENEVA HAMBURG COPENHAGEN
Oracle EXAM - 1Z0-528. Oracle Database 11g Security Essentials. Buy Full Product. http://www.examskey.com/1z0-528.html
Oracle EXAM - 1Z0-528 Oracle Database 11g Security Essentials Buy Full Product http://www.examskey.com/1z0-528.html Examskey Oracle 1Z0-528 exam demo product is here for you to test the quality of the
Cloud aber Sicher. Florian van Keulen. Senior Consultant Cloud & Security
Cloud aber Sicher Florian van Keulen Senior Consultant Cloud & Security BASEL BERN BRUGG DÜSSELDORF FRANKFURT A.M. FREIBURG I.BR. GENEVA HAMBURG COPENHAGEN LAUSANNE MUNICH STUTTGART VIENNA ZURICH Since
Fixing Common Problems in Data Storage - A Review
Security Design For Your Database Applications Least privilege, data and ownership 1 Legal Notice Security Design For Your Database Applications Published by PeteFinnigan.com Limited 9 Beech Grove Acomb
<Insert Picture Here> Oracle Database Vault
Oracle Database Vault Kamal Tbeileh Senior Principal Product Manager, Database Security The following is intended to outline our general product direction. It is intended for information
Oracle Database 11g Security Essentials
Oracle 1z0-528 Oracle Database 11g Security Essentials Version: 4.2 QUESTION NO: 1 Oracle 1z0-528 Exam Which of the following tasks is the first task to perform when implementing Oracle Database Vault?
GE Measurement & Control. Cyber Security for NEI 08-09
GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4
Oracle Database 11g: Security
Oracle University Contact Us: +27 (0)11 319-4111 Oracle Database 11g: Security Duration: 5 Days What you will learn In Oracle Database 11g: Security course students learn how to use Oracle database features
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information Proteggere i dati direttamente nel database Una proposta tecnologica Angelo Maria Bosis Sales Consulting Senior Manager
Obtaining Value from Your Database Activity Monitoring (DAM) Solution
Obtaining Value from Your Database Activity Monitoring (DAM) Solution September 23, 2015 Mike Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer Integrigy Corporation
Big Data. Marriage of RDBMS-DWH and Hadoop & Co. Author: Jan Ott Trivadis AG. 2014 Trivadis. Big Data - Marriage of RDBMS-DWH and Hadoop & Co.
Big Data Marriage of RDBMS-DWH and Hadoop & Co. Author: Jan Ott Trivadis AG BASEL BERN LAUSANNE ZÜRICH DÜSSELDORF FRANKFURT A.M. FREIBURG I.BR. HAMBURG MÜNCHEN STUTTGART WIEN 1 Mit über 600 IT- und Fachexperten
Microsoft Azure. IaaS Networking Storage. Stefan Geiger Gerry Keune. @trivadis.com
Microsoft Azure IaaS Networking Storage Stefan Geiger Gerry Keune @trivadis.com BASEL BERN LAUSANNE ZÜRICH DÜSSELDORF FRANKFURT A.M. FREIBURG I.BR. HAMBURG MÜNCHEN STUTTGART WIEN 1 12.06.2014 Agenda 1.
Guide to Auditing and Logging in the Oracle E-Business Suite
Guide to Auditing and Logging in the Oracle E-Business Suite February 13, 2014 Stephen Kost Chief Technology Officer Integrigy Corporation Mike Miller Chief Security Officer Integrigy Corporation Phil
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
Oracle Database Auditing Performance Guidelines
Oracle Database Auditing Performance Guidelines Anjo Miguel Consultant July 2011 Enabling Oracle Database Audit could potentially have an impact on database performance, but how much? Is it measurable?
Credit Cards and Oracle E-Business Suite Security and PCI Compliance Issues
Credit Cards and Oracle E-Business Suite Security and PCI Compliance Issues August 16, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy
Oracle Audit Vault and Database Firewall
Oracle Audit Vault and Database Firewall Angelo Maria Bosis Sales Consulting Director Oracle Italia Billions of Database Records Breached Globally 97% of Breaches Were Avoidable with
www.xceedium.com 2: Do not use vendor-supplied defaults for system passwords and other security parameters
2: Do not use vendor-supplied defaults for system passwords and other security parameters 2.1: Always change vendor-supplied defaults and remove or disable unnecessary default accounts before installing
Oracle Database 10g: Security Release 2
Oracle University Chiamaci: 800 672 253 Oracle Database 10g: Security Release 2 Duration: 4 Days Description In this course, the students learn how they can use Oracle database features to meet the security
Copyright 2013, Oracle and/or its affiliates. All rights reserved.
1 Security Inside-Out with Oracle Database 12c Denise Mallin, CISSP Oracle Enterprise Architect - Security The following is intended to outline our general product direction. It is intended for information
Enabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1
Enabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1 Agenda Introduction PAGE 2 Organization Speakers Security Spectrum Information Security Spectrum Oracle Identity Management
Tech Titans: Lock it down, securing your Costpoint 7 deployments. Drew Roman, IT Solutions Director WJ Technologies L.L.C. GC-518
Tech Titans: Lock it down, securing your Costpoint 7 deployments Drew Roman, IT Solutions Director WJ Technologies L.L.C. GC-518 Agenda Agenda Overview The Basics of Secure Deployment Database Application
Oracle Database 11g: Security
Oracle University Entre em contato: 0800 891 6502 Oracle Database 11g: Security Duração: 5 Dias Objetivos do Curso In Oracle Database 11g: Security course students learn how they can use Oracle database
Credit Cards and Oracle: How to Comply with PCI DSS. Stephen Kost Integrigy Corporation Session #600
Credit Cards and Oracle: How to Comply with PCI DSS Stephen Kost Integrigy Corporation Session #600 Background Speaker Stephen Kost CTO and Founder 16 years working with Oracle 12 years focused on Oracle
New Oracle 12c Security Features Oracle E-Business Suite Perspective
New Oracle 12c Security Features Oracle E-Business Suite Perspective December 18, 2014 Michael Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer Integrigy Corporation
Oracle 1Z0-528 Exam Questions & Answers
Oracle 1Z0-528 Exam Questions & Answers Number: 1Z0-528 Passing Score: 660 Time Limit: 120 min File Version: 21.1 http://www.gratisexam.com/ Oracle 1Z0-528 Exam Questions & Answers Exam Name: Oracle Database
SonicWALL PCI 1.1 Implementation Guide
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
How To Secure A Database From A Leaky, Unsecured, And Unpatched Server
InfoSphere Guardium Ingmārs Briedis ([email protected]) IBM SW solutions Agenda Any questions unresolved? The Guardium Architecture Integration with Existing Infrastructure Summary Any questions
Database security tutorial. Part I
Database security tutorial Part I Oracle Tutorials, June 4 th 2012 Daniel Gómez Blanco Agenda Authentication Roles and privileges Auditing 2 Authentication Basis of any security model Process of confirming
Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
Making Database Security an IT Security Priority
Sponsored by Oracle Making Database Security an IT Security Priority A SANS Whitepaper November 2009 Written by Tanya Baccam Security Strategy Overview Why a Database Security Strategy? Making Databases
Oracle Data Guard Fast Start Failover understood!
Oracle Data Guard Fast Start Failover understood! Dr. Martin Wunderli http://www.trivadis.com Principal Consultant Partner Basel Baden Bern Lausanne Zurich Düsseldorf Frankfurt/M. Freiburg i. Br. Hamburg
MySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
Protecting Sensitive Data Reducing Risk with Oracle Database Security
Protecting Sensitive Data Reducing Risk with Oracle Database Security [email protected] Information Security Architect Agenda 1 2 Anatomy of an Attack Three Steps to Securing an Oracle Database
Oracle vs. SQL Server. Simon Pane & Steve Recsky First4 Database Partners Inc. September 20, 2012
Oracle vs. SQL Server Simon Pane & Steve Recsky First4 Database Partners Inc. September 20, 2012 Agenda Discussions on the various advantages and disadvantages of one platform vs. the other For each topic,
Identity Management and Access Control
and Access Control Marek Rychly [email protected] Strathmore University, @ilabafrica & Brno University of Technology, Faculty of Information Technology Enterprise Security 7 December 2015 Marek Rychly
WELCOME. Backup of OracleVM. Martin Bracher SOUG-Vortrag 21. März 2013
WELCOME Martin Bracher SOUG-Vortrag 21. März 2013 BASEL BERN LAUSANNE ZÜRICH DÜSSELDORF FRANKFURT A.M. FREIBURG I.BR. HAMBURG MÜNCHEN STUTTGART WIEN 1 Oracle VM infrastructure components Two Components
Copyright 2013, Oracle and/or its affiliates. All rights reserved.
1 Solutions for securing and auditing Oracle database Edgars Ruņģis Technology Consultant Why Are Databases Vulnerable? 80% of IT Security Programs Don t Address Database Security Forrester Research Enterprises
Oracle Security on Windows
Introduction - commercial slide. UKOUG Windows SIG, September 25 th 2007 Oracle Security on Windows By Pete Finnigan Written Friday, 07 September 2007 Founded February 2003 CEO Pete Finnigan Clients UK,
Secondary DMZ: DMZ (2)
Secondary DMZ: DMZ (2) Demilitarized zone (DMZ): From a computer security perspective DMZ is a physical and/ or logical sub-network that resides on the perimeter network, facing an un-trusted network or
Division of IT Security Best Practices for Database Management Systems
Division of IT Security Best Practices for Database Management Systems 1. Protect Sensitive Data 1.1. Label objects containing or having dedicated access to sensitive data. 1.1.1. All new SCHEMA/DATABASES
OTM Security in an Evolving Threat Landscape. Anoop Jangamakote Ryan Haney
OTM Security in an Evolving Threat Landscape Anoop Jangamakote Ryan Haney Introduction Table of Contents 1. What is Information Security? Why is it important? 2. Introduction to OTM Security 3. OTM Threat
Eurobackup PRO Exchange Databases Backup Best Practices
P a g e 1 Eurobackup PRO Exchange Databases Backup Best Practices P a g e 2 Contents Introduction... 3 How to configure Exchange database backup with Eurobackup PRO... 4 Daily backup of Exchange databases...
Web Plus Security Features and Recommendations
Web Plus Security Features and Recommendations (Based on Web Plus Version 3.x) Centers for Disease Control and Prevention National Center for Chronic Disease Prevention and Health Promotion Division of
Database Security. Oracle Database 12c - New Features and Planning Now
Database Security Oracle Database 12c - New Features and Planning Now Michelle Malcher Oracle ACE Director Data Services Team Lead at DRW IOUG, Board of Directors Author, Oracle Database Administration
An Oracle White Paper August 2010. Oracle Database Auditing: Performance Guidelines
An Oracle White Paper August 2010 Oracle Database Auditing: Performance Guidelines Introduction Database auditing has become increasingly important as threats to applications become more sophisticated.
With Great Power comes Great Responsibility: Managing Privileged Users
With Great Power comes Great Responsibility: Managing Privileged Users Darren Harmer Senior Systems Engineer Agenda What is a Privileged User Privileged User Why is it important? Security Intelligence
Database Security & Compliance with Audit Vault and Database Firewall. Pierre Leon Database Security
Database Security & Compliance with Audit Vault and Database Firewall Pierre Leon Database Security 1 Topics Encryption Authentication Authorising highly privileged users Access control by data classification
Palo Open Source BI Suite
Palo Open Source BI Suite Matthias Wilharm BI Consultant [email protected] Winterthur, 24.09.2008 Basel Baden Bern Lausanne Zurich Düsseldorf Frankfurt/M. Freiburg i. Br. Hamburg Munich Stuttgart
PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:
A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine
Oracle Database Security
Oracle Database Security Paul Needham, Senior Director, Product Management, Database Security Target of Data Breaches 2010 Data Breach Investigations Report Type Category % Breaches
SQL Server Hardening
Considerations, page 1 SQL Server 2008 R2 Security Considerations, page 4 Considerations Top SQL Hardening Considerations Top SQL Hardening considerations: 1 Do not install SQL Server on an Active Directory
Mitigating Risks and Monitoring Activity for Database Security
The Essentials Series: Role of Database Activity Monitoring in Database Security Mitigating Risks and Monitoring Activity for Database Security sponsored by by Dan Sullivan Mi tigating Risks and Monitoring
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
Modern PL/SQL Code Checking and Dependency Analysis
Modern PL/SQL Code Checking and Dependency Analysis Philipp Salvisberg Senior Principal Consultant BASEL BERN BRUGG LAUSANNE ZÜRICH DÜSSELDORF FRANKFURT A.M. FREIBURG I.BR. HAMBURG MUNICH STUTTGART VIENNA
Copyright 2013, Oracle and/or its affiliates. All rights reserved.
1 The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any
Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV. Nadav Elkabets Presale Consultant
Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV Nadav Elkabets Presale Consultant Protecting Your Data Encrypt Your Data 1 ProtectFile StorageSecure ProtectDB ProtectV Databases File
Security and Control Issues within Relational Databases
Security and Control Issues within Relational Databases David C. Ogbolumani, CISA, CISSP, CIA, CISM Practice Manager Information Security Preview of Key Points The Database Environment Top Database Threats
Protecting Data Assets and Reducing Risk
Protecting Data Assets and Reducing Risk Michelle Malcher Enterprise Database Security Oracle Open World 2014 2014 Wells Fargo Bank, N.A. All rights reserved. For public use. 1 Introduction Michelle Malcher
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services
Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services February 30, 2012 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation
IT Security Procedure
IT Security Procedure 1. Purpose This Procedure outlines the process for appropriate security measures throughout the West Coast District Health Board (WCDHB) Information Systems. 2. Application This Procedure
How To Secure The Org Database
Oracle Database Security Checklist An Oracle White Paper June 2008 Oracle Database Security Checklist Protecting the database environment... 3 Install only what is required... 3 Lock and expire default
Full Compliance Contents
Full Compliance for and EU Annex 11 With the regulation support of Contents 1. Introduction 2 2. The regulations 2 3. FDA 3 Subpart B Electronic records 3 Subpart C Electronic Signatures 9 4. EU GMP Annex
by New Media Solutions 37 Walnut Street Wellesley, MA 02481 p 781-235-0128 f 781-235-9408 www.avitage.com Avitage IT Infrastructure Security Document
Avitage IT Infrastructure Security Document The purpose of this document is to detail the IT infrastructure security policies that are in place for the software and services that are hosted by Avitage.
Database Assessment. Vulnerability Assessment Course
Database Assessment Vulnerability Assessment Course All materials are licensed under a Creative Commons Share Alike license. http://creativecommons.org/licenses/by-sa/3.0/ 2 Agenda Introduction Configuration
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
WELCOME. Where and When should I use the Oracle Service Bus (OSB) Guido Schmutz. UKOUG Conference 2012 04.12.2012
WELCOME Where and When should I use the Oracle Bus () Guido Schmutz UKOUG Conference 2012 04.12.2012 BASEL BERN LAUSANNE ZÜRICH DÜSSELDORF FRANKFURT A.M. FREIBURG I.BR. HAMBURG MÜNCHEN STUTTGART WIEN 1
IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015. Integration Guide IBM
IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015 Integration Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 93.
User Management Guide
AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
Compliance and Security Information Management for PCI DSS Requirement 10 and Beyond
RSA Solution Brief Compliance and Security Information Management for PCI DSS Requirement 10 and Beyond Through Requirement 10, PCI DSS specifically requires that merchants, banks and payment processors
Comprehensive Approach to Database Security
Comprehensive Approach to Database Security [email protected] NYOUG 2008 1 What will I discuss today Identify Threats, Vulnerabilities and Risk to Databases Analyze the drivers for Database Security Identify
