Oracle Audit Vault and Database Firewall



Similar documents
Oracle Audit Vault and Database Firewall. Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska

Hayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks

Database Security & Compliance with Audit Vault and Database Firewall. Pierre Leon Database Security

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

Oracle Database Security

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Protecting Sensitive Data Reducing Risk with Oracle Database Security

Oracle Database Security. Paul Needham Senior Director, Product Management Database Security

Complete Database Security. Thomas Kyte

An Oracle White Paper April Oracle Audit Vault and Database Firewall

An Oracle White Paper January Oracle Database Firewall

Securing Data in Oracle Database 12c

<Insert Picture Here> Oracle Database Security Overview

How To Secure A Database From A Leaky, Unsecured, And Unpatched Server

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

MySQL Security: Best Practices

Oracle Identity Management Securing The New Digital Experience

An Oracle White Paper January Oracle Database Firewall

<Insert Picture Here> Oracle Database Vault

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

Guardium Change Auditing System (CAS)

An Oracle White Paper April Security and Compliance with Oracle Database 12c

Real-Time Database Protection and. Overview IBM Corporation

Oracle Database 11g: Security. What you will learn:

Security and Control Issues within Relational Databases

An Oracle White Paper June Security and Compliance with Oracle Database 12c

Oracle Database 11g: Security Release 2. Course Topics. Introduction to Database Security. Choosing Security Solutions

Oracle Database Security Myths

Implementing Database Security and Auditing

Obtaining Value from Your Database Activity Monitoring (DAM) Solution

Database Auditing: Best Practices. Rob Barnes, CISA Director of Security, Risk and Compliance Operations

Oracle Information Security Visioni

Database Security and Auditing: Leading Practices. Rob Barnes Director, Enterprise Auditing Solutions Application Security, Inc.

D50323GC20 Oracle Database 11g: Security Release 2

Data Breaches and Web Servers: The Giant Sucking Sound

<Insert Picture Here> Playing in the Same Sandbox: MySQL and Oracle

Enterprise Database Security & Monitoring: Guardium Overview

Database Security Questions HOUG Fehér Lajos. Copyright 2015, Oracle and/or its affiliates. All rights reserved.

Data Security: Strategy and Tactics for Success

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

Oracle Database 11g: Security Release 2

Mitigating Risks and Monitoring Activity for Database Security

WordPress Security Scan Configuration

Fine Grained Auditing In Oracle 10G

Quest InTrust. Version 8.0. What's New. Active Directory Exchange Windows

An Oracle White Paper June Oracle Database 11g: Cost-Effective Solutions for Security and Compliance

An Oracle White Paper May Oracle Audit Vault and Database Firewall 12.1 Sizing Best Practices

Trust but Verify: Best Practices for Monitoring Privileged Users

SANS Top 20 Critical Controls for Effective Cyber Defense

Critical Security Controls

Oracle Database 11g: Security

Security Controls for the Autodesk 360 Managed Services

Making Database Security an IT Security Priority

SANS Institute First Five Quick Wins

Governance, Risk & Compliance for Public Sector

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services

THE BLUENOSE SECURITY FRAMEWORK

Administrator s Guide Release

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Oracle Database 11g: Administration Workshop I 11-2

8 Steps to Holistic Database Security

Database Security. Principle of Least Privilege. DBMS Security. IT420: Database Management and Organization. Database Security.

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

GFI White Paper PCI-DSS compliance and GFI Software products

Database Security & Auditing

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

<Insert Picture Here> How to protect sensitive data, challenges & risks

Teradata and Protegrity High-Value Protection for High-Value Data

Worldwide Security and Vulnerability Management Forecast and 2008 Vendor Shares

FREQUENTLY ASKED QUESTIONS

APPLICATION COMPLIANCE AUDIT & ENFORCEMENT

Integrigy Corporate Overview

Intelligent Security Design, Development and Acquisition

IT360: Applied Database Systems. Database Security. Kroenke: Ch 9, pg PHP and MySQL: Ch 9, pg

Oracle Database Security

Oracle Database Security Solutions

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities

Data Security and Governance with Enterprise Enabler

Division of IT Security Best Practices for Database Management Systems

2012 Data Breach Investigations Report

IBM InfoSphere Guardium for DB2 on z/os Technical Deep Dive

Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals

IBM Security Strategy

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

Encrypting Sensitive Data in Oracle E-Business Suite

IT Security & Compliance. On Time. On Budget. On Demand.

Transcription:

<Insert Picture Here> Oracle Audit Vault and Database Firewall Angelo Maria Bosis Sales Consulting Director Oracle Italia

Billions of Database Records Breached Globally 97% of Breaches Were Avoidable with Basic Controls 98% records stolen from databases 84% records breached using stolen credentials 71% fell within minutes 92% discovered by third party

Why are Databases so Vulnerable? 80% of IT Security Programs Don t Address Database Security Forrester Research Network Security Enterprises are taking on risks that they may not even be aware Authentication & User Security SIEM of. Especially as more and more attacks against databases exploit legitimate access. Email Security Database Security Web Application Firewall Endpoint Security

Oracle Database Security Solutions Defense-in-Depth for Maximum Security PREVENTIVE DETECTIVE ADMINISTRATIVE Encryption Activity Monitoring Sensitive Data Discovery Masking Database Firewall Patch Management Privileged User Controls Auditing and Reporting Configuration Management

Oracle Database Security Solutions Defense-in-Depth for Maximum Security PREVENTIVE Advanced Encryption Security Data Masking Database Vault Label Security Privileged User Controls DETECTIVE Oracle Audit Vault and Database Firewall Activity Monitoring Database Firewall Auditing and Reporting ADMINISTRATIVE Oracle Enterprise Manager 12c Sensitive Data Discovery Oracle Patch Management Database Lifecycle Management Pack Configuration Management

Oracle Audit Vault and Database Firewall New Solution for Oracle and Non-Oracle Databases Users Applications Database Firewall Allow Log Alert Substitute Block Firewall Events Auditor Security Manager Reports Alerts Policies! Audit Vault Audit Data OS, Directory, File System & Custom Audit Logs

Oracle AVDF Accuracy Why is understanding SQL critical? SQL is a language with about 400 key words and a strict grammar structure (ISO SQL spec 1500+ pages): SELECT id, username, password, acccount_no FROM tbl_users WHERE username = Bill AND account_no BETWEEN 1001000 AND 1001012; OPERATORS KEY SCHEMA DATA WORDS Unless the grammar and structure of the language is known, then errors are made when analysing SQL UPDATE tbl_users SET comments = The user has asked for another account_no, and wishes to be billed for services between 1/2/2009 and 2/2/2009, and wants to know where the invoice should be sent to. She will select the new service level agreement to run from 3/7/2009 next month WHERE id = A15431029 ;

False Alarms are too costly

The cost of inaccuracy 3,000 transactions per second 260 million transactions per day

The cost of inaccuracy 3,000 transactions per second 260 million transactions per day 0.001% false positive rate: 260 false positives per day 7,800 audit errors per month

The cost of inaccuracy 0.0001% false negative rate: 26 successful attacks per day...it only takes one... 3,000 transactions per second 260 million transactions per day 0.001% false positive rate: 260 false positives per day 7,800 audit errors per month

Oracle AVDF Accuracy Oracle AVDF can understand every SQL interaction and correctly segregate it based on the intent of the transaction. Uses semantic analysis of the grammar and structure of a SQL transaction to determine all of the relevant information about a query. Can also associate attributes with a SQL transactions such as who, what, when, from where, by whom, with what and what happened.

Oracle Audit Vault and Database Firewall SQL Injection Protection with Positive Security Model SELECT * from stock where catalog-no='phe8131' White List Allow Applications SELECT * from stock where catalog-no= ' union select cardno,0,0 from Orders -- Allowed behavior can be defined for any user or application Automated white list generation for any application Out-of-policy database transaction detected and blocked/alerted Block Databases

Oracle Audit Vault and Database Firewall Enforcing Database Activity with Negative Security Model DBA activity from Application? DBA activity from Approved Workstation SELECT * FROM v$session SELECT * FROM v$session Black List Block Allow + Log Stop specific unwanted SQL interactions, user or schema access Blacklisting can be done on factors such as time of day, day of week, network, application, user name, OS user name etc Provide flexibility to authorized users while still monitoring activity

Oracle Audit Vault and Database Firewall Comprehensive Enterprise Audit and Log Consolidation Databases: Oracle, SQL Server, DB2 LUW, DB2 z/os*, Sybase ASE New Audit Sources Operating Systems: Microsoft Windows, Solaris Directory Services: Active Directory File Systems: Oracle ACFS Audit Collection Plugins for Custom Audit Sources XML file maps custom audit elements to canonical audit elements Collect and map data from XML audit file and database tables * Third party integration by BSC Consulting Spa & AlfaGroup

Oracle DB Auditing: Fine-Grained Auditing Audit Policy AUDIT_CONDITION : NAME!= USER AUDIT_COLUMN = SALARY Not audited SELECT name, job, deptno FROM emp Audit Records (FGA_LOG$) SELECT name, salary FROM emp <timestamp>, <SCN>, <userid>, etc. SELECT name, salary FROM emp

Oracle Database Security Solutions Defense-in-Depth for Maximum Security PREVENTIVE Encryption Masking DETECTIVE Activity Monitoring Database Firewall ADMINISTRATIVE Sensitive Data Discovery Oracle Enterprise Manager 12c Patch Management Privileged User Controls Auditing and Reporting Configuration Management

Sensitive Data Discovery Find and Catalog Sensitive Data Data Finder Patterns Table Name: EMP* Column Name *SSN* 1. 2. Data Format ### - ## - #### Enterprise Data Sources Define pattern match rules for tables, columns and data Connect to Databases Search for Data Finder patterns across databases 4. Data Privacy Catalog New database fields added and then protected PERSON_SSN, EMP_SSN, SOC_SEC_NUM 3. Data Finder Reports Data Finder Results Results rendered by confidence factor Relevant database fields imported into the Data Privacy Catalog

Oracle Audit Vault and Database Firewall Auditing and Reporting Tens of default audit reports Out-of-the Box Compliance Reporting. Report with Data from Multiple Source Types Auditing Stored Procedure Calls Not Visible on the Network Powerful Alerting Filter Conditions

Oracle Database Security Customers Customers Worldwide Rely on Oracle Customer Benefits Enterprise ready Security and compliance Simple and flexible Speed and scale Trasparent and accurate oracle.com/goto/database/security-customers

Oracle Database Security Solutions Web Sites Customer Successes Newsletters Social Media Blogs http://www.oracle.com/database/security http://www.oracle.com/technetwork/database/security http://www.oracle.com/goto/database/security-customers Security Inside Out Database Insider LindkedIn Group: Database Insider Twitter: Oracle Database http://blogs.oracle.com/securityinsideout http://blogs.oracle.com/databaseinsider

Thank you!