Securing Data in Oracle Database 12c



Similar documents
Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Oracle Database Security. Paul Needham Senior Director, Product Management Database Security

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Protecting Sensitive Data Reducing Risk with Oracle Database Security

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Copyright 2014 Oracle and/or its affiliates. All rights reserved.

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Oracle Database Security

Database Security & Compliance with Audit Vault and Database Firewall. Pierre Leon Database Security

Security It s an ecosystem thing

Complete Database Security. Thomas Kyte

Database Security Questions HOUG Fehér Lajos. Copyright 2015, Oracle and/or its affiliates. All rights reserved.

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

Hayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Oracle Database 11g: Security. What you will learn:

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

<Insert Picture Here> Oracle Database Security Overview

Oracle Database 11g: Security Release 2. Course Topics. Introduction to Database Security. Choosing Security Solutions

Oracle Identity Management Securing The New Digital Experience

Oracle Database 11g: Security

D50323GC20 Oracle Database 11g: Security Release 2

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Oracle Database 11g: Security Release 2

<Insert Picture Here> Oracle Database Vault

Oracle 1Z0-528 Exam Questions & Answers

Oracle Audit Vault and Database Firewall. Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Oracle Database Security Solutions

MySQL Security: Best Practices

<Insert Picture Here> PCI DSS-Payment Card Industry. Security Summit Master Principal Sales Consultant - Alfredo Valenza - Oracle Italia

Oracle Database 12c. Peter Schmidt Systemberater Oracle Deutschland BV & CO KG

Oracle Database 11g: Security

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

An Oracle White Paper June Oracle Database 11g: Cost-Effective Solutions for Security and Compliance

Managing Oracle E-Business Suite Security

Oracle Database Security Services

An Oracle White Paper June Security and Compliance with Oracle Database 12c

Security Compliance and Data Governance: Dual problems, single solution CON8015

Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Oracle Database Cloud Services OGh DBA & Middleware Day

<Insert Picture Here> Managing Storage in Private Clouds with Oracle Cloud File System OOW 2011 presentation

Oracle Database 11g Security Essentials

Safeguard Sensitive Data in EBS: A Look at Oracle Database Vault, Transparent Data Encryption, and Data Masking. Lucy Feng

Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules

An Oracle White Paper April Oracle Audit Vault and Database Firewall

Oracle Audit Vault and Database Firewall

Copyright 2014 Oracle and/or its affiliates. All rights reserved.

Oracle Database Public Cloud Services

Oracle Database 12c Security and Compliance O R A C L E W H I T E P A P E R F E B R U A R Y

Oracle Privileged Account Manager 11gR2. Karsten Müller-Corbach

CSN38:Tracking Privileged User Access within an ArcSight Logger and SIEM Environment Philip Lieberman, President and CEO

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Protecting Data Assets and Reducing Risk

Making Database Security an IT Security Priority

An Oracle White Paper April Security and Compliance with Oracle Database 12c

Oracle EXAM - 1Z Oracle Database 11g Security Essentials. Buy Full Product.

Forthcoming EU Data Protection Law

Database Security. Oracle Database 12c - New Features and Planning Now

Data Security: Strategy and Tactics for Success

Oracle Database 12c Plug In. Switch On. Get SMART.

Managed Cloud Database Service

Installing and Configuring Guardium, ODF, and OAV

An Oracle White Paper July Oracle ACFS

Agenda. Sedat Zencirci Technology Sales Consultancy Manager. Oracle Technology Stack. Business Requirements and Oracle offerings

Cybersecurity Health Check At A Glance

Top Five Database Security and Compliance Resolutions for 2008

Oracle Database 10g: Security Release 2

FIFTH EDITION. Oracle Essentials. Rick Greenwald, Robert Stackowiak, and. Jonathan Stern O'REILLY" Tokyo. Koln Sebastopol. Cambridge Farnham.

BM482E Introduction to Computer Security

What s New with Oracle Database 12c on Windows On-Premises and in the Cloud

McAfee Database Security. Dan Sarel, VP Database Security Products

All Things Oracle Database Encryption

Oracle Database 10g Security

Secret Server Qualys Integration Guide

An Oracle White Paper July Sustainable Compliance for the Payment Card Industry Data Security Standard

Auditing Data Access Without Bringing Your Database To Its Knees

New Oracle 12c Security Features Oracle E-Business Suite Perspective

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER

An Oracle White Paper June Encryption and Redaction in Oracle Database 12c with Oracle Advanced Security

Obtaining Value from Your Database Activity Monitoring (DAM) Solution

Oracle Health Sciences Network. 1 Introduction. 1.1 General Security Principles

Stronger database security is needed to accommodate new requirements

GoodData Corporation Security White Paper

Alliance Key Manager Solution Brief

ORACLE DATABASE 10G ENTERPRISE EDITION

<Insert Picture Here> Oracle Cloud Storage. Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska

Data-Centric Security vs. Database-Level Security

IT Security & Compliance. On Time. On Budget. On Demand.

Encrypting Sensitive Data in Oracle E-Business Suite

Hands-on practices and available demonstrations help you Database 12c to secure your data center. Develop an under Manager Cloud Control and other too

Why Standardize on Oracle Database 11g Next Generation Database Management. Thomas Kyte

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Next Generation Solutions for Indian Railways. Sundar Ram VP, Technology Sales Consulting

Oracle White Paper October Oracle Advanced Security with Oracle Database 11g Release 2

Addressing Cyber Security in Oracle Utilities Applications

Transcription:

Securing Data in Oracle Database 12c Thomas Kyte http://asktom.oracle.com/

Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle s products remains at the sole discretion of Oracle.

Oracle Database Security 30 years of Innovation Oracle Key Vault Data Redaction Oracle Audit Vault Oracle Database Vault DB Security Evaluation #19 Transparent Data Encryption EM Configuration Scanning Fine Grained Auditing (9i) Secure application roles Client Identifier / Identity propagation Oracle Label Security Proxy authentication Enterprise User Security Global roles Virtual Private Database (8i) 1977 Database Encryption API Strong authentication (PKI, Kerberos, RADIUS) Native Network Encryption (Oracle7) Database Auditing Government customer 2014

Security Oracle is very secure Therefore, we don t need to be, it just happens Besides, it is not as important as having pretty screens after all. And if we add it later, I m sure it ll be non-intrusive And very performant And easy to do

Oracle Maximum Security Architecture Core Components Advanced Security Data Redaction Users Database Vault Privilege Analysis Apps Alerts Database Firewall Events Data Masking TDE Database Vault Privileged User Controls Reports Policies Audit Vault Audit Data & Event Logs Databases OS & Storage Directories Custom

Program Agenda 1 2 3 4 5 6 Transparent Data Encryption (TDE), Key Vault Privilege Analysis Database Vault Database Firewall Data Redaction, Data Masking, Fine Grained Access Control Audit Vault

Program Agenda 1 2 3 4 5 6 Transparent Data Encryption (TDE), Key Vault Privilege Analysis Database Vault Database Firewall Data Redaction, Data Masking, Fine Grained Access Control Audit Vault

Transparent Data Encryption (TDE) Preventive Control for Oracle Databases Advanced Security SQL Interface to key management *New* FIPS 140-2 mode (dbfips_140) Encrypts tablespaces or columns to secure data at rest Requires no application changes Near Zero overhead with hardware Integrated with Oracle DB technologies Log files, Compression, ASM, DataPump Applications Disk Backups Exports Off-Site Facilities

The Challenges of Key Management Management Proliferation of encryption wallets and keys Authorized sharing of keys Key availability, retention, and recovery Custody of keys and key storage files Regulations Physical separation of keys from encrypted data Periodic key rotations Monitoring and auditing of keys Long-term retention of keys and encrypted data 11

Key Management with Oracle Key Vault Centrally manage and share keys, secrets, Oracle wallets, Java keystores, and more Optimized for Oracle stack (Database, Middleware, Systems) and Advanced Security TDE Robust, secure, and standards compliant (OASIS KMIP) key manager 12

Oracle Key Vault High-Level Architecture Middleware Standby Databases Administration Console, Alerts, Reports Servers Secure Backups = Oracle Wallet = Java Keystore = Certificate = Server Password = Credential File 13

Oracle Wallet Scenarios Oracle Advanced Security Transparent Data Encryption (TDE) RAC Data Guard Multiple DBs Same Machine GoldenGate Single Instance 14

Oracle Advanced Security Transparent Data Encryption (TDE) Direct Connection Scenarios RAC Data Guard Multiple DBs Same Machine GoldenGate Single Instance 15

Oracle Key Vault Software Appliance Platform Turnkey solution based on hardened stack Includes Oracle Database and security options Open x86-64 hardware to choose from Easy to install, configure, deploy, and patch Separation of duties for administrative users Full auditing, preconfigured reports, and alerts 16

Program Agenda 1 2 3 4 5 6 Transparent Data Encryption (TDE), Key Vault Privilege Analysis Database Vault Database Firewall Data Redaction, Data Masking, Fine Grained Access Control Audit Vault

Privilege Analysis You want to use the concept of least privileges Problem: You don t know what privileges they really need, maybe just give them SELECT ANY TABLE That is not very secure and hard to justify to an auditor

Discover Use of Privileges and Roles Administrative Control for Oracle Database 12c Privilege Analysis Turn on privilege capture mode Report on actual privileges and roles used in the database Helps revoke unnecessary privileges Enforce least privilege and reduce risks Increase security without disruption Create Drop Update DBA role APPADMIN role Unused Update APPADMIN

Program Agenda 1 2 3 4 5 6 Transparent Data Encryption (TDE), Key Vault Privilege Analysis Database Vault Database Firewall Data Redaction, Data Masking, Fine Grained Access Control Audit Vault

Oracle Database Vault Privileged User and Operational Controls Procurement Application HR Finance select * from finance.customers Limit default powers of privileged users Enforce policy rules inside the database Violations audited, secured and sent to Oracle Audit Vault No application changes required DBA

Oracle Database Vault Privileged User and Operational Controls Procurement Application HR Finance select * from finance.customers Limit default powers of privileged users Enforce policy rules inside the database Violations audited, secured and sent to Oracle Audit Vault No application changes required DBA

Oracle Database Vault Realms Block DBA Privileges Block privileged database users from accessing application data Block threats from compromised privileged accounts Block application users from accessing other applications inside the same database Securely consolidate and use private or public cloud computing

Oracle Database Vault 12c New Mandatory Realms Block Direct Object Grants Provide additional security check before allowing authorized users to access application data Enable application DBA control by allowing patching while denying access to sensitive application data Freeze security settings identified by Privilege Analysis: roles, grants, Temporarily seal off entire application data in the event of a cyber threat

Program Agenda 1 2 3 4 5 6 Transparent Data Encryption (TDE), Key Vault Privilege Analysis Database Vault Database Firewall Data Redaction, Data Masking, Fine Grained Access Control Audit Vault

Database Activity Monitoring and Firewall Detective Control for Oracle and non-oracle Databases Oracle Audit Vault and Database Firewall Monitors and logs database network traffic Detects and blocks unauthorized database activity including SQL injection attacks Highly accurate SQL grammar analysis Users Apps Allow Log Alert Substitute Block Whitelist approach to enforce activity Blacklists for managing high risk activity Scalable secure software appliance SQL Analysis Whitelist Blacklist Policy Factors

Program Agenda 1 2 3 4 5 6 Transparent Data Encryption (TDE), Key Vault Privilege Analysis Database Vault Database Firewall Data Redaction, Data Masking, Fine Grained Access Control Audit Vault

Oracle Data Redaction Redacting Sensitive Data for Applications Policy Credit Card # 4451-2172-9841-4368 5106-6342-4881-5211 4891-3311-0090-5055 On-the-fly redaction based upon user name, IP address, application context, and other factors Transparent, consistent enforcement in the database Minimal impact on production work loads Call Centers Decision Support Systems Systems with PII, PHI, PCI data

Supported Transformations Full Redaction Partial Redaction RegExp Redaction Random Redaction Original Redacted 05/24/75 01/01/01 11 Rock Bluff Dr. XXXXXXX 068-35-2299 ***-**-2299 D1L86YZV8K D1******8K 94025-2450 94025-[hidden] jim.lee@acme.com [redacted]@acme.com 4022-5231-5531-9855 4943-6344-0547-0110 09/30/73 11/14/85

Introducing Oracle Data Masking and Subsetting Pack Reduces Risk in Sharing by Obfuscating or Removing Sensitive Data Discover Sensitive Data NAME SALARY Mask Data Using Format Library AGUILAR 50135.56 BENSON 35789.89 CHANDRA 60765.23 DONNER 103456.82 01001011001010100100 10010010010010010010 01001000100101010010 NAME SALARY AGUILAR 35676.24 CHANDRA 76546.89 Subset Based on Conditions/Goal Retain Application Integrity Mask/Subset in Export or on Staging 30

Program Agenda 1 2 3 4 5 6 Transparent Data Encryption (TDE), Key Vault Privilege Analysis Database Vault Database Firewall Data Redaction, Data Masking, Fine Grained Access Control Audit Vault

Conditional Auditing Framework Detective Control for Oracle Database 12c Database Auditing New policy- and condition-based syntax What: CREATE, ALTER, ALL, Where: Set of Privileges, Roles, objects When: IP_ADDRESS!= 10.288.241.88 Exceptions: Except HR Group audit settings for manageability New roles: Audit Viewer and Audit Admin Out-of-box audit policies Single unified database audit trail IF ACTIONS CREATE AND IP_ADDRESS = THEN THEN

Oracle Audit Vault Detective Control for Databases, Operating Systems, Database Firewall Firewall Events Alerts! Built-in Reports Custom Reports Policies AUDIT VAULT AUDIT DATA Custom

Program Agenda 1 2 3 4 5 6 Transparent Data Encryption (TDE), Key Vault Privilege Analysis Database Vault Database Firewall Data Redaction, Data Masking, Fine Grained Access Control Audit Vault