Complete Database Security. Thomas Kyte http://asktom.oracle.com/



Similar documents
Oracle Database Security

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

<Insert Picture Here> Oracle Database Security Overview

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Oracle Database Security. Paul Needham Senior Director, Product Management Database Security

Protecting Sensitive Data Reducing Risk with Oracle Database Security

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Securing Data in Oracle Database 12c

Oracle Identity Management Securing The New Digital Experience

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

Data Security: Strategy and Tactics for Success

An Oracle White Paper June Oracle Database 11g: Cost-Effective Solutions for Security and Compliance

Database Security & Compliance with Audit Vault and Database Firewall. Pierre Leon Database Security

Hayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

Oracle Database Security Solutions

Oracle Audit Vault and Database Firewall. Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska

<Insert Picture Here> How to protect sensitive data, challenges & risks

Managing Oracle E-Business Suite Security

<Insert Picture Here> Oracle Database Vault

Oracle Audit Vault and Database Firewall

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

McAfee Database Security. Dan Sarel, VP Database Security Products

Making Database Security an IT Security Priority

Governance, Risk & Compliance for Public Sector

Why Add Data Masking to Your IBM DB2 Application Environment

Best Practices Report

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

Securing SharePoint 101. Rob Rachwald Imperva

Guardium Change Auditing System (CAS)

Cost Effective Data Management for Oracle Utilities Applications

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Oracle Information Security Visioni

PCI Compliance for Cloud Applications

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking

An Oracle White Paper April Security and Compliance with Oracle Database 12c

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

Database Auditing: Best Practices. Rob Barnes, CISA Director of Security, Risk and Compliance Operations

MySQL Security: Best Practices

Application Testing Suite Overview

How To Manage Security On A Networked Computer System

Security Compliance and Data Governance: Dual problems, single solution CON8015

An Oracle White Paper April Oracle Audit Vault and Database Firewall

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan

ALERT LOGIC FOR HIPAA COMPLIANCE

An Oracle White Paper June Security and Compliance with Oracle Database 12c

Installing and Configuring Guardium, ODF, and OAV

Application and Database Security with F5 BIG-IP ASM and IBM InfoSphere Guardium

Oracle Database 11g: Security. What you will learn:

Credit Cards and Oracle E-Business Suite Security and PCI Compliance Issues

5 Lines of Defense You Need to Secure Your SharePoint Environment SharePoint Security Resource Kit

Application Monitoring for SAP

Intelligent Security Design, Development and Acquisition

The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention

PCI DSS Reporting WHITEPAPER

Enterprise Security Solutions

<Insert Picture Here> Application Change Management and Data Masking

Credit Cards and Oracle: How to Comply with PCI DSS. Stephen Kost Integrigy Corporation Session #600

Safeguard Sensitive Data in EBS: A Look at Oracle Database Vault, Transparent Data Encryption, and Data Masking. Lucy Feng

How to Secure Your SharePoint Deployment

Oracle Database 11g: Security

What is Security Intelligence?

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Database Auditing & Security. Brian Flasck - IBM Louise Joosse - BPSolutions

How To Secure A Database From A Leaky, Unsecured, And Unpatched Server

Q1 Labs Corporate Overview

SANS Top 20 Critical Controls for Effective Cyber Defense

<Insert Picture Here> Oracle Identity And Access Management

Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals

Clavister InSight TM. Protecting Values

8 Steps to Holistic Database Security

Obtaining Value from Your Database Activity Monitoring (DAM) Solution

Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

Data Masking. Cost-Effectively Protect Data Privacy in Production and Nonproduction Systems. brochure

Log Management How to Develop the Right Strategy for Business and Compliance. Log Management

Sarbanes-Oxley Compliance for Cloud Applications

Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements

IBM QRadar Security Intelligence April 2013

Transcription:

Complete Database Security Thomas Kyte http://asktom.oracle.com/

Agenda Enterprise Data Security Challenges Database Security Strategy Oracle Database Security Solutions Defense-in-Depth Q&A 2 Copyright 2010, Oracle. All rights reserved

Top Priority for IT Security? Data security remains the top priority for enterprise IT security shops with 89% of enterprises citing it as a critical or high priority. Enterprises are also continuing to focus on cutting costs and increasing efficiency. Source: Forrester - The State Of Enterprise IT Security And Emerging Trends: 2009 To 2010 3 Copyright 2010, Oracle. All rights reserved

More data than ever Two Thirds of Sensitive and Regulated Data Resides in Databases Growth Doubles Yearly 1,800 Exabytes 2006 2011 Source: IDC, 2008 4 Copyright 2010, Oracle. All rights reserved

More breaches then ever 600 PUBLICLY REPORTED DATA BREACHES Total Personally Identifying Information Records Exposed (Millions) 500 400 300 200 100 0 2005 2006 2007 2008 2009 Source: DataLossDB Once exposed, the data is out there the bell can t be un-rung Remediation Cost Exceeds $300/record 5 Copyright 2010, Oracle. All rights reserved

More threats than ever Insider Fraud Is Involved in 60% of Data Breaches Source: Wall Street & Technology 6 Copyright 2010, Oracle. All rights reserved

Database Security Defense In Depth Oracle Database Security Solutions Monitor and block threats before they reach databases Track changes and audit database activity Control access to data within the database Prevent access by non database users Remove sensitive data from non production environments Monitoring & Blocking Auditing Access Control Encryption & Masking Database Firewall Audit Vault Total Recall Database Vault Label Security Advanced Security Secure Backup Configuration Management Identity Management Data Masking 2010 Oracle Corporation 8

Oracle Database Firewall First Line of Defense Allow Log Alert Applications Substitute Block Alerts Built-in Reports Custom Reports Policies Monitor database activity to prevent unauthorized database access, SQL injections, privilege or role escalation, illegal access to sensitive data, etc. Highly accurate SQL grammar based analysis without costly false positives Flexible SQL level enforcement options based on white lists and black lists Scalable architecture provides enterprise performance in all deployment modes Built-in and custom compliance reports for SOX, PCI, and other regulations 2010 Oracle Corporation 9

Oracle Configuration Management Secure Your Database Environment Monitor Discover Classify Assess Prioritize Fix Monitor Asset Management Policy Management Vulnerability Management Configuration Management & Audit Analysis & Analytics Discover and classify databases into policy groups Scan databases against 400+ best practices and industry standards, custom enterprise-specific configuration policies Detect and event prevent unauthorized database configuration changes Change management dashboards and compliance reports 2010 Oracle Corporation 10

Oracle Total Recall Track Changes to Sensitive Data select salary from emp AS OF TIMESTAMP '02-MAY-09 12.00 AM where emp.title = admin Transparently track application data changes over time Efficient, tamper-resistant storage of archives in the database Real-time access to historical application data using SQL Simplified incident forensics and recovery 2010 Oracle Corporation 11

Oracle Audit Vault Audit Database Activity in Real-Time HR Data! Alerts CRM Data ERP Data Audit Data Built-in Reports Custom Reports Databases Policies Auditor Consolidate database audit trail into secure centralized repository Detect and alert on suspicious activities, including privileged users Out-of-the box compliance reports for SOX, PCI, and other regulations E.g., privileged user audit, entitlements, failed logins, regulated data changes Streamline audits with report generation, notification, attestation, archiving, etc. 2010 Oracle Corporation 12

Oracle Database Vault Enforce Security Policies Inside the Database Security DBA Application Procurement HR Application DBA Finance select * from finance.customers DBA Automatic and customizable DBA separation of duties and protective realms Enforce who, where, when, and how using rules and factors Enforce least privilege for privileged database users Prevent application by-pass and enforce enterprise data governance Securely consolidate application data or enable multi-tenant data management 2010 Oracle Corporation 13

Oracle Advanced Security Protect Data from Unauthorized Users Disk Backups Application Exports Off-Site Facilities Complete encryption for application data at rest to prevent direct access to data stored in database files, on tape, exports, etc. by IT Staff/OS users Efficient application data encryption without application changes Built-in two-tier key management for SoD with support for centralized key management using HSM/KMS Strong authentication of database users for greater identity assurance 2010 Oracle Corporation 15

Oracle Data Masking Irreversibly De-Identify Data for Non-Production Use Production LAST_NAME SSN SALARY AGUILAR 203-33-3234 40,000 BENSON 323-22-2943 60,000 Non-Production LAST_NAME SSN SALARY ANSKEKSL 111 23-1111 60,000 BKJHHEIEDK 222-34-1345 40,000 Data never leaves Database Make application data securely available in non-production environments Prevent application developers and testers from seeing production data Extensible template library and policies for data masking automation Referential integrity automatically preserved so applications continue to work 2010 Oracle Corporation 16

Oracle Database Security Solutions Complete Defense-in-Depth Comprehensive single vendor addresses all your requirements Transparent no changes to existing applications or databases Easy to deploy point and click interfaces deliver value within hours Cost Effective integrated solutions reduce risk and lower TCO Proven #1 Database with over 30 years of security innovation! Monitoring & Blocking Auditing Access Control Encryption & Masking Database Firewall Audit Vault Total Recall Database Vault Label Security Advanced Security Secure Backup Configuration Management Identity Management Data Masking 2010 Oracle Corporation 17

For More Information search.oracle.com database security or oracle.com/database/security 18 Copyright 2010, Oracle. All rights reserved

Thomas.Kyte@oracle.com 19 Copyright 2010, Oracle. All rights reserved

20 Copyright 2010, Oracle. All rights reserved

The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle s products remains at the sole discretion of Oracle. 21 Copyright 2010, Oracle. All rights reserved