Oracle Database Security. Paul Needham Senior Director, Product Management Database Security



Similar documents
Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Protecting Sensitive Data Reducing Risk with Oracle Database Security

Securing Data in Oracle Database 12c

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Oracle Database Security

Complete Database Security. Thomas Kyte

Oracle Identity Management Securing The New Digital Experience

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

<Insert Picture Here> Oracle Database Security Overview

Hayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks

Database Security & Compliance with Audit Vault and Database Firewall. Pierre Leon Database Security

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

Oracle Audit Vault and Database Firewall. Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

Managing Oracle E-Business Suite Security

Database Security Questions HOUG Fehér Lajos. Copyright 2015, Oracle and/or its affiliates. All rights reserved.

Oracle Audit Vault and Database Firewall

Oracle Database Security Solutions

Copyright 2014 Oracle and/or its affiliates. All rights reserved.

<Insert Picture Here> Oracle Database Vault

Data Security: Strategy and Tactics for Success

An Oracle White Paper June Security and Compliance with Oracle Database 12c

Safeguard Sensitive Data in EBS: A Look at Oracle Database Vault, Transparent Data Encryption, and Data Masking. Lucy Feng

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Oracle Database 11g: Security Release 2. Course Topics. Introduction to Database Security. Choosing Security Solutions

Oracle Database Security Services

An Oracle White Paper June Oracle Database 11g: Cost-Effective Solutions for Security and Compliance

D50323GC20 Oracle Database 11g: Security Release 2

An Oracle White Paper April Oracle Audit Vault and Database Firewall

Oracle Database 12c Plug In. Switch On. Get SMART.

Oracle Database 11g: Security. What you will learn:

Oracle Database 11g: Security Release 2

An Oracle White Paper April Security and Compliance with Oracle Database 12c

Cost Effective Data Management for Oracle Utilities Applications

Why Standardize on Oracle Database 11g Next Generation Database Management. Thomas Kyte

Oracle 1Z0-528 Exam Questions & Answers

Security Compliance and Data Governance: Dual problems, single solution CON8015

Oracle Database 12c. Peter Schmidt Systemberater Oracle Deutschland BV & CO KG

Oracle Database 11g Security Essentials

Oracle Database 11g: Security

Obtaining Value from Your Database Activity Monitoring (DAM) Solution

New Oracle 12c Security Features Oracle E-Business Suite Perspective

Cybersecurity Health Check At A Glance

MySQL Security: Best Practices

Protecting Data Assets and Reducing Risk

Oracle Database 12c Security and Compliance O R A C L E W H I T E P A P E R F E B R U A R Y

<Insert Picture Here> Application Change Management and Data Masking

Best Practices Report

Oracle Database Public Cloud Services

An Oracle White Paper January Oracle Database Firewall

Oracle EXAM - 1Z Oracle Database 11g Security Essentials. Buy Full Product.

An Oracle White Paper June Encryption and Redaction in Oracle Database 12c with Oracle Advanced Security

Oracle Information Security Visioni

Installing and Configuring Guardium, ODF, and OAV

Database Security. Oracle Database 12c - New Features and Planning Now

Oracle Enterprise Manager 12c New Capabilities for the DBA. Charlie Garry, Director, Product Management Oracle Server Technologies

Application Testing Suite Overview

<Insert Picture Here> How to protect sensitive data, challenges & risks

Management Packs for Database

Making Database Security an IT Security Priority

Guardium Change Auditing System (CAS)

05.0 Application Development

BM482E Introduction to Computer Security

Oracle Database 11g: Security

Oracle Database Cloud Services OGh DBA & Middleware Day

FIFTH EDITION. Oracle Essentials. Rick Greenwald, Robert Stackowiak, and. Jonathan Stern O'REILLY" Tokyo. Koln Sebastopol. Cambridge Farnham.

<Insert Picture Here> Oracle Database Directions Fred Louis Principal Sales Consultant Ohio Valley Region

Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

PCI Requirements Coverage Summary Table

How To Secure A Database From A Leaky, Unsecured, And Unpatched Server

IBM Software InfoSphere Guardium. Planning a data security and auditing deployment for Hadoop

Oracle Reference Architecture and Oracle Cloud

Intelligent Security Design, Development and Acquisition

Why Add Data Masking to Your IBM DB2 Application Environment

PCI Requirements Coverage Summary Table

An Oracle White Paper January Oracle Database Firewall

Auditing Data Access Without Bringing Your Database To Its Knees

Oracle Privileged Account Manager 11gR2. Karsten Müller-Corbach

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Transcription:

Oracle Database Security Paul Needham Senior Director, Product Management Database Security

Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle s products remains at the sole discretion of Oracle. 2

MAR 14 JAN 14 DEC 13 SEP 13 OCT 13 FEB 14 3

Considerations for Maximum Security Preventive and Detective Controls 4

SECURITY Maximum Security for Critical Infrastructure PREVENTIVE DETECTIVE ADMINISTRATIVE Encryption & Redaction Activity Monitoring Key Management Masking & Subsetting Database Firewall Privilege & Data Discovery Privileged User Controls Auditing & Reporting Configuration Management 5

Oracle Database Security Innovations Privilege Analysis Data Redaction Real Application Security Conditional and Unified Auditing SQL Grammar based Database Firewall Privileged User Controls SQL Command Controls At-source Data Masking Sensitive Data Discovery Transparent Data Encryption Label-based Access Control Virtual Private Database 6

SECURITY Maximum Security for Critical Infrastructure PREVENTIVE DETECTIVE ADMINISTRATIVE Encryption & Redaction Activity Monitoring Key Management Masking & Subsetting Database Firewall Privilege & Data Discovery Privileged User Controls Auditing & Reporting Configuration Management 7

Encryption is the Foundation Preventive Control for Oracle Databases Advanced Security Transparent data encryption Prevents access to data at rest Requires no application changes Built-in two-tier key management Near Zero overhead with hardware Integrations with Oracle technologies e.g. Exadata, Advanced Compression, ASM, GoldenGate, DataPump, etc. Applications Disk Backups Exports Off-Site Facilities 8

Redaction of Sensitive Data Displayed Preventive Control for Oracle Database 12c and 11g (11.2.0.4) Advanced Security Real-time redaction based upon user, IP, app context, session factors, Applies to columns on tables/views Full/partial, random/fixed redaction Transparent to typical applications No impact on operational activities Credit Card Numbers 4451-2172-9841-4368 5106-8395-2095-5938 7830-0032-0294-1827 Redaction Policy xxxx-xxxx-xxxx-4368 4451-2172-9841-4368 Call Center Application Billing Department 9

Masking Data for Non-Production Use Preventive Control for Oracle Databases Data Masking Replace sensitive application data Referential integrity detected/preserved Extensible template library and formats Application templates available Support for masking data in non-oracle databases LAST_NAME SSN SALARY AGUILAR 203-33-3234 40,000 BENSON 323-22-2943 60,000 Production Test Dev Non-Production LAST_NAME SSN SALARY ANSKEKSL 323 23-1111 60,000 BKJHHEIEDK 252-34-1345 40,000 Production 10

Preventive Controls Inside the Oracle Database Preventive Control for Oracle Databases Database Vault Realms around sensitive schemas or objects Restrict DBA access to realm data Support multi-factor SQL command rules Enforce separation of duties Block threats targeting privileged DB accounts Restrict all access unless explicitly authorized with Mandatory Realms (New) Applications Finance HR Procurement Security DBA HR Admin select * from procurement.bids DBA 11

Oracle Typical Real Application Application Security Security with APEX HR Application Business Logic Identity & Policy Store CRM Application Business Logic Light-weight Sessions Access Control Policy Users and Roles Security Direct, enforced on Uncontrolled direct Access connections 12

SECURITY Maximum Security for Critical Infrastructure PREVENTIVE DETECTIVE ADMINISTRATIVE Encryption & Redaction Activity Monitoring Key Management Masking & Subsetting Database Firewall Privilege & Data Discovery Privileged User Controls Auditing & Reporting Configuration Management 13

New Conditional Auditing Framework Detective Control for Oracle Database 12c Database Auditing New policy and condition-based syntax What: CREATE, ALTER, ALL, Where: Set of Privileges, Roles, objects When: IP_ADDRESS!= 10.288.241.88 Exceptions: Except HR Group audit settings for manageability New roles: Audit Viewer and Audit Admin Out-of-box audit policies Single unified database audit trail 14

15

Audit, Report, and Alert in Real-Time Detective Control for Oracle and non-oracle Databases Audit Vault and Database Firewall Collect and Analyze audit/event data Centralized secure audit repository Consolidated multi-source reporting Out-of-the box and custom reports Conditional real-time alerts Fine-grain separation of duties Secure, scalable software appliance SOC Auditor Security Analyst! Alerts Reports Policies Audit Data & Event Logs Oracle Database Firewall OS & Storage Directories Databases Custom 16

Database Activity Monitoring and Firewall Detective Control for Oracle and non-oracle Databases Audit Vault and Database Firewall Monitor network traffic, detect and block unauthorized database activity Detect/stop SQL injection attacks Highly accurate SQL grammar analysis Allow Log Alert Substitute Block Whitelist approach to enforce activity Blacklists for managing high risk activity Scalable secure software appliance SQL Analysis Whitelist Blacklist Policy Factors 17

Oracle Audit Vault and Database Firewall Detective Controls Users Apps Database Firewall Events Alerts Reports Policies Audit Vault Audit Data & Event Logs Databases OS & Storage Directories Custom 18

SECURITY Maximum Security for Critical Infrastructure PREVENTIVE DETECTIVE ADMINISTRATIVE Encryption & Redaction Activity Monitoring Key Management Masking & Subsetting Database Firewall Privilege & Data Discovery Privileged User Controls Auditing & Reporting Configuration Management 19

Configuration Management Administrative Control for Oracle Databases Database Lifecycle Management Discover and classify databases Scan for best practices, standards Detect unauthorized changes Patching and provisioning Scan & Monitor Discover Patch 20

Discover Use of Privileges and Roles Administrative Control for Oracle Database 12c Database Vault Capture privileges used per session, across sessions, per specific context, or full database Report on privileges/roles used/unused Help revoke unnecessary privileges Enforce least privilege and reduce risks Increase security without disruption Create Drop Update DBA role APPADMIN role Privilege Analysis Unused Update APPADMIN 21

New Oracle Enterprise Manager Security Menu Oracle Database Vault Create Privilege Analysis policy and enable it 22

SECURITY Maximum Security for Critical Infrastructure PREVENTIVE DETECTIVE ADMINISTRATIVE Encryption & Redaction Activity Monitoring Key Management Masking & Subsetting Database Firewall Privilege & Data Discovery Privileged User Controls Auditing & Reporting Configuration Management 23

Oracle Database Maximum Security Architecture Advanced Security Data Redaction Users Database Vault Privilege Analysis Apps Alerts Database Firewall Events Data Masking Advanced Security TDE Database Vault Privileged User Controls Reports Policies Audit Vault Audit Data & Event Logs Databases OS & Storage Directories Custom 24

25