Oracle Database Security



Similar documents
Complete Database Security. Thomas Kyte

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

Oracle Database Security. Paul Needham Senior Director, Product Management Database Security

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Protecting Sensitive Data Reducing Risk with Oracle Database Security

<Insert Picture Here> Oracle Database Security Overview

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

Database Security & Compliance with Audit Vault and Database Firewall. Pierre Leon Database Security

Oracle Identity Management Securing The New Digital Experience

Securing Data in Oracle Database 12c

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

Hayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks

Oracle Audit Vault and Database Firewall

Data Security: Strategy and Tactics for Success

Oracle Audit Vault and Database Firewall. Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska

<Insert Picture Here> Oracle Database Vault

<Insert Picture Here> How to protect sensitive data, challenges & risks

Oracle Database Security Solutions

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Managing Oracle E-Business Suite Security

An Oracle White Paper June Oracle Database 11g: Cost-Effective Solutions for Security and Compliance

Why Add Data Masking to Your IBM DB2 Application Environment

An Oracle White Paper April Oracle Audit Vault and Database Firewall

Oracle Information Security Visioni

Safeguard Sensitive Data in EBS: A Look at Oracle Database Vault, Transparent Data Encryption, and Data Masking. Lucy Feng

An Oracle White Paper April Security and Compliance with Oracle Database 12c

Guardium Change Auditing System (CAS)

Database Security Questions HOUG Fehér Lajos. Copyright 2015, Oracle and/or its affiliates. All rights reserved.

An Oracle White Paper June Security and Compliance with Oracle Database 12c

Application Testing Suite Overview

MySQL Security: Best Practices

Copyright 2014 Oracle and/or its affiliates. All rights reserved.

Intelligent Security Design, Development and Acquisition

Cost Effective Data Management for Oracle Utilities Applications

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Making Database Security an IT Security Priority

Oracle Database 11g: Security. What you will learn:

Oracle Database 11g: Security Release 2. Course Topics. Introduction to Database Security. Choosing Security Solutions

Database Auditing & Security. Brian Flasck - IBM Louise Joosse - BPSolutions

<Insert Picture Here> Application Change Management and Data Masking

Governance, Risk & Compliance for Public Sector

Oracle Database Security Services

Why Standardize on Oracle Database 11g Next Generation Database Management. Thomas Kyte

Cybersecurity Health Check At A Glance

Oracle 1Z0-528 Exam Questions & Answers

Security Controls for the Autodesk 360 Managed Services

Protecting Your Organisation from Targeted Cyber Intrusion

An Oracle White Paper January Oracle Database Firewall

Seven Things To Consider When Evaluating Privileged Account Security Solutions

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

Database Auditing: Best Practices. Rob Barnes, CISA Director of Security, Risk and Compliance Operations

Oracle Database 11g: Security

D50323GC20 Oracle Database 11g: Security Release 2

Security Management. Keeping the IT Security Administrator Busy

Kovaion Data Masking Solution

An Oracle White Paper January Oracle Database Firewall

APPLICATION COMPLIANCE AUDIT & ENFORCEMENT

Installing and Configuring Guardium, ODF, and OAV

Obtaining Value from Your Database Activity Monitoring (DAM) Solution

Oracle Database 11g: Security Release 2

How To Secure A Database From A Leaky, Unsecured, And Unpatched Server

Data-Centric Security vs. Database-Level Security

Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking

Oracle Database 12c Plug In. Switch On. Get SMART.

Oracle Database Public Cloud Services

An Oracle White Paper June Oracle Database Firewall 5.0 Sizing Best Practices

05.0 Application Development

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

Application Monitoring for SAP

Oracle Database 12c. Peter Schmidt Systemberater Oracle Deutschland BV & CO KG

Oracle Cloud Strategy. Sudip Datta Vice President of Product Management

<Insert Picture Here> Oracle Database Directions Fred Louis Principal Sales Consultant Ohio Valley Region

The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention

How To Manage Security On A Networked Computer System

Global ediscovery Client Data Security. Managed technology for the global legal profession

Privileged Session Management Suite: Solution Overview

Oracle Database 12c Security and Compliance O R A C L E W H I T E P A P E R F E B R U A R Y

Transcription:

<Insert Picture Here> Oracle Database Security Paul Needham, Senior Director, Product Management, Database Security

Target of Data Breaches 2010 Data Breach Investigations Report Type Category % Breaches % Records Database Server Servers & Applications 25% 92% Desktop Computer End-User Devices 21% 1% 2

How do Database Breaches Occur? 48% involved privilege misuse 40% resulted from hacking 2010 Data Breach Investigations Report 38% utilized malware 28% employed social tactics 15% comprised physical attacks 3

Oracle Maximum Security Architecture Secure Configuration Scanning Patch Management Oracle Audit Vault Enterprise Manager Grid Control Applications Procurement Sensitive Auditing Authorization Confidential HR Authentication Rebates Public Unauthorized DBA Activity Multi-factor Authorization DB Consolidation Security Oracle Database Vault Oracle Database Firewall Encrypted Database Encrypted Traffic Oracle Advanced Security Mask For Test and Dev Oracle Data Masking 4

Database Defense-in-Depth Monitoring and Blocking Oracle Database Firewall Auditing and Tracking Oracle Audit Vault Oracle Configuration Management Oracle Total Recall Access Control Oracle Database Vault Oracle Label Security Encryption and Masking Oracle Advanced Security Oracle Secure Backup Oracle Data Masking 5

Database Defense-in-Depth Blocking and Monitoring Oracle Database Firewall 6

Oracle Database Firewall First Line of Defense Allow Log Alert Applications Substitute Block Alerts Built-in Reports Custom Reports Policies Monitor database activity to help prevent unauthorized activity, application bypass and SQL injections Highly accurate SQL grammar based analysis White-list, black-list, and exception-list based security policies Built-in and custom compliance reports for regulations 7

Oracle Database Firewall Positive Security Model Based Enforcement White List Allow Applications Block White-list based policies enforce normal or expected behavior Policies evaluate factors such as time, day, network, and application Easily generate white-lists for any application Out of policy SQL statements can be logged, alerted, blocked or substituted with a harmless SQL statement SQL substitution foils attackers without disrupting applications 8

Oracle Database Firewall Negative Security Model Based Enforcement Black List Allow Applications Block Stop specific unwanted SQL commands, user, or schema access Prevent privilege or role escalation and unauthorized access to sensitive data Black list policies can evaluate factors such as day, time, network, and application 9

Oracle Database Firewall Scalable and Safe Policy Enforcement Log Applications Allow SELECT * FROM accounts Becomes Alert Substitute SELECT * FROM dual where 1=0 Block Innovative SQL grammar technology reduces millions of SQL statements into a small number of SQL characteristics or clusters Flexible enforcement at SQL level: block, substitute, alert and pass, log only SQL substitution foils attackers without disrupting applications Centralized policy management and reporting Superior performance and policy scalability 10

11

12

13

14

15

Database Defense-in-Depth Monitoring and Blocking Oracle Database Firewall Auditing and Tracking Oracle Audit Vault Oracle Configuration Management Oracle Total Recall 16

Oracle Audit Vault Automated Activity Monitoring & Audit Reporting HR Data! Alerts CRM Data ERP Data Audit Data Built-in Reports Custom Reports Databases Policies Auditor Consolidate audit data into secure repository Detect and alert on suspicious activities Out-of-the box compliance reporting Centralized audit policy management 17

18

19

20

Database Defense-in-Depth Monitoring and Blocking Oracle Database Firewall Auditing and Tracking Oracle Audit Vault Oracle Configuration Management Oracle Total Recall Access Control Oracle Database Vault Oracle Label Security 21

Oracle Database Vault Privileged Account Controls Application Procurement HR Finance DBA select * from finance.customers Limit access of privileged accounts No application changes required Works with Oracle Exadata Database Machine Protect application data and prevent application by-pass 22

Step 2. Adding Protected Schema 24

Database Defense-in-Depth Monitoring and Blocking Oracle Database Firewall Auditing and Tracking Oracle Audit Vault Oracle Configuration Management Oracle Total Recall Access Control Oracle Database Vault Oracle Label Security Encryption and Masking Oracle Advanced Security Oracle Secure Backup Oracle Data Masking 27

Oracle Advanced Security Transparent Data Encryption Disk Backups Exports Application Off-Site Facilities No application changes required Efficient encryption of all application data Built-in key lifecycle management Works with Exadata V2 Smart Scans Works with Oracle Advanced Compression 28

Oracle Data Masking Irreversible De-Identification Production LAST_NAME SSN SALARY AGUILAR 203-33-3234 40,000 BENSON 323-22-2943 60,000 Non-Production LAST_NAME SSN SALARY ANSKEKSL 111 23-1111 40,000 BKJHHEIEDK 222-34-1345 60,000 Remove sensitive data from non-production databases Referential integrity preserved so applications continue to work Extensible template library and policies for automation 31

Oracle Database Security Products Heterogeneous Oracle Databases Oracle Database Firewall Oracle Audit Vault Oracle Data Masking Oracle Advanced Security Oracle Database Vault Oracle Label Security Oracle Configuration Management 32

Oracle Database Security Solutions Inside. Outside. Complete. Preventive and detective controls within the Oracle database Database Firewall to prevent threats from reaching databases Transparent no changes to existing applications Complete integrated solutions for lower TCO Encryption & Masking Access Control Auditing & Tracking Monitoring & Blocking Advanced Security Database Vault Audit Vault Database Firewall Secure Backup Label Security Total Recall Data Masking Identity Management Configuration Management 33

For More Information search.oracle.com database security oracle.com/database/security