Oracle ACFS Security and Encryption. An Oracle White Paper April, 2011



Similar documents
An Oracle White Paper July Oracle ACFS

An Oracle White Paper March Oracle Transparent Data Encryption for SAP

An Oracle White Paper June Security and the Oracle Database Cloud Service

An Oracle White Paper July Introducing the Oracle Home User in Oracle Database 12c for Microsoft Windows

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

Oracle Recovery Manager 10g. An Oracle White Paper November 2003

Load Balancing Oracle Web Applications. An Oracle White Paper November 2004

An Oracle White Paper March Integrating Microsoft SharePoint Server With Oracle Virtual Directory

An Oracle White Paper December Advanced Network Compression

An Oracle White Paper January Using Oracle's StorageTek Search Accelerator

An Oracle White Paper August Oracle Database Auditing: Performance Guidelines

Oracle Easy Connect Naming. An Oracle White Paper October 2007

Oracle Insurance General Agent Hardware and Software Requirements. Version 8.0

Oracle Identity Management: Integration with Windows. An Oracle White Paper December. 2004

Enterprise Manager 10g Backup, Recovery and Disaster Recovery Considerations. An Oracle White Paper March 2004

Managed Storage Services

Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003

An Oracle White Paper June, Provisioning & Patching Oracle Database using Enterprise Manager 12c.

An Oracle White Paper September Advanced Java Diagnostics and Monitoring Without Performance Overhead

An Oracle White Paper February Real-time Data Warehousing with ODI-EE Changed Data Capture

An Oracle White Paper September Oracle WebLogic Server 12c on Microsoft Windows Azure

An Oracle White Paper September Oracle Database and the Oracle Database Cloud

An Oracle White Paper October BI Publisher 11g Scheduling & Apache ActiveMQ as JMS Provider

One View Report Samples Financials

Sun ZFS Storage Appliance Rule-Based Identity Mapping Between Active Directory and Network Information Services Implementation Guide

An Oracle Technical White Paper May How to Configure Kaspersky Anti-Virus Software for the Oracle ZFS Storage Appliance

SaaS Data Architecture. An Oracle White Paper Oct 2008

<Insert Picture Here> Managing Storage in Private Clouds with Oracle Cloud File System OOW 2011 presentation

Oracle Business Intelligence Enterprise Edition Plus and Microsoft Office SharePoint Server. An Oracle White Paper October 2008

One View Report Samples Warehouse Management

Oracle BI Publisher Enterprise Cluster Deployment. An Oracle White Paper August 2007

An Oracle Technical White Paper June Oracle VM Windows Paravirtual (PV) Drivers 2.0: New Features

Maximum Availability Architecture. Oracle Best Practices For High Availability. Backup and Recovery Scenarios for Oracle WebLogic Server: 10.

Oracle Whitepaper April Security and the Oracle Database Cloud Service

Using Symantec NetBackup with VSS Snapshot to Perform a Backup of SAN LUNs in the Oracle ZFS Storage Appliance

Configuring Microsoft Active Directory for Oracle Net Naming. An Oracle White Paper April 2014

Configuring Microsoft Active Directory 2003 for Net Naming. An Oracle White Paper September 2008

Deliver Oracle BI Publisher documents to Microsoft Office SharePoint Server An Oracle White Paper July 2008

An Oracle White Paper October Oracle Database and IPv6 Statement of Direction

An Oracle White Paper January A Technical Overview of New Features for Automatic Storage Management in Oracle Database 12c

Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory. Overview August 2008

An Oracle White Paper May Distributed Development Using Oracle Secure Global Desktop

An Oracle White Paper May Oracle Database Cloud Service

Oracle Secure Backup 10.2 Policy-Based Backup Management. An Oracle White Paper December 2007

Oracle VM Manager Template. An Oracle White Paper February 2009

An Oracle White Paper November Oracle Business Intelligence Standard Edition One 11g

CONFIGURING IIS WEB APPLICATIONS FOR USE WITH TIME MACHINE

Monitoring and Diagnosing Production Applications Using Oracle Application Diagnostics for Java. An Oracle White Paper December 2007

An Oracle White Paper November Leveraging Massively Parallel Processing in an Oracle Environment for Big Data Analytics

Oracle FLEXCUBE Direct Banking Release Retail Credit Card User Manual. Part No. E

Express Implementation for Electric Utilities

Oracle Database Backup Service. Secure Backup in the Oracle Cloud

An Oracle White Paper June Oracle Linux Management with Oracle Enterprise Manager 12c

Oracle Fusion Middleware

An Oracle White Paper April, Effective Account Origination with Siebel Financial Services Customer Order Management for Banking

An Oracle White Paper January Oracle Database Backup Service A Technical White Paper

Highly Available NFS over Oracle ASM Cluster File System (ACFS)

An Oracle White Paper April How to Install the Oracle Solaris 10 Operating System on x86 Systems

Oracle Enterprise Manager

An Oracle Communications White Paper December Serialized Asset Lifecycle Management and Property Accountability

An Oracle White Paper November Oracle Real Application Clusters One Node: The Always On Single-Instance Database

An Oracle White Paper July Accelerating Database Infrastructure Using Oracle Real Application Clusters 11g R2 and QLogic FabricCache Adapters

OpenLDAP Oracle Enterprise Gateway Integration Guide

Oracle FLEXCUBE Direct Banking Release Corporate E-Factoring User Manual. Part No. E

Oracle SQL Developer Migration. An Oracle White Paper September 2008

An Oracle White Paper December Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance

An Oracle White Paper October Realizing the Superior Value and Performance of Oracle ZFS Storage Appliance

Migration Best Practices for OpenSSO 8 and SAM 7.1 deployments O R A C L E W H I T E P A P E R M A R C H 2015

Implementing a Custom Search Interface with SES - a case study with search.oracle.com. An Oracle White Paper June 2006

An Oracle White Paper July Oracle Linux and Oracle VM Remote Lab User Guide

Achieving Sarbanes-Oxley Compliance with Oracle Identity Management. An Oracle White Paper September 2005

An Oracle White Paper June Oracle Database 11g: Cost-Effective Solutions for Security and Compliance

An Oracle White Paper June Encryption and Redaction in Oracle Database 12c with Oracle Advanced Security

Oracle Directory Services Integration with Database Enterprise User Security O R A C L E W H I T E P A P E R F E B R U A R Y

Oracle Hyperion Financial Management Virtualization Whitepaper

Integrating Tutor and UPK Content: A Complete User Documentation Solution. An Oracle White Paper April 2008

Evolution from the Traditional Data Center to Exalogic: An Operational Perspective

IIS Reverse Proxy Implementation

An Oracle White Paper June How to Install and Configure a Two-Node Cluster

Performance with the Oracle Database Cloud

Flexible Routing and Load Control on Back-End Servers. Controlling the Request Load and Quality of Service

An Oracle White Paper November Backup and Recovery with Oracle s Sun ZFS Storage Appliances and Oracle Recovery Manager

Guide to Database as a Service (DBaaS) Part 2 Delivering Database as a Service to Your Organization

An Oracle White Paper January Oracle Database Firewall

Disaster Recovery for Oracle Database

Running Oracle s PeopleSoft Human Capital Management on Oracle SuperCluster T5-8 O R A C L E W H I T E P A P E R L A S T U P D A T E D J U N E

<Insert Picture Here> Oracle Cloud Storage. Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska

EMC DATA DOMAIN ENCRYPTION A Detailed Review

MANAGING A SMOOTH MARKETING AUTOMATION SOFTWARE IMPLEMENTATION

Oracle Total Recall with Oracle Database 11g Release 2

Driving Down the High Cost of Storage. Pillar Axiom 600

G Cloud 7 Pricing Document

Mobile Technology for Wealth Management Advisors

Automatic Service Migration in WebLogic Server An Oracle White Paper July 2008

SIX QUESTIONS TO ASK ANY VENDOR BEFORE SIGNING A SaaS E-COMMERCE CONTRACT

An Oracle White Paper September Directory Services Integration with Database Enterprise User Security

An Oracle White Paper February Oracle Data Integrator 12c Architecture Overview

Top Ten Reasons for Deploying Oracle Virtual Networking in Your Data Center

Oracle TimesTen In-Memory Database on Oracle Exalogic Elastic Cloud

Transcription:

Oracle ACFS Security and Encryption An Oracle White Paper April, 2011

Oracle ACFS Security and Encryption Executive Overview... 3 Oracle ACFS Security... 3 Oracle ACFS Security Rule Set and Rules... 4 Basic ACFS Security Steps:... 5 Examples... 5 Accessing Medical Records... 5 Protecting TDE Wallet... 6 Oracle ACFS Encryption... 7 Basic ACFS Encryption Steps:... 7 Example... 8 Conclusion... 8 Oracle ACFS Security and Encryption Page 2

Oracle ACFS Security and Encryption EXECUTIVE OVERVIEW Oracle Automatic Storage Management Cluster File System (ACFS) is a major component of the Oracle Cloud File System, which is designed to help organizations to deploy their applications, databases and storage in private clouds. Oracle ACFS security and encryption are part of ACFS integrated data services. Other ACFS data services include snapshots, tagging, and replication. The combined capabilities of Oracle ACFS security and encryption provide the security foundation for ACFS and the Oracle Cloud File System. ORACLE ACFS SECURITY Oracle ACFS security provides realm-based security for Oracle ACFS file systems, enabling users to create realms and specify security policies for users and groups to control access to file system objects. This security feature provides a fine-grained access control on top of the access control provided by the operating system. Oracle ACFS security uses realms, rules, rule sets, and command rules to enforce security policies. An Oracle ACFS realm is a virtual container of files and directories; access is defined by security filters (command rules and rule sets) Oracle security rules are Boolean expressions based on system parameters such as: time, user name, host name, IP address and application rules; they enable multi-factor authorization for realm secured files and directories Rule set is a set of one or more security rules Command rules are associations of file system operations such as open, create, read, write, close etc.; they enable fine-grained access control An ACFS security administrator manages security for all ACFS file systems in a cluster and has a security administration password that is different from his/her OS password. The security administration password is stored in an Oracle Oracle ACFS Security and Encryption Page 3

Wallet for additional security, and all security commands are protected by this password. ACFS security has feature-rich Command Line Interface (CLI) that supports Creation and destruction of realms Addition and deletion of users, groups, rule sets, and command rules to realms. Creation, modification, and destruction of rules and rule sets Backup and restore of ACFS security policies Batch command that supports executing several commands at once Info commands that display details about all aspects of ACFS security ASM Configuration Assistant (ASMCA) GUI tool also provides basic configuration of ACFS security. Oracle ACFS security can utilize the encryption feature to protect the contents of realm-secured files stored in Oracle ACFS file systems. Oracle ACFS Security Rule Set and Rules It is important to understand the concept of security rule set and rules to take full advantage of the ACFS security feature. The security rule set option is either ALL_TRUE or ANY_TRUE, and the default is ALL_TRUE. ALL_TRUE means that all the rules in the rule set must be evaluated to grant access or access is denied. ANY_TRUE means any one of the rules in the rule set must be evaluated to grant access or access is denied. The security rule option is either ALLOW or DENY (access), and the default is DENY. There are four rule types: username, time, host, and applications. Below are two examples of using rule set and rules. Example 1: only allow application gedit to edit a configuration file between 9-11am. Rule set option = ALL_TRUE Rules Rule Option 1. Application=gedit Allow 2. Time=9-11am Allow If another application like vi tries to edit the configuration file between 9-11am, it will fail rule 1, so no access to the file is allowed. Oracle ACFS Security and Encryption Page 4

Example 2: allow user to access files in two different time windows: 8-10am and 2-4pm. Rule set option = ANY_TRUE Rules Rule Option 1. Time=8-10am Allow 2. Time=2-4pm Allow Access to files outside of the two time windows will not work because it will fail both rules 1 and 2. Basic ACFS Security Steps: Cluster wide commands Command User Function acfsutil sec init Root Initialize ACFS security for the cluster acfsutil sec admin add/delete acfsutil sec admin password Security Administrator Security Administrator Add/remove an ACFS security administrator Change the password of an existing ACFS security administrator Only a security administrator can run the following commands. Command Function acfsutil sec prepare Prepare an ACFS file system for ACFS security (per file system) acfsutil sec realm Create/destroy an ACFS security realm create/destroy acfsutil sec realm Add/delete objects in an ACFS security add/delete realm acfsutil sec rule create Create an ACFS security rule acfsutil sec ruleset Create an ACFS security ruleset create acfsutil sec info Display ACFS security information (Realms, Rules, Rulesets, Realm properties of files) Examples Accessing Medical Records To setup a system so that only designated person (MedHistAdmin2) can access medical records between 10pm and 2am. 1. Initialize Oracle ACFS security # /sbin/acfsutil sec init u SecAdmin g SecAdminGrp ; Designate an OS user as the first security administrator $ /sbin/acfsutil sec admin passwd $ /sbin/acfsutil sec admin add SecAdmin2 ; Add additional security admin Oracle ACFS Security and Encryption Page 5

2. Prepare and enable an ACFS file system for security $ /sbin/acfsutil sec prepare m /acfsmounts/acfs1 3. Create a security realm on the file system $ /sbin/acfsutil sec realm create MedHistRealm m /acfsmounts/acfs1 e on a AES k 128 -d Realm for Medical History information 4. Create security rules $ /sbin/acfsutil sec rule create MedHistRule1a m /acfsmounts/acfs1 t time 22:00:00, 02:00:00 o ALLOW 5. Create security rule set $ /sbin/acfsutil sec ruleset create MedRuleSet1 m /acfsmounts/acfs1 6. Add rules to rule sets $ /sbin/acfsutil sec ruleset edit MedRulesSet1 m /acfsmounts/acfs1 a MedHistRule1a 7. Add objects to a security realm $ /sbin/acfsutil sec realm add MedHistRealm m /acfsmounts/acfs1 l ALL:MedRuleSet1 -f r /acfsmounts/acfs1/medicalrecords A simple way to test this is try to access (as SecAdmin2) the medical record both inside and outside of the 10pm-2am window. Protecting TDE Wallet To protect Oracle Transparent Data Encryption (TDE) wallet on the ACFS file system (by allowing only Oracle binary to access the wallet.) The file system mounted on /u01/app/oracle/acfsmounts/data_tdevolume for security 1. Create a realm $ /sbin/acfsutil sec realm create TDEWalletRealm -m /u01/app/oracle/acfsmounts/data_tdevolume -d "Realm to secure the TDE Wallet" -e off 2. Create a rule $ /sbin/acfsutil sec rule create alloworacleapprule m /u01/app/oracle/acfsmounts/data_tdevolume t application /path_to/oraclebinary o ALLOW 3. Create a ruleset $ /sbin/acfsutil sec ruleset create TDEWalletRuleSet m /u01/app/oracle/acfsmounts/data_tdevolume 4. Add the rule in the ruleset Oracle ACFS Security and Encryption Page 6

$ /sbin/acfsutil sec ruleset edit TDEWalletRuleSet m /u01/app/oracle/acfsmounts/data_tdevolume -a alloworacleapprule -o ALL_TRUE 5. Specify option ALL for the ruleset $ /sbin/acfsutil sec realm add TDEWalletRealm m /u01/app/oracle/acfsmounts/data_tdevolume -u oracle -l ALL:TDEWalletRuleSet f -r /u01/app/oracle/acfsmounts/data_tdevolume/data_wallet A simple way to test this is try to access (ls, vi, cat, etc.) the TDE wallet as root or security administrator, and it should fail. ORACLE ACFS ENCRYPTION Oracle ACFS encryption enables users to encrypt data stored on disk (data-atrest). The encryption feature protects data in an Oracle ACFS file system and prevents unauthorized use of data in the case of data loss or theft. ACFS encryption can be applied to the entire file system or just individual files and directories. It is completely transparent to authorized users, and applications work unchanged with encrypted files. Encrypted and unencrypted files can co-exist on the same file system. System administrators and Oracle ACFS security administrators can initiate encryption operations. Also, users can encrypt and decrypt files they own. Each file is protected by two keys, the file encryption key (FEK) and the volume encryption key (VEK). File data is encrypted using a unique FEK; the FEK is stored on disk, and is encrypted using a VEK. Volume encryption keys are stored in an Oracle Wallet, which can be password protected, in the OCR. Data is encrypted when flushed to disk and decrypted when read from disk. Encryption performance varies depending on the workload, and there s minimal overhead when working with cached data. An Oracle ACFS security administrator can manage encryption parameters on a per-realm basis. The dual key (VEK and FEK) implementation enhances data protection and allows fast VEK rekeying. By using a separate master VEK, only FEK of each file needs to be re-encrypted instead of all of the file data. Basic ACFS Encryption Steps: Oracle ACFS Security and Encryption Page 7

Command Tool Example acfsutil encr init acfsutil encr set acfsutil encr on/off acfsutil encr rekey Function Initialize the cluster for encryption, and creates the OCR encryption key store for storing volume encryption keys Sets encryption parameters on a particular file system Turns on/off encryption, this can be done for the entire file system or for individual files or directories Create a new FEK or VEK Example Below is an usage example: 1. create storage for encryption keys # /sbin/acfsutil encr init 2. Set encryption parameters # /sbin/acfsutil encr set -a AES -k 256 -m /u01/app/acfsmounts/myacfs 3. Encrypt an ACFS file system # /sbin/acfsutil encr on -m /u01/app/acfsmounts/myacfs 4. Turn off encryption # /sbin/acfsutil encr off -m /u01/app/acfsmounts/myacfs One way to check the encryption is to dd the file after it is encrypted, and examines the file to ensure it s not readable. CONCLUSION Oracle ACFS security provides realm-based security for Oracle ACFS file systems, and it provides a fine-grained access control on top of the access control provided by the operating system. Oracle ACFS encryption enables users to encrypt data stored on disk, and it protects data in an Oracle ACFS file system and prevents unauthorized use of data in the case of data loss or theft. Together Oracle ACFS security and encryption provide a robust security foundation for ACFS as well the Oracle Cloud File System. Oracle ACFS Security and Encryption Page 8

ACFS Security and Encryption April, 2011 Author: Paul Tsien Contributing Authors: Balaji Pagadala, Harsha Sabbineni, Samarjeet Tomar Oracle Corporation World Headquarters 500 Oracle Parkway Redwood Shores, CA 94065 U.S.A. Worldwide Inquiries: Phone: +1.650.506.7000 Fax: +1.650.506.7200 www.oracle.com Copyright 2003, Oracle. All rights reserved. This document is provided for information purposes only and the contents hereof are subject to change without notice. This document is not warranted to be error-free, nor subject to any other warranties or conditions, whether expressed orally or implied in law, including implied warranties and conditions of merchantability or fitness for a particular purpose. We specifically disclaim any liability with respect to this document and no contractual obligations are formed either directly or indirectly by this document. This document may not be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without our prior written permission. Oracle is a registered trademark of Oracle Corporation and/or its affiliates. Other names may be trademarks of their respective owners.