An Oracle White Paper March 2010. Oracle Transparent Data Encryption for SAP



Similar documents
An Oracle White Paper July Introducing the Oracle Home User in Oracle Database 12c for Microsoft Windows

An Oracle White Paper December Advanced Network Compression

Oracle Insurance General Agent Hardware and Software Requirements. Version 8.0

SaaS Data Architecture. An Oracle White Paper Oct 2008

An Oracle White Paper June Security and the Oracle Database Cloud Service

Oracle ACFS Security and Encryption. An Oracle White Paper April, 2011

Monitoring and Diagnosing Production Applications Using Oracle Application Diagnostics for Java. An Oracle White Paper December 2007

Oracle FLEXCUBE Direct Banking Release Retail Credit Card User Manual. Part No. E

An Oracle White Paper May Oracle Database Cloud Service

Oracle Recovery Manager 10g. An Oracle White Paper November 2003

An Oracle White Paper August Oracle Database Auditing: Performance Guidelines

Oracle White Paper October Oracle Advanced Security with Oracle Database 11g Release 2

Oracle FLEXCUBE Direct Banking Release Retail Mutual Funds User Manual. Part No. E

Oracle Secure Backup 10.2 Policy-Based Backup Management. An Oracle White Paper December 2007

Maximum Availability Architecture. Oracle Best Practices For High Availability

Oracle Easy Connect Naming. An Oracle White Paper October 2007

An Oracle White Paper March Integrating Microsoft SharePoint Server With Oracle Virtual Directory

An Oracle White Paper June High Performance Connectors for Load and Access of Data from Hadoop to Oracle Database

An Oracle White Paper January Oracle Database Backup Service A Technical White Paper

Managed Storage Services

An Oracle White Paper September Oracle Database and the Oracle Database Cloud

Oracle FLEXCUBE Direct Banking Release Corporate E-Factoring User Manual. Part No. E

An Oracle White Paper August Automatic Data Optimization with Oracle Database 12c

An Oracle White Paper January Using Oracle's StorageTek Search Accelerator

An Oracle White Paper October BI Publisher 11g Scheduling & Apache ActiveMQ as JMS Provider

An Oracle White Paper October Oracle Database and IPv6 Statement of Direction

An Oracle White Paper June Oracle Database Firewall 5.0 Sizing Best Practices

An Oracle White Paper June Oracle Database 11g: Cost-Effective Solutions for Security and Compliance

MANAGING A SMOOTH MARKETING AUTOMATION SOFTWARE IMPLEMENTATION

One View Report Samples Financials

One View Report Samples Warehouse Management

An Oracle White Paper November Oracle Business Intelligence Standard Edition One 11g

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

Oracle Business Intelligence Enterprise Edition Plus and Microsoft Office SharePoint Server. An Oracle White Paper October 2008

An Oracle White Paper January Oracle Database 12c: Full Transportable Export/Import

Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003

Oracle Whitepaper April Security and the Oracle Database Cloud Service

Load Balancing Oracle Web Applications. An Oracle White Paper November 2004

How To Load Data Into An Org Database Cloud Service - Multitenant Edition

An Oracle White Paper September Advanced Java Diagnostics and Monitoring Without Performance Overhead

Migrating Non-Oracle Databases and their Applications to Oracle Database 12c O R A C L E W H I T E P A P E R D E C E M B E R

Oracle Database Backup Service. Secure Backup in the Oracle Cloud

An Oracle White Paper May Oracle Audit Vault and Database Firewall 12.1 Sizing Best Practices

An Oracle White Paper May Exadata Smart Flash Cache and the Oracle Exadata Database Machine

Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory. Overview August 2008

An Oracle Communications White Paper December Serialized Asset Lifecycle Management and Property Accountability

An Oracle White Paper March Oracle Label Security in Government and Defense Environments

Maximum Availability Architecture. Oracle Best Practices For High Availability

Oracle EXAM - 1Z Oracle Database 11g Security Essentials. Buy Full Product.

Oracle Identity Management: Integration with Windows. An Oracle White Paper December. 2004

March Oracle Business Intelligence Discoverer Statement of Direction

An Oracle White Paper July Oracle ACFS

Express Implementation for Electric Utilities

Oracle SQL Developer Migration. An Oracle White Paper September 2008

An Oracle White Paper February Oracle Data Integrator 12c Architecture Overview

Oracle BI Publisher Enterprise Cluster Deployment. An Oracle White Paper August 2007

An Oracle White Paper January Advanced Compression with Oracle Database 11g

Oracle Business Intelligence ADF Custom Visualizations and Integration. An Oracle White Paper November 2012

An Oracle White Paper May Distributed Development Using Oracle Secure Global Desktop

An Oracle White Paper December Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance

Oracle FLEXCUBE Direct Banking Release Retail Loans User Manual. Part No. E

Deliver Oracle BI Publisher documents to Microsoft Office SharePoint Server An Oracle White Paper July 2008

One View Report Samples Health and Safety Incident Management

Next Generation Siebel Monitoring: A Real World Customer Experience. An Oracle White Paper June 2010

Mobile Technology for Wealth Management Advisors

An Oracle White Paper April How to Install the Oracle Solaris 10 Operating System on x86 Systems

Performance with the Oracle Database Cloud

October Oracle Application Express Statement of Direction

Oracle Primavera P6 Enterprise Project Portfolio Management Performance and Sizing Guide. An Oracle White Paper October 2010

An Oracle White Paper November Oracle Real Application Clusters One Node: The Always On Single-Instance Database

An Oracle White Paper June How to Install and Configure a Two-Node Cluster

An Oracle White Paper April, Effective Account Origination with Siebel Financial Services Customer Order Management for Banking

An Oracle White Paper November Backup and Recovery with Oracle s Sun ZFS Storage Appliances and Oracle Recovery Manager

Achieving Sarbanes-Oxley Compliance with Oracle Identity Management. An Oracle White Paper September 2005

Oracle Hyperion Financial Management Virtualization Whitepaper

Integrating Tutor and UPK Content: A Complete User Documentation Solution. An Oracle White Paper April 2008

Oracle Primavera Gateway

Top Ten Reasons for Deploying Oracle Virtual Networking in Your Data Center

Query Acceleration of Oracle Database 12c In-Memory using Software on Chip Technology with Fujitsu M10 SPARC Servers

An Oracle White Paper February Real-time Data Warehousing with ODI-EE Changed Data Capture

Oracle FLEXCUBE Direct Banking Release Corporate Foreign Exchange User Manual. Part No. E

An Oracle White Paper March Managing Metadata with Oracle Data Integrator

An Oracle White Paper February Oracle Data Pump Quick Start

An Oracle White Paper July Accelerating Database Infrastructure Using Oracle Real Application Clusters 11g R2 and QLogic FabricCache Adapters

Highmark Unifies Identity Data With Oracle Virtual Directory. An Oracle White Paper January 2009

An Oracle White Paper March Oracle s Single Server Solution for VDI

THE NEW BUSINESS OF BUSINESS LEADERS. Hiring and Onboarding

How to Use Microsoft Active Directory as an LDAP Source with the Oracle ZFS Storage Appliance

Oracle Total Recall with Oracle Database 11g Release 2

An Oracle White Paper May Creating Custom PDF Reports with Oracle Application Express and the APEX Listener

Guide to Database as a Service (DBaaS) Part 2 Delivering Database as a Service to Your Organization

An Oracle White Paper June Encryption and Redaction in Oracle Database 12c with Oracle Advanced Security

June, 2015 Oracle s Siebel CRM Statement of Direction Client Platform Support

Oracle Database Cloud Exadata Service. Transforming The Cloud for Mission-critical Business Operations

An Oracle Technical White Paper June Oracle VM Windows Paravirtual (PV) Drivers 2.0: New Features

OpenLDAP Oracle Enterprise Gateway Integration Guide

An Oracle White Paper December Cloud Candidate Selection Tool: Guiding Cloud Adoption

Database Instance Caging: A Simple Approach to Server Consolidation. An Oracle White Paper September 2009

USING TIME MACHINE AND MICROSOFT SQL SERVER

Oracle Communications Network Discovery Overview. Updated June 2007

Transcription:

An Oracle White Paper March 2010 Oracle Transparent Data Encryption for SAP

Introduction Securing sensitive customer data has become more and more important in the last years. One possible threat is confidential data lost either by data theft internal or external or by gaining unauthorized access to a physical storage media containing the data accidently or not. Storage media can be a hard disk (or a laptop) with the original data or e.g. a CD, DVD, USB device, tape, or something similar where a backup of the data(base) could be stored. While Oracle provides for data theft several database options like Oracle Database Vault, the data located in the datafiles can be secured by Oracle Transparent Data Encryption (hereinafter: TDE). With TDE the (sensitive) customer data is encrypted using common standardized ciphering methods: 3DES168, AES128, AES192, or AES256 The key focus of TDE is that, even if the data is ciphered, there are no modifications necessary to the application. Or in other words the encryption is transparent for the application. With TDE for Oracle Database 10.2 some restrictions apply. With this version of TDE it was only possible to cipher single columns. Also the data in all indexes referring to these encrypted columns are ciphered. Nevertheless it already added a big value to the customers. With TDE for Oracle Database 11.2 it is now additionally possible to encrypt whole tablespaces with all data inside. So now with Oracle 11.2 there are available: 1. TDE column encryption 2. TDE tablespace encryption 2

The principle of Transparent Data Encryption The idea behind TDE is to encrypt the sensitive data when it is physically stored in database files. This means if unauthorized access of one or more datafiles was achived the sensitive data is still not compromised. The method to encrypt and decrypt the data is a two-tired, key-based architecture: 1. The so-called TDE Master Key is stored ciphered in an external Oracle Wallet (file), secured by a password. This should only known by the Security Administrator or the Database Administrator, if a Security Administrator was not yet constituted. 2. This master key is then used to unlock the a. table encryption key (TDE column encryption) b. tablespace encryption key (TDE tablespace encryption) which is then used to encrypt/decrypt the data stored either in the column(s) of the table or in the whole tablespace. Each table or tablespace respectively has its own encryption key. These keys are all stored in the database dictionary. So it is mandatory not to store the Oracle Wallet password in no way together with the database (backup). In the redolog files the confidential data, when encrypted in the datafiles, is encrypted also. Licensing of TDE TDE is part of the Advanced Security Option (ASO), which is contained in the Oracle database license offered by SAP. If the database license is bought directly from Oracle it has to be in the license scope prior using TDE. Installing TDE Requirements There are no requirements for TDE. Software installation for TDE 3

TDE is part of the Oracle Advanced Security Option (ASO). As ASO is installed by default in the Oracle Database installation for a SAP system, there is no separate software stack to be installed for TDE. TDE just needs to be configured: Configuration of TDE TDE configuration is done in 2 steps: 1. The external, password secured, Oracle Wallet file is created in a defined location on the database server. This Wallet is containing the TDE master key. 2. Then in this 2nd step the encryption on table column level and/or tablespace level can be set up: a. by creating a new table where one or more columns are encrypted. b. by altering an existing table so that one or more columns got encrypted. c. by creating a new encrypted tablespace Remark: An existing tablespace cannot be encrypted later on, but the with the Oracle Online Redefinition feature all tables of an existing tablespace can be moved to a newly created encrypted tablespace. TDE and BR*Tools Working with TDE is implemented in the SAP BR*Tools. Changes resulting from TDE As previously mentioned, the encryption and decryption process is transparent to the application. So there are no modifications in the application necessary. 4

Besides this the only exception is that after starting the database the Oracle Wallet must be opened using the password prior accessing the ciphered data. Performance The handling of the ciphered data has a slight performance impact in the following areas depending whether TDE column encryption or TDE tablespace encryption is used: CPU (TDE column encryption) Consider the entire application, on average the additional CPU utilization for encryption and decryption in common less than five percent (5%). There is no performance impact for SQL statements accessing non-ciphered data only. Nevertheless in case of a single SQL statement handling ciphered data, it could be significantly higher. CPU (TDE tablespace encryption) Accessing non-ciphered tablespaces also does not require additional resources. In fact for the entire application, on average the additional CPU utilization for encryption and decryption is around five percent (5%). Memory (TDE column encryption) Encrypting an individual column requires between 33 and 40 bytes of extra memory for each entry. For a table with k TDE encrypted columns and n lines, you would need a maximum of n * k * 48 bytes of extra memory in the database for TDE column encryption. Using the NOMAC and the NO SALT option some space can be regained. Due to the additional memory required, encrypting with 'ALTER TABLE... ENCRYPT' may create a very large number of chained rows. Memory (TDE tablespace encryption) 5

In contrast to TDE tablespace encryption a table in an encrypted tablespace does not need more space. Changing access plans (TDE column encryption) If you want to encrypt columns that are part of an index, this index can then only be used in an equality ( = ) search. For other access types like <, <=, >=, >, like on a ciphered column the index cannot be used. This leads to a different access like Full Table Scan which then causes significant longer response times. On columns encrypted with SALT option, no indexes can be created. Changing access plans (TDE tablespace encryption) If case of TDE tablespace encryption these restrictions are no longer in place. General restrictions TDE column encryption With TDE column encryption there are some restrictions in place as e.g. the data types CLOB, BLOB, LONG, LONG RAW and Oracle Dictionary tables belonging to the SYS user cannot be encrypted. Not working are also indexes sorted in descending order, range-scan search through an index, other index types other than standard-b tree and export/import with exp and imp. TDE tablespace encryption The following list includes the restrictions that apply to TDE tablespace encryption: External Large Objects (BFILEs) cannot be encrypted using TDE tablespace encryption. This is because these files reside outside the database. Original import/export utilities are not supported. Use the Oracle Data Pump utility instead. 6

General recommendations Based on the restriction with TDE column encryption there is a great advantage when using TDE tablespace encryption. TDE and other Oracle database option Implementing TDE does include using encryption for other database options also. Secure files Secure files the successor of the old LOB files can be ciphered, in contrast to the LOBs which can t be encrypted using TDE column encryption. Data Guard TDE supports Oracle DataGuard in a physical standby configuration. There is no modification necessary. Only each time the master key is changed, the modified encryption wallet must be transferred to all attached standby databases. For automatic switch to the standby side without manual intervention, it is possible to use a so called auto-open wallet on the standby side. RAC In SAP systems all Oracle instances share one single Oracle Home on the cluster file system. Thus TDE is active for all RAC instances equally. RMAN Using TDE provides the additional advantage to use encrypted RMAN savesets. This means that in the savesets (=backupsets) can be encrypted without human intervention when using an Oracle Wallet. This feature is supported by the BR*Tools. More information about TDE The Oracle 11g documentation contains more details about TDE. 7

TDE current status TDE can be used for Oracle/SAP systems without any further restrictions. 8

Oracle Database Vault @ SAP September 2009 Author: Marc Ströhle Oracle Corporation World Headquarters 500 Oracle Parkway Redwood Shores, CA 94065 U.S.A. Worldwide Inquiries: Phone: +1.650.506.7000 Fax: +1.650.506.7200 oracle.com Copyright 2009, Oracle and/or its affiliates. All rights reserved. This document is provided for information purposes only and the contents hereof are subject to change without notice. This document is not warranted to be error-free, nor subject to any other warranties or conditions, whether expressed orally or implied in law, including implied warranties and conditions of merchantability or fitness for a particular purpose. We specifically disclaim any liability with respect to this document and no contractual obligations are formed either directly or indirectly by this document. This document may not be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without our prior written permission. Oracle is a registered trademark of Oracle Corporation and/or its affiliates. Other names may be trademarks of their respective owners. 0209