Protecting Sensitive Data Reducing Risk with Oracle Database Security



Similar documents
Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Oracle Database Security. Paul Needham Senior Director, Product Management Database Security

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Oracle Database Security

Securing Data in Oracle Database 12c

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

Complete Database Security. Thomas Kyte

Oracle Identity Management Securing The New Digital Experience

<Insert Picture Here> Oracle Database Security Overview

Hayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks

Database Security & Compliance with Audit Vault and Database Firewall. Pierre Leon Database Security

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Oracle Audit Vault and Database Firewall

Security Compliance and Data Governance: Dual problems, single solution CON8015

Database Security Questions HOUG Fehér Lajos. Copyright 2015, Oracle and/or its affiliates. All rights reserved.

Oracle Audit Vault and Database Firewall. Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

Managing Oracle E-Business Suite Security

Data Security: Strategy and Tactics for Success

An Oracle White Paper June Oracle Database 11g: Cost-Effective Solutions for Security and Compliance

Oracle Database Security Solutions

Oracle Database Security Services

With Great Power comes Great Responsibility: Managing Privileged Users

<Insert Picture Here> Oracle Database Vault

05.0 Application Development

Making Database Security an IT Security Priority

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan

Seven Things To Consider When Evaluating Privileged Account Security Solutions

Protecting Your Organisation from Targeted Cyber Intrusion

MySQL Security: Best Practices

The Cloud App Visibility Blindspot

Copyright 2014 Oracle and/or its affiliates. All rights reserved.

An Oracle White Paper April Security and Compliance with Oracle Database 12c

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

Enterprise Security Solutions

Oracle Information Security Visioni

Cloud Security:Threats & Mitgations

Intelligent Security Design, Development and Acquisition

<Insert Picture Here> How to protect sensitive data, challenges & risks

IBM Security Strategy

An Oracle White Paper June Encryption and Redaction in Oracle Database 12c with Oracle Advanced Security

An Oracle White Paper June Security and Compliance with Oracle Database 12c

An Oracle White Paper April Oracle Audit Vault and Database Firewall

Database Auditing: Best Practices. Rob Barnes, CISA Director of Security, Risk and Compliance Operations

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

McAfee Database Security. Dan Sarel, VP Database Security Products

Why Standardize on Oracle Database 11g Next Generation Database Management. Thomas Kyte

Where every interaction matters.

Best Practices in Incident Response. SF ISACA April 1 st Kieran Norton, Senior Manager Deloitte & Touch LLP

Presentation for : The New England Board of Higher Education. Hot Topics in IT Security and Data Privacy

Database Security and Auditing: Leading Practices. Rob Barnes Director, Enterprise Auditing Solutions Application Security, Inc.

Privacy + Security + Integrity

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

External Supplier Control Requirements

PCI Compliance for Cloud Applications

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM

Oracle Privileged Account Manager 11gR2. Karsten Müller-Corbach

GoodData Corporation Security White Paper

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

ACCEPTING PAYMENT CARD ASSESSMENT Pre-Selection Questionnaire

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Larry Wilson Version 1.0 November, University Cyber-security Program Controls Book

Anatomy of a Cloud Computing Data Breach

Why Add Data Masking to Your IBM DB2 Application Environment

Data-Centric Security vs. Database-Level Security

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Detecting and Stopping Cyber Attacks Against Oracle Databases June 25, 2015

Critical Security Controls

Oracle Database 11g: Security Release 2. Course Topics. Introduction to Database Security. Choosing Security Solutions

Cybersecurity Health Check At A Glance

Governance, Risk & Compliance for Public Sector

IBM PowerSC. Security and compliance solution designed to protect virtualized datacenters. Highlights. IBM Systems and Technology Data Sheet

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements

10 Smart Ideas for. Keeping Data Safe. From Hackers

How To Secure A Database From A Leaky, Unsecured, And Unpatched Server

Database Security & Auditing

Oracle Database 11g: Security. What you will learn:

Safeguard Sensitive Data in EBS: A Look at Oracle Database Vault, Transparent Data Encryption, and Data Masking. Lucy Feng

Transcription:

Protecting Sensitive Data Reducing Risk with Oracle Database Security Antonio.Mata.Gomez@oracle.com Information Security Architect

Agenda 1 2 Anatomy of an Attack Three Steps to Securing an Oracle Database 3 Database Security Strategy 3

Agenda 1 2 Anatomy of an attack Three steps to securing an Oracle Database 3 Database Security Strategy 4

FROM MISTAKES TO MALICIOUS BASIC SECURITY IS NO LONGER ENOUGH Accidental deletes Unauthorized disclosures Privilege Abuse Curiosity Leakage Social Engineering Denial of Service Sophisticated Attacks Data Theft Loss to Business Impacts Reputation

ANATOMY OF AN ATTACK STARTS WITH SOCIAL ENGINEERING ATTACKER PHISHING ATTACK COMMAND SERVER XSS OR SQL INJECTION ATTACK i i i i i i i i i i DOWNLOADED MALWARE

ANATOMY OF AN ATTACK ESTABLISH A FOOTHOLD ESTABLISH MULTIPLE BACKDOORS DUMPING PASSWORDS DOMAIN CONTROLLER i i i i i i GATHERING DATA

ANATOMY OF AN ATTACK EXFILTRATE DATA AND COVER TRACKS STOLEN DATA USED IN FOLLOW ON ATTACKS EXFILTRATE DATA VIA STAGING SERVER ANYWHERE IN THE WORLD

A Wide Range of Attack Vectors no single control addresses all of them App User Snooping Malware Attack Data at Rest Attack SQL Attack Data Redaction Label Security DB Firewall Data Encryption Prod Data Accidental Exposure Activity Monitoring Backup Data Prod Data Dev/Test Data DB Vault DBA Permission Abuse Data Masking Sensitive Data Discovery Configuration Management Insider Threat DevTeam Snooping Lost Laptop Lost Disk or Tapes 9

Over 1.8 Billion Records Breached 67 % 43 % 69 % 97 % Records breached from servers Breached using weak or stolen credentials Discovered by an external party Preventable with basic controls

97% Of Controls Database Breaches Could have Been Prevented With Basic Controls 11

Compliance Requires New Security Controls Regulatory Frameworks HIPAA, IRS 1075, CJIS, Breach Notification, European Data Protection Regulation, etc. Regulatory Requirements Data Security Access Controls Segregation of Duties Audit & Accountability Continuous Monitoring & Alerting Regulated Data Federal Tax Info, Electronic Health Records, Criminal History Reports, PII Securing Data Controlling Access Segregation of Duties Auditing Management & Alerting!

Agenda 1 2 Anatomy of an attack Three steps to securing an Oracle Database 3 Database Security Strategy 13

3 STEPS TO SECURE CONSOLIDATION DATABASE DEFENSE-IN-DEPTH STRATEGY *7#$%!@!% #<>*$#@3! Find Sensitive Data, Privileges Prevent Unauthorized Data Access Detect, Alert on Database Activity

STEP 1 ADMINISTRATIVE CONTROLS FIND SENSITIVE DATA, DATABASES, AND PRIVILEGES Analyze Privileges Sensitive Data Finder Configuration Scanning Database Vault 12c All Security Options EM Lifecycle Management

Database Privilege Analysis Create Drop Modify DBA role APPADMIN role Oracle Database Vault 12c Report on actual privileges and roles used by database users Helps revoke unnecessary privileges Enforce least privilege and reduce risks Increase security without disruption Privilege Analysis 16

Discover Sensitive Data and Databases Oracle Enterprise Manager 12c Scan Oracle for sensitive data Built-in, extensible data definitions Discover application data models Protect sensitive data appropriately: encrypt, redact, mask, audit

Continuous Configuration Monitoring Oracle Enterprise Manager 12c Discover Discover and classify databases Scan for best practices, standards Detect unauthorized changes Scan & Monitor Automated remediation Patching and provisioning Patch 18

Oracle Provided Oracle DB 11g STIG Compliance Includes both Oracle Database and Oracle Home Checklists Almost all Scripted defined checks have been automated. ~20% Manual/Interview checks automated. Remaining require manual Attestation.

STEP 2 PREVENTIVE CONTROLS PREVENT UNAUTHORIZED DATA ACCESS Production DATA ENCRYPTION *7#$%!!@!%afb ##<>*$#@34 DATA REDACTION ssn:xxx-xx-4321 dob:xx/xx/xxxx DATA MASKING ACCESS CONTROLS ssn:253-21-4321 Insufficient Privilege APPLICATIONS ssn:253-21-4321 APPLICATIONS ssn:xxx-xx-4321 ssn:423-55-3571 dob: 12/01/1987 Dev/Test

Encryption is the Foundation Applications Disk Backups Exports Off-Site Facilities Oracle Advanced Security Transparent data encryption Prevents access to data at rest Requires no application changes Built-in two-tier key management Near Zero overhead with hardware Integrations with Oracle technologies e.g. Exadata, Advanced Compression, ASM, GoldenGate, DataPump, etc.

Key Management Challenges Heard from Customers Management Challenges Proliferation of encryption wallets and keys Authorized sharing of keys Key availability, retention, and recovery Custody of keys and key storage files Regulatory Challenges Physical separation of keys from encrypted data Periodic key rotations Monitoring and auditing of keys Long-term retention of keys and encrypted data 22

Oracle Key Vault Software Appliance Platform Turnkey solution based on hardened stack Includes Oracle Database and security options Open x86-64 hardware to choose from Easy to install, configure, deploy, and patch Separation of duties for administrative users Full auditing, preconfigured reports, and alerts 23

Context-Aware Data Redaction Credit Card Numbers 4451-2172-9841-4368 5106-8395-2095-5938 7830-0032-0294-1827 Redaction Policy xxxx-xxxx-xxxx-4368 4451-2172-9841-4368 Oracle Advanced Security Real-time sensitive data redaction based on database session context Library of redaction policies and point-andclick policy definition Consistent enforcement, policies applied to data Transparent to applications, users, and operational activities Call Center Application Billing Department 24

Remove sensitive data from non-production environments LAST_NAME SSN SALARY AGUILAR 203-33-3234 40,000 BENSON 323-22-2943 60,000 Production Test Dev Non-Production LAST_NAME SSN SALARY ANSKEKSL 323 23-1111 60,000 BKJHHEIEDK 252-34-1345 40,000 Oracle Data Masking & Subsetting Remove risk from non-production systems Reduce size of non-production systems Reduce storage costs Replace sensitive application data Referential integrity detected/preserved Extensible template library and formats Application templates available 25

Next Generation Access Control Applications Procurement HR Finance Security DBA select * from finance.customers Application DBA Oracle Database Vault Context-Sensitive Authorization Policies Limit DBA access to application data Multi-factor SQL command rules Enforce enterprise data governance, least privilege, segregation of duties Out of the box application policies DBA 26

Label-Based Access Control Sensitive Transactions Confidential Report Data Public Reports Oracle Label Security Virtual information partitioning for cloud, SaaS, hosting environments Classify users and data using labels Labels based on business drivers Automatically enforced row level access control, transparent to applications Labels can be factors used by other security features (eg: Redaction, Database Vault) Confidential Sensitive 27

STEP 3 DETECTIVE CONTROLS DETECT AND ALERT ON ACCESS ANOMALIES APP S DATABASE FIREWALL Firewall Events Alerts! Built-in Reports Custom Reports Audit Data Custom Policies AUDIT VAULT

Consolidate Audit Data Storage, Analysis, & Reporting Audit Data & Event Logs Oracle Database Firewall OS & Storage Directories Databases Custom! Alerts Built-in Reports Custom Reports Policies SOC/NOC Auditor Oracle Audit Vault & Database Firewall Centralized, secure audit data repository Manage audit data, return storage to operational data bases Powerful alerting - thresholds, group-by Out-of-the box and custom reports Consolidated multi-source reporting Security Analyst For Oracle and non-oracle Databases 29

Detect & Alert on Anomalies Users Apps SQL Analysis Allow Log Alert Substitute Block Policy Factors Oracle Audit Vault & Database Firewall Monitors network traffic, detect and block unauthorized activity Highly accurate SQL grammar analysis Can detect/stop SQL injection attacks Whitelist approach to enforce activity Blacklists for managing high risk activity Detect/Block Anomalous Activity Whitelist Blacklist For Oracle and non-oracle Databases 30

Agenda 1 2 Anatomy of an Attack Three Steps to Securing an Oracle Database 3 Database Security Strategy 31

Database Security Strategy Use Defense-in-Depth for Maximum Security Preventive Controls Detective Controls Administrative Controls Don t let perfection stand in the way of progress Look for incremental steps to reduce risk Do not accept the status quo business as usual is not an option 32

Security is part of Oracle s DNA Defense in Depth to address the full range of attack vectors Encryption, Context-aware access controls, separation of duty, fine-grained access controls Built-in Security not a bolt on, no compatibility issues Security controls do not break compression, backups, high availability, data integration High Performance is a Must Encryption, Masking Common Admin UIs reduce your cost to implement and manage Enterprise Manager Single Vendor = No Excuses = No Finger Pointing 33

Questions? 34

Oracle Confidential 35