An Oracle White Paper June 2009. Oracle Database 11g: Cost-Effective Solutions for Security and Compliance



Similar documents
<Insert Picture Here> Oracle Database Security Overview

<Insert Picture Here> Oracle Database Vault

An Oracle White Paper January Oracle Database Firewall

An Oracle White Paper January Oracle Database Firewall

An Oracle White Paper June Security and Compliance with Oracle Database 12c

Complete Database Security. Thomas Kyte

Oracle Database Security Solutions

APPLICATION MANAGEMENT SUITE FOR ORACLE E-BUSINESS SUITE APPLICATIONS

APPLICATION MANAGEMENT SUITE FOR ORACLE E-BUSINESS SUITE APPLICATIONS

An Oracle White Paper June Security and the Oracle Database Cloud Service

An Oracle White Paper June Oracle Database Firewall 5.0 Sizing Best Practices

An Oracle White Paper August Oracle Database Auditing: Performance Guidelines

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

An Oracle White Paper March Oracle Label Security in Government and Defense Environments

ORACLE ENTERPRISE MANAGER 10 g CONFIGURATION MANAGEMENT PACK FOR ORACLE DATABASE

An Oracle White Paper April Security and Compliance with Oracle Database 12c

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

APPLICATION MANAGEMENT SUITE FOR SIEBEL APPLICATIONS

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

An Oracle White Paper June Encryption and Redaction in Oracle Database 12c with Oracle Advanced Security

An Oracle White Paper May Oracle Audit Vault and Database Firewall 12.1 Sizing Best Practices

Managed Storage Services

Attestation of Identity Information. An Oracle White Paper May 2006

MySQL Security: Best Practices

Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules

Oracle 1Z0-528 Exam Questions & Answers

An Oracle White Paper March Oracle Transparent Data Encryption for SAP

An Oracle White Paper May Oracle Database Cloud Service

Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003

An Oracle White Paper July Introducing the Oracle Home User in Oracle Database 12c for Microsoft Windows

Oracle Database 11g: Security Release 2. Course Topics. Introduction to Database Security. Choosing Security Solutions

An Oracle White Paper April Oracle Audit Vault and Database Firewall

Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

Data Security: Strategy and Tactics for Success

Evolution from the Traditional Data Center to Exalogic: An Operational Perspective

D50323GC20 Oracle Database 11g: Security Release 2

Oracle Database Backup Service. Secure Backup in the Oracle Cloud

Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory. Overview August 2008

An Oracle White Paper February Oracle Data Integrator 12c Architecture Overview

Oracle Database 11g: Security Release 2

Securing Data in Oracle Database 12c

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan

ORACLE BUSINESS INTELLIGENCE, ORACLE DATABASE, AND EXADATA INTEGRATION

An Oracle White Paper March Managing Metadata with Oracle Data Integrator

Oracle Insurance General Agent Hardware and Software Requirements. Version 8.0

Protecting Sensitive Data Reducing Risk with Oracle Database Security

Oracle Database Security

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

Oracle Database 11g: Security. What you will learn:

Why Add Data Masking to Your IBM DB2 Application Environment

Making Database Security an IT Security Priority

Oracle White Paper October Oracle Advanced Security with Oracle Database 11g Release 2

An Oracle White Paper January Access Certification: Addressing & Building on a Critical Security Control

The Comprehensive Guide to PCI Security Standards Compliance

IBM InfoSphere Optim Test Data Management solution for Oracle E-Business Suite

CorreLog Alignment to PCI Security Standards Compliance

The Oracle Mobile Security Suite: Secure Adoption of BYOD

ORACLE CLOUD MANAGEMENT PACK FOR ORACLE DATABASE

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

An Oracle White Paper June, Enterprise Manager 12c Cloud Control Application Performance Management

An Oracle White Paper October Oracle Data Integrator 12c New Features Overview

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

An Oracle White Paper November Leveraging Massively Parallel Processing in an Oracle Environment for Big Data Analytics

Monitoring and Diagnosing Production Applications Using Oracle Application Diagnostics for Java. An Oracle White Paper December 2007

Real-Time Database Protection and. Overview IBM Corporation

Data Masking. Cost-Effectively Protect Data Privacy in Production and Nonproduction Systems. brochure

Oracle Database 11g: Security

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

An Oracle White Paper August Automatic Data Optimization with Oracle Database 12c

An Oracle White Paper January Using Oracle's StorageTek Search Accelerator

Oracle Whitepaper April Security and the Oracle Database Cloud Service

An Oracle White Paper December Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance

An Oracle White Paper November Financial Crime and Compliance Management: Convergence of Compliance Risk and Financial Crime

Reduce Trial Costs While Increasing Study Speed and Data Quality with Oracle Siebel CTMS Cloud Service

Guardium Change Auditing System (CAS)

Informatica Dynamic Data Masking

Oracle ACFS Security and Encryption. An Oracle White Paper April, 2011

An Oracle White Paper July Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide

How To Use An Orgs.Org Database With An Orgorora Cloud Management Pack For Database (For Cloud)

An Oracle White Paper May Distributed Development Using Oracle Secure Global Desktop

Database Security & Compliance with Audit Vault and Database Firewall. Pierre Leon Database Security

Lowering E-Discovery Costs Through Enterprise Records and Retention Management. An Oracle White Paper March 2007

Oracle Identity Management: Integration with Windows. An Oracle White Paper December. 2004

IBM InfoSphere Optim Data Masking solution

Securing and protecting the organization s most sensitive data

10 Questions to Ask Your On-Demand Contact Center Provider. An Oracle White Paper September 2006

Achieving Sarbanes-Oxley Compliance with Oracle Identity Management. An Oracle White Paper September 2005

An Oracle White Paper October An Integrated Approach to Fighting Financial Crime: Leveraging Investments in AML and Fraud Solutions

Oracle Total Recall with Oracle Database 11g Release 2

Introduction. Automated Discovery of IT assets

APPLICATION COMPLIANCE AUDIT & ENFORCEMENT

Oracle Business Intelligence ADF Custom Visualizations and Integration. An Oracle White Paper November 2012

Transcription:

An Oracle White Paper June 2009 Oracle Database 11g: Cost-Effective Solutions for Security and Compliance

Protecting Sensitive Information Information ranging from trade secrets to financial data to privacy related information has become the target of sophisticated attacks from both sides of the firewall. While most organizations have deployed firewall, intrusion detection, and anti-spam technologies, protecting data now requires a defense-in-depth strategy that also addresses regulatory compliance. Built upon 30 years of security experience, the Oracle database provides defense-in-depth security controls that enable organizations to transparently protect data. By leveraging these controls, organizations can safeguard their data and ensure regulatory compliance in a cost-efficient and sustainable way. Security Drivers Technology has enabled the Internet, global economy and made it possible for organizations to reduce costs and increase productivity dramatically. Technology, however, has also made it possible for threats to data to be initiated from virtually anywhere in the world. Business drivers such as data consolidation, globalization, right sourcing and cloud computing are becoming ever more important to reduce costs. But these requirements cannot be implemented without adequate security controls and innovative security solutions. The challenge is not just to secure the data but to do it in a manner that enables applications to maintain scalability, performance, and remain highly available. Figure 1. Global Business Security Drivers 1

Protecting against both accidental and intentional data loss by insiders require enforcing the need-to-know and trust-but-verify principles. Several countries, including the US and Japan, have passed laws that require internal controls on financial data. In addition, privacy related laws that call for encryption of personally identifiable information (PII) are becoming more common. For example, in the U.S. over 40 states have passed some version of a breach notification law. At the same time, industry driven initiatives such as the Payment Card Industry (PCI) data security standard require restricting access to credit card information. Defense-in-Depth Security Defense-in-depth data security means looking at data security holistically. To do that, one needs to look at the entire life cycle of the data, where the data resides, what applications access the data, who is accessing the data and under what conditions, and ensuring that the systems have been properly configured and remain that way. Three key elements of this approach are Encryption and Data Masking, Access Control, and Monitoring: Figure 2. Defense-in-Depth 2

Encryption and masking are important for protecting data outside the access control perimeter of the database. Data sitting on disk underneath the database and applications, data in test and development environments, data traveling over the network and data on backup media needs protection that only encryption and masking can offer. Discarded disk drives and the presence of super users on the operating system leave open the possibility of unimpeded access to sensitive data that bypasses the authentication and access controls within the database. Movement of production data to other departments for testing and development purposes unnecessarily exposes sensitive data to individuals without a true need-to-know. Most certainly, data traveling over the wire is perhaps the most at risk of unauthorized access. Access controls beyond the application level are now vital to enabling organization to achieve the benefits of data consolidation, off-shoring and cloud computing. Historically applications have been designed to scale to Internet requirements and provide role based functional access. Today, however, regulations and privacy laws require limited access to application data, even by the database administrator and especially from adhoc tools that can be used to bypass the application. While encryption and access control are key components to protecting data, even the best security systems are not complete without a monitoring system in place. Just as video cameras supplement audible alarms in homes and businesses, monitoring provides the corresponding who, what and when that complements the encryption, masking and access control systems. Oracle s Defense-in-Depth Security Solution Oracle provides a comprehensive and transparent defense-in-depth solutions to meet the challenges associated with business initiatives and the complex regulatory environment found in today s global economy. 3

Figure 3. Oracle s Defense-in-Depth Solution Encryption and Masking Oracle Advanced Security provides Transparent Encryption of stored data and data in transit. Oracle Secure Backup is a tape backup solution that encrypts databases and file system data. Oracle Data Masking de-identifies production data before transferring to test or partners. Access Control Oracle Database Vault provides access control over administrative and privileged users, and real-time controls over database activity. Oracle Label Security provides data classification based access control. 4

Monitoring Oracle Enterprise Manager s Configuration Management scans the database and the file system for security related configuration settings. Oracle Audit Vault consolidates audit data from multiple servers to keep track of the user activity; creating reports and alerts on suspicious activity. Oracle Total Recall provides a history of changes to sensitive data. Encryption and Masking Transparent Data Encryption Oracle provides robust encryption solutions to safeguard sensitive data against unauthorized access at the operating system level or through theft of hardware or backup media. Oracle Transparent Data Encryption (TDE) addresses privacy and PCI requirements by encrypting personally identifiable information such as social security numbers and credit card numbers. Figure 4. Oracle Encryption and Strong Authentication 5

Oracle supports transparently encrypting specific sensitive columns with TDE column encryption or encrypting entire applications with TDE tablespace encryption. Using Oracle Enterprise Manager, a column can be quickly and easily encrypted or an entire encrypted tablespace can be created to store all application tables. TDE is completely transparent to existing applications and does not require any triggers, views or other application changes. Data is transparently encrypted when written to disk and transparently decrypted after an application user has successfully authenticated, and passed all authorization checks. Existing database backup routines continue to work, with the data remaining encrypted in the backup. For encryption of entire database backups, TDE can be used in combination with Oracle RMAN to encrypt backups to disk. Both TDE column encryption and TDE tablespace encryption have been certified with Siebel, PeopleSoft, and Oracle E-Business Suite applications. Oracle Database 11g additionally supports storing the TDE master encryption key externally on a hardware security module (HSM) device using the industry standard PKCS#11 interface. This provides an even higher level of assurance for protecting the TDE master key. Encryption For Data In Transit Oracle Advanced Security provides an easy-to-deploy solution for protecting all communication to and from the Oracle Database, providing both SSL/TLS based encryption and native network encryption for enterprises without a PKI infrastructure. The Oracle Database can be configured to reject connections from clients that do not encrypt data, or optionally allow unencrypted connections for deployment flexibility. Configuration of network security is simplified using the Oracle Network Configuration administration tool, allowing businesses to easily deploy network encryption without requiring any changes in the application. Protecting Your Backup Tapes Lost or stolen tapes are frequently the cause for losing sensitive data. Oracle Secure Backup encrypts tapes and provides centralized tape backup management for the entire Oracle environment and protects Oracle database, and the associated UNIX, Linux, Windows and Network Attached Storage (NAS) file system data. Oracle Secure Back 6

integrates with Oracle database through Recovery Manager (RMAN) supporting versions Oracle9i to Oracle Database 11g. With its optimized integration, it achieves faster backups than comparable media management utilities with less CPU utilization. Oracle Data Masking Oracle Data Masking helps organizations comply with data privacy and protection mandates. With Oracle Data Masking, sensitive information such as credit card or social security numbers can be replaced with realistic but non-factual values, allowing production data to be safely used for development, testing, or sharing with out-source or off-shore partners for other non-production purposes. Oracle Data Masking uses a library of templates and format rules, consistently transforming data in order to maintain referential integrity for applications. Figure 5. Oracle Data Masking Access Control The Oracle Database provides powerful abilities to grant and revoke permissions to database objects to users and roles. However in light of new threats and challenges, customers now require separation-of-duty even for administrators, real-time access control on who can do what on the databases, and the ability to deploy such solutions on existing applications. 7

Privileged User Control IT administrators, database administrators, and application administrators fill highly trusted positions within the enterprise. However, regulatory compliance, outsourcing, application consolidation and increasing concerns over insider threats have resulted in an almost mandatory requirement for strong controls on access to sensitive application data. With Oracle Database Vault, enterprises can prevent privileged users from accessing application data by putting the sensitive tables or application data in a Realm. The administrators can continue doing their performance tuning and other database management tasks but are prevented from looking or modifying the sensitive data. Figure 6. Privileged User Controls Real Time Access Controls Oracle Database Vault significantly tightens security by limiting who, when, where and how databases, data and applications can be accessed. Multiple factors such as IP address, time of day and authentication method can be used in a flexible and adaptable manner to enforce access control without making changes to the application. For example, access can be restricted to a specific middle tier, creating a trusted-path to the application data and preventing use of ad-hoc tools. Oracle Database Vault can be used to enable additional security policies for most SQL commands. 8

Figure 7. Real Time Access Controls Separation of Duty Oracle Database Vault provides three distinct responsibilities out-of-the-box for security; administration, account management, and day-to-day database administration activities. For example, Oracle Database Vault can block a DBA from creating a new user if the DBA doesn't have the proper responsibility. Organizations with limited resources can setup multiple accounts and still benefit from the separation-of-duty enforcement provided by Database Vault. Oracle Database Vault is available for Oracle 9i Release 2, Oracle Database 10g Release 2 and Oracle Database 11g. Out-of-the-box policies are available for many applications including E-Business Suite, PeopleSoft, and Siebel. Data Classification based Security Traditional database privileges such as Select, Insert, Update and Delete stop at the object level. For example, a user can be granted Select on the Customer table but not on a subset of rows within the Customer table such that the sales representative can only access customer records within his/her territory. Oracle Label Security protects data by assigning a data label to each row. To access a row protected by a data label, a user must have the appropriate user label. Based upon the policy of the organization, Oracle Label Security can be used to create policies that provide access control based upon hierarchy, groups, or compartments. High security organizations use Label Security to compartmentalize access to Sensitive and Highly Sensitive data stored in the same application table, commonly referred to as 9

multi-level security (MLS). Commercial organizations can use data labels to compartmentalize data for multi-tenancy, hosting, software-as-a-service and other security requirements. Figure 8. Real Time Access Controls Policies act as the logical containers of data labels, user labels, enforcement settings and protected objects. User labels can be centrally managed in Oracle Identity Management for enterprise deployments. In addition, Data labels can be attached as hidden columns to application tables enabling existing update and insert statements to continue working without modification. Label Security provides numerous enforcement options such as enforcing access control on Select operations and Update operations, and works with common application user models. User labels can be used as factors within Oracle Database Vault command rules. This powerful capability extends Label Security concepts beyond traditional row level access controls to the database and application level. For example, separation-of-duty can be customized by looking at an administrator s user label within a Database Vault rule. Oracle Label Security can be used with existing applications including Oracle E-Business Suite. 10

Monitoring Configuration Management Pack for Compliance Configuration management is a critical component in every enterprise's day-to-day IT operations. Oracle Configuration Management Pack forms the centerpiece of Oracle Enterprise Manager s ability to manage configurations and automate IT processes. A key component of this solution is Configuration Change Console, which reduces cost and mitigates risk by automatically detecting, validating and reporting on authorized and unauthorized configuration changes. Compliance Assessments Proactive assessment of key compliance areas such as, security, configuration and storage help identify areas of vulnerabilities and areas where best practices are not being followed. Oracle Configuration Management Pack ships with over 200 built-in policy checks and the capability for administrator s to defined their own custom policies. Oracle Enterprise Manager tracks violations of these policies in a similar manner as performance metrics. Notification rules can be applied and corrective actions can be assigned to violations. For example, if a well-known username/password is present in a database, or if an open port is detected in the Application Server, a corrective action could be defined to automatically disable the account and close that port. Such proactive enforcement is supplemented with compliance reports. These reports denote the compliance score for targets. It is possible to view the compliance score over time, along with drilling down into the violations and impact for each target. Integration with problem ticketing solutions allow for policy violation information to be automatically sent to a ticketing system and incident tickets created without the need for manual intervention. The Compliance Dashboard enables administrators to have a quick view of how their systems comply with best security practices, and it allows them to drill down into the details. They can also see the historical trend and thus track progress towards compliance over time. 11

Figure 9. Configuration Scanning Monitoring User Activities To comply with Sarbanes-Oxley (SOX), Payment Card Industry (PCI), and regional privacy directive, businesses not only have to protect sensitive information, but also monitor access to sensitive information for both compliance and potential threats. Examination of numerous data breaches has shown that auditing could have helped detect problems early, reducing the financial impact. Auditing the privileged and administrative user is an essential part of Defense-in-depth strategy. However, the use of audit data today as a security resource remains very much a manual process, requiring IT security and audit personnel to sift through large amounts of dispersed audit data. Oracle Audit Vault reduces the cost and complexity of compliance and helps detect suspicious activity by transparently collecting and consolidating the audit data providing valuable insight into who did what to which data when including privileged users who have direct access to the database. 12

Figure 10. Oracle Audit Vault With Oracle Audit Vault reports, alert notifications, and centralized audit policy management, the risks from internal threat and the cost of compliance are greatly reduced. Oracle Audit Vault leverages Oracle's industry leading database security and data warehousing technology for managing, analyzing, storing, and archiving large volumes of audit data. Oracle Audit Vault provides standard audit assessment reports covering privileged users, account management, roles and privileges, object management and system management across the enterprise. Parameter driven reports can be defined such as showing user login activity across multiple systems and within specific time periods, such as weekends. Oracle Audit Vault provides an open audit warehouse schema that can be accessed from Oracle BI Publisher, or 3rd party reporting tools. Oracle Audit Vault event alerts help mitigate risk and protect from the insider threats by providing proactive notification of suspicious activity across the enterprise. Oracle Audit Vault continuously monitors the inbound audit data, evaluating audit data against alert conditions. Alerts can be associated with any auditable database event including system events such as changes to application tables, role grants, and privileged user creation on sensitive systems. 13

Figure 11. Oracle Audit Vault Reports Oracle Audit Vault collects database audit data from Oracle9i and higher databases as well as SQL Server 2000 and 2005 releases, Sybase ASE 12.5-15.0 and IBM DB2 8.2 and 9.5 databases. Data History and Retention Regulatory and compliance regulations such as SOX, HIPAA and BASEL II require retention of historical data. Additionally, businesses are increasingly realizing the immense value historical data can provide in terms of helping them understand market trends and customer behavior. Organizations need an efficient mechanism to retain data for longer duration that doesn t involve application rewrites, 3rd party or handcrafted software solutions, and additional administrative overheads. Total Recall in Oracle Database 11g addresses these challenges by ensuring complete, secure retention and management of all your historic data. Total Recall with the underlying technology, Flashback Data Archive transparently tracks changes to database tables data in a highly secure and efficient manner without requiring use of special interfaces or application changes. Conclusion Transparent security solutions are critical in today's global business economy due to the cost and complexity of modifying existing application s code. Addressing regulatory compliance and reducing the risk of insider threats requires strong security on application 14

data. Oracle Database Security products are designed to work transparently, minimizing any impact on existing applications while addressing requirements found in many regulations. Oracle Database Security products provide defense-in-depth security by addressing the three layers of security: encryption & masking, access control, and monitoring. Oracle Advanced Security TDE continues to lead the encryption industry and provides an elegant solution for protection of privacy related information and compliance with regulations such as PCI. Oracle Database 11g introduced full tablespace encryption and integration with hardware security modules, enabling encryption of entire applications and centralized storage of TDE master encryption keys. Oracle Data Masking enables testers, developers, and partners to access the same production data but only after the sensitive data has been de-identified. Oracle Database Vault transparently addresses the strong internal control requirements found in SOX, PCI, HIPAA, and many other regulations. Oracle Database Vault realms prevent even the DBA from accessing sensitive financial or privacy related information found in applications. Oracle Label Security data classification labels provide an automated way to enforce data security based upon the sensitivity nature of the row itself. Oracle Enterprise Manager Configuration Management pack continuously monitors hosts and databases for violations of security and configuration best practices, greatly simplifying the job of the security administrator. Oracle Audit Vault turns audit data into a key security resource, transparently consolidating and securing vital audit information associated with database activity. Oracle Audit Vault reports, alerts, and policies expedite the job of audit compliance personnel and security officers. Protecting data against sophisticated attacks is a challenging task, but Oracle s defensein-depth security technology makes the task easier with its transparent and performant solutions. 15

Oracle Database Security June 2009 Author: Oracle Contributing Authors: Oracle Corporation World Headquarters 500 Oracle Parkway Redwood Shores, CA 94065 U.S.A. Worldwide Inquiries: Phone: +1.650.506.7000 Fax: +1.650.506.7200 oracle.com Copyright 2009, Oracle and/or its affiliates. All rights reserved. This document is provided for information purposes only and the contents hereof are subject to change without notice. This document is not warranted to be error-free, nor subject to any other warranties or conditions, whether expressed orally or implied in law, including implied warranties and conditions of merchantability or fitness for a particular purpose. We specifically disclaim any liability with respect to this document and no contractual obligations are formed either directly or indirectly by this document. This document may not be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without our prior written permission. Oracle is a registered trademark of Oracle Corporation and/or its affiliates. Other names may be trademarks of their respective owners. 0109