All Things Oracle Database Encryption



Similar documents
Encrypting Sensitive Data in Oracle E-Business Suite

Credit Cards and Oracle E-Business Suite Security and PCI Compliance Issues

Securing Oracle E-Business Suite in the Cloud

Oracle E-Business Suite APPS, SYSADMIN, and oracle Securing Generic Privileged Accounts. Stephen Kost Chief Technology Officer Integrigy Corporation

Oracle Database 11g: Security Release 2. Course Topics. Introduction to Database Security. Choosing Security Solutions

PCI Compliance in Oracle E-Business Suite

Oracle Database Security Myths

D50323GC20 Oracle Database 11g: Security Release 2

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

Oracle Database 11g: Security Release 2

PCI Compliance in Oracle E-Business Suite

New Oracle 12c Security Features Oracle E-Business Suite Perspective

Credit Cards and Oracle: How to Comply with PCI DSS. Stephen Kost Integrigy Corporation Session #600

mission critical applications mission critical security Internal Auditor Primer: Oracle E-Business Suite Security Risks Primer

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules

Oracle Database 11g: Security. What you will learn:

Oracle Database Encryption

Security Implications of Oracle Product Desupport April 23, 2015

ENCRYPTION KEY MANAGEMENT SIMPLIFIED A BEGINNER S GUIDE TO ENCRYPTION KEY MANAGEMENT

Securing Data in Oracle Database 12c

Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals

SafeNet DataSecure vs. Native Oracle Encryption

Auditing Encryption in Oracle Databases

Detecting and Stopping Cyber Attacks Against Oracle Databases June 25, 2015

Obtaining Value from Your Database Activity Monitoring (DAM) Solution

Oracle Database 11g: Security

Complying with PCI Data Security

<Insert Picture Here> Oracle Database Security Overview

Transparent Data Encryption: New Technologies and Best Practices for Database Encryption

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

<Insert Picture Here> Oracle Database Vault

MySQL Security: Best Practices

Oracle White Paper October Oracle Advanced Security with Oracle Database 11g Release 2

Database Assessment. Vulnerability Assessment Course

An Oracle White Paper June Oracle Database 11g: Cost-Effective Solutions for Security and Compliance

Microsoft SQL Server Integration Guide

Oracle 1Z0-528 Exam Questions & Answers

New Security Features in Oracle E-Business Suite 12.2

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Alliance Key Manager Cloud HSM Frequently Asked Questions

Safeguard Sensitive Data in EBS: A Look at Oracle Database Vault, Transparent Data Encryption, and Data Masking. Lucy Feng

Oracle Database 10g: Security Release 2

Guide to Auditing and Logging in the Oracle E-Business Suite

Securing and protecting the organization s most sensitive data

Meeting Technology Risk Management (TRM) Guidelines from the Monetary Authority of Singapore (MAS)

Oracle Advanced Security Technical White Paper. An Oracle White Paper June 2007

Securing Sensitive Data

Oracle Database Security. Nathan Aaron ICTN 4040 Spring 2006

Oracle Database 11g: Security

How to Audit the Top Ten E-Business Suite Security Risks

Oracle Database Security Solutions

Debunking The Myths of Column-level Encryption

SECUR IN MIRTH CONNECT. Best Practices and Vulnerabilities of Mirth Connect. Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions

PA-DSS Implementation Guide for. Sage MAS 90 and 200 ERP. Credit Card Processing

Vormetric Encryption Architecture Overview

Why Add Data Masking to Your IBM DB2 Application Environment

An Oracle White Paper March Oracle Transparent Data Encryption for SAP

Securing Data on Microsoft SQL Server 2012

Vormetric Data Security

Protecting Sensitive Data Reducing Risk with Oracle Database Security

WHITE PAPER. Oracle E-Business Suite: Credit Cards and PCI Compliance

Encryption Key Management for Microsoft SQL Server 2008/2014

MS-55096: Securing Data on Microsoft SQL Server 2012

Circumvent Oracle s Database Encryption and Reverse Engineering of Oracle Key Management Algorithms. Alexander Kornbrust 28-July-2005

Alliance Key Manager Solution Brief

IBM i Encryption in a Snap! Implement IBM FIELDPROC with a simple to use GUI and a few clicks of your mouse.

PCI Data Security. Meeting the Challenges of PCI DSS Payment Card Security

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Managing Oracle E-Business Suite Security

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary

Copyright 2014 Oracle and/or its affiliates. All rights reserved.

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Protecting Data Assets and Reducing Risk

PLATFORM ENCRYPTlON ARCHlTECTURE. How to protect sensitive data without locking up business functionality.

Securing and Accelerating Databases In Minutes using GreenSQL

Thick Client Application Security

Tagging, Encoding, and Encrypting with RMAN

Key Management in the Multi-Platform Environment

What s New in MySQL 5.7 Security Georgi Joro Kodinov Team Lead MySQL Server General Team

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

With Great Power comes Great Responsibility: Managing Privileged Users

Microsoft SQL Server Security Best Practices

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00

Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking

Oracle EXAM - 1Z Oracle Database 11g Security Essentials. Buy Full Product.

Alliance AES Encryption for IBM i Solution Brief

SQL Server Encryption Overview. September 2, 2015

Data-Centric Security vs. Database-Level Security

AppSentry Application and Database Security Auditing

Oracle Database 11g Security Essentials

Payment Card Industry Self-Assessment Questionnaire

GoodData Corporation Security White Paper

Vormetric Data Security Platform Data Sheet

Transcription:

All Things Oracle Database Encryption January 21, 2016 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy Corporation

Agenda Database Encryption Data in Use Q&A 1 2 3 4 5 Data at Rest Data in Motion

About Integrigy ERP Applications Oracle E-Business Suite Databases Oracle and Microsoft SQL Server Products Services AppSentry ERP Application and Database Security Auditing Tool AppDefend Enterprise Application Firewall for the Oracle E-Business Suite Validates Security Protects Oracle EBS Verify Security Ensure Compliance Build Security Security Assessments ERP, Database, Sensitive Data, Pen Testing Compliance Assistance SOX, PCI, HIPAA Security Design Services Auditing, Encryption, DMZ You

Agenda Database Encryption Data in Use Q&A 1 2 3 4 5 Data at Rest Data in Motion

What is Sensitive Data? Payment Card Industry Data Security Standard (PCI-DSS 2.0) State Privacy Regulations (employees, customers, Vendors) HIPAA Privacy Standard/Rule Credit Card Number Primary Account Number (PAN) CVV/CV2/CID 3 digits on the back for Visa/MC 4 digits on the front for AMEX Magnetic Stripe Data (very rare) First and last name Plus one of the following: Social security number Credit card number Bank account number Financial account number Driver license or state ID number First and last name Plus one of the following (Protected Health Information) the past, present, or future physical or mental health, or condition of an individual provision of health care to an individual payment for the provision of health care to an individual

Where Sensitive Data might be? Application Tables - Tables owned by the application and probably well-known Custom tables - Customizations to package applications may be used to store or process sensitive data Maintenance tables - DBA copies tables to make backup prior to direct SQL update - hr.per_all_people_f_011510 Interface tables - Credit card numbers are often accepted in external applications and stored in temporary tables prior to processing Interface files - Flat files used for interfaces or batch processing Log files - Log files generated by the application (e.g., ipayment) Database File System

Integrigy Data Protection Process 1 Enterprise Data Privacy Policy Data Protection Policy to the data element level 2 Data Discovery and Design Detailed Data Inventory (element table.column action) Annually 3 Application Encryption E1 Database Access Controls D1 Database Encryption (disk or database) E2 Auditing A1 Clone 4 Scrambling/ Data Masking S1 5 Security, Hardening, and General IT Controls Production Test/Development

Types of Encryption Storage (Data at rest) - Disk, storage, media level encryption - Encryption of data at rest such as when stored in files or on media Access (Data in use)* - Application or database level encryption - Encryption of data with access permitted only to a subset of users in order to enforce segregation of duties Network (Data in motion) - Encryption of data when transferred between two systems - SQL*Net encryption (database)

Storage/Access Oracle Encryption Solutions Application (access ~ role) Database (access ~ db account) Native application encryption Database Encryption API (DBMS_CRYPTO/Voltage) View/Trigger Encryption Data in Use Disk/Storage (access = database) Transparent Data Encryption (TDE) Third-party Solutions (e.g., Vormetric) Disk/SAN Vendor Encryption Solutions Backup Encryption (e.g., RMAN) Data at Rest

Agenda Database Encryption Data in Use Q&A 1 2 3 4 5 Data at Rest Data in Motion

What is Oracle TDE? Transparent database encryption - Requires no application code or database structure changes to implement - Only major change to database function is the Oracle Wallet must be opened during database startup - Add-on feature licensed with Advanced Security Option Limited to encrypting only certain columns - Cannot be a foreign key or used in another database constraint - Only simple data types like number, varchar, date, - Less than 3,932 bytes in length

What does TDE do and not do? TDE only encrypts data at rest TDE protects data if following is stolen or lost - - disk drive - database file - backup tape of the database files An authenticated database user sees no change Does TDE meet legal requirements for encryption? - California SB1386, Payment Card Industry Data Security - Ask your legal department

TDE Encryption Misconceptions Not an access control tool - Encryption does not solve access control problems - Data is encrypted the same regardless of user Malicious employee protection - Encryption does not protect against malicious privileged employees and contractors - DBAs have full access More is not better - Performance cost of encryption - Cannot encrypt everything

Column vs. Tablespace Encryption (Sample) Column encryption - Fairly straight forward for simple cases such as NATIONAL_IDENTIFIER in HR.PER_ALL_PEOPLE_F - Encryption done in place using ALTER TABLE - Do not use SALT if column is indexed - Use for standard applications columns Tablespace encryption - Tablespace encryption only supported in 11g and 12c - Tablespace must be exported and imported to implement encryption - Use for custom tablespaces or entire database

Tablespace Encryption Protects during operations like JOIN and SORT - Data is safe when it is moved to temporary tablespaces Allows index range scans on data in encrypted tablespaces - Not possible with column-based transparent data encryption

Performance Considerations Impact is limited to CPU performance - Data must be encrypted and decrypted - Highly dependent on access patterns to data - Hardware cryptographic acceleration with AES-NI processors No disk I/O read or write impact - Change is not significant Column Encryption - 5% to 20% CPU performance impact for several customers Tablespace Encryption - Encrypting entire database is feasible - 5% to 10% CPU performance impact for one customer on high transaction volume tables

Performance Considerations 1. Range scan (between/like) on indexed column - where a.birth_date between start_date and end_date - Index will not be used full table scan 2. Join on encrypted columns - where a.ssn = b.ssn - Encryption key is unique for each table - Full table scan of both tables - All values in both tables decrypted

TDE Best Practices Ensure wallet is not backed up with the db files Protect the wallet - Backup the wallet - File permissions When encrypting large volumes of data, should create a new tablespace and shred the old one - Unencrypted data may remain in tablespace blocks Mix and match column and tablespace encryption - Column for standard tables and tablespace for custom Avoid using PKI Certificates for master key

Oracle TDE Demonstration

Hardware Security Modules (HSM) HSMs are physical devices - Secure storage for encryption keys - Secure computational space (memory) for encryption and decryption Oracle TDE fully certified to use HSMs - More secure alternative to the Oracle wallet - Several third party vendors Vormetric

Third-Party Encryption - Vormetric Vormetric Transparent Encryption Protects structured/unstructured data Encryption & key management Policy-based access control Security Intelligence Privileged Users *$^!@#)( - _}?$%-:>> root SA user Approved Processes and Users John Smith 401 Main Street Vormetric Security Intelligence Logs to SIEM Database User Application Database Allow/Block Encrypt/Decrypt Vormetric Data Security Manager on Enterprise premise or in cloud virtual or physical appliance File Systems Storage Volume Managers Big Data, Databases or Files

Auditing Oracle TDE Usage Key management is critical - Where is wallet stored? Auto open? Backed up? - How is wallet protected? HSM used? Column vs. Tablespace encryption - What tables, columns, and tablespaces? - What Encryption algorithms? SELECT * FROM dba_encrypted_columns; SELECT tablespace_name, encrypted FROM dba_tablespaces;

Agenda Database Encryption Data in Use Q&A 1 2 3 4 5 Data at Rest Data in Motion

Data in Use Encryption Solutions Application (access ~ role) Database (access ~ db account) Application encrypts and decrypts when reading and writing data Uses standard or custom encryption routines Encryption routines check security View/Trigger Encryption Solution View used when reading data Trigger used when writing data Calls encryption routines which check security

Data in Use Encryption Solutions DBMS_CRYPTO Oracle Database Supports most major encryption and hash algorithms New database versions add newer encryption and hash algorithms No key management DBMS_OBFUSCATION_TOOLKIT Deprecated and should not be used Voltage API Third Party Format preserving encryption Vormetric API Many others such as OPENSSL, etc.

Auditing Application Encryption Difficult to audit as it is application specific and stored in application code - Some package applications have robust encryption capabilities Key management is critical - How are keys stored, protected, rotated? - Keys should not be hard-coded in wrapped PL/SQL code fairly common even for packaged applications Methods and types of encryption - What routines are used for encryption? Standard database, third-party libraries, custom developed? - Custom developed routines should never be used - What encryption algorithms are used?

Agenda Database Encryption Data in Use Q&A 1 2 3 4 5 Data at Rest Data in Motion

Database Network Encryption Oracle SQL*Net Encryption - Encrypts SQL*Net traffic between the client and the database listener - Configured in sqlnet.ora - Now included with the database used to be part of Advanced Security Options (ASO) All data will be encrypted transmitted between client and server - The database password is always protected and never sent in clear-text

SQL*Net Encryption Setup Configure in sqlnet.ora on either or both the server and client Server SQLNET.ENCRYPTION_SERVER = [accepted rejected requested required] SQLNET.ENCRYPTION_TYPES_SERVER = (encryption algorithms) Client SQLNET.ENCRYPTION_CLIENT = [accepted rejected requested required] SQLNET.ENCRYPTION_TYPES_CLIENT = (encryption algorithms) Algorithms = AES256 AES192 AES128 3DES168 3DES112 RC4_256 RC4_128 RC4_56 RC4_40 DES DES40

Client SQL*Net Encryption Options SERVER Required Requested Accepted Rejected Required On On On ERROR Requested On On On Off Accepted On On Off Off Rejected ERROR Off Off Off

Auditing SQL*Net Encryption Can check in the database if connections are using encryption - Do not know what encryption algorithm is being used select NETWORK_SERVICE_BANNER from v$session_connect_info NETWORK_SERVICE_BANNER ----------------------------------------------------------------------------------------------------- Windows NT TCP/IP NT Protocol Adapter for 32-bit Windows: Version 11.2.0.2.0 - Production Oracle Advanced Security: encryption service for 32-bit Windows: Version 11.2.0.2.0 - Production Oracle Advanced Security: crypto-checksumming service for 32-bit Windows: Version 11.2.0.2.0 Prod

Auditing SQL*Net Encryption Review the settings in sqlnet.net - If encryption is required, then REQUIRED should be used - Review the encryption algorithms used should be always AES and 3DES Encryption and auditing - If database auditing solutions such as Imperva or Guardium are used in network tap mode, then encryption may blind these tools

Agenda Database Encryption Data in Use Q&A 1 2 3 4 5 Data at Rest Data in Motion

Contact Information Stephen Kost Chief Technology Officer Integrigy Corporation web: www.integrigy.com e-mail: info@integrigy.com blog: integrigy.com/oracle-security-blog youtube: youtube.com/integrigy