Protecting Data Assets and Reducing Risk



Similar documents
Database Security. Oracle Database 12c - New Features and Planning Now

Oracle Database 11g: Security Release 2. Course Topics. Introduction to Database Security. Choosing Security Solutions

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

New Oracle 12c Security Features Oracle E-Business Suite Perspective

D50323GC20 Oracle Database 11g: Security Release 2

Securing Data in Oracle Database 12c

Oracle Database 12c: New Features for Administrators

The safer, easier way to help you pass any IT exams. Exam : 1Z Upgrade Oracle9i/10g/11g OCA to Oracle Database 12c OCP.

Oracle EXAM - 1Z Oracle Database 11g Security Essentials. Buy Full Product.

Securing Your Oracle Database to Protect your Data

Oracle Database Security Solutions

ORACLE DATABASE 12C: NEW FEATURES FOR ADMINISTRATORS GRADE CURRICULAR. Enterprise Manager Express home page versus Enterprise Manager Database Control

Oracle Database 11g Security Essentials

Oracle Database 11g: Security Release 2

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

Safeguard Sensitive Data in EBS: A Look at Oracle Database Vault, Transparent Data Encryption, and Data Masking. Lucy Feng

Oracle Database Security. Paul Needham Senior Director, Product Management Database Security

D12C-AIU Oracle Database 12c: Admin, Install and Upgrade Accelerated NEW

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Oracle 12c Multitenant and Encryption in Real Life. Christian Pfundtner

2015 Jože Senegačnik Oracle ACE Director

Oracle Database Security Features in the Banking Environment. Dr. Matthias Mann, DOAG

UNIVERSITY AUTHORISED EDUCATION PARTNER (WDP)

<Insert Picture Here> Oracle Database Security Overview

Oracle Database 12c: Admin, Install and Upgrade Accelerated

An Oracle White Paper June Security and Compliance with Oracle Database 12c

Oracle Database 11g: Security

Oracle 1Z0-528 Exam Questions & Answers

<Insert Picture Here> Oracle Database Vault

Pluggable Databases : What they will break and why you should use them anyway!

Oracle Database 11g: Security. What you will learn:

Identity Management and Access Control

Oracle Database 12c: Administration Workshop NEW

Database Extension 1.5 ez Publish Extension Manual

Oracle. Brief Course Content This course can be done in modular form as per the detail below. ORA-1 Oracle Database 10g: SQL 4 Weeks 4000/-

Tagging, Encoding, and Encrypting with RMAN

Virtual Private Database Features in Oracle 10g.

Database Security Questions HOUG Fehér Lajos. Copyright 2015, Oracle and/or its affiliates. All rights reserved.

Oracle Database 11g: Administration I

Database security tutorial. Part I

All Things Oracle Database Encryption

An Oracle White Paper April Security and Compliance with Oracle Database 12c

Data Security: Strategy and Tactics for Success

Centralized Oracle Database Authentication and Authorization in a Directory

Oracle Database 12c: Administration Workshop NEW. Duration: 5 Days. What you will learn

Oracle Advanced Security Transparent Data Encryption Best Practices

Oracle Database 11g: Security

An Oracle White Paper January Oracle Database 12c: Full Transportable Export/Import

Oracle E-Business Suite APPS, SYSADMIN, and oracle Securing Generic Privileged Accounts. Stephen Kost Chief Technology Officer Integrigy Corporation

Setting Up Your Team-SQL Database for ORACLE 8.05

Security and Control Issues within Relational Databases

Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals

Monitoring Audit Trails Using Enterprise Manager

Oracle Database 12c Administration Workshop

CA DataMinder. Database Guide. Release th Edition

Credit Cards and Oracle E-Business Suite Security and PCI Compliance Issues

Oracle Database: SQL and PL/SQL Fundamentals NEW

RMAN BACKUP & RECOVERY. Recovery Manager. Veeratteshwaran Sridhar

Oracle Audit Vault and Database Firewall

MySQL Security: Best Practices

PUBLIC Installation: SAP Mobile Platform Server for Linux

Encrypting Sensitive Data in Oracle E-Business Suite

Trust but Verify: Best Practices for Monitoring Privileged Users

Get More for Less: Enhance Data Security and Cut Costs

Oracle 11g Database Administration

Configuring an Alternative Database for SAS Web Infrastructure Platform Services

Oracle Database Vault: Design Failures

An Oracle White Paper June Oracle Database 11g: Cost-Effective Solutions for Security and Compliance

Obtaining Value from Your Database Activity Monitoring (DAM) Solution

Oracle Database Security. Nathan Aaron ICTN 4040 Spring 2006

Database Security & Compliance with Audit Vault and Database Firewall. Pierre Leon Database Security

Tivoli Security Compliance Manager. Version rel. 2 July, Collector and Message Reference Windows Oracle Addendum

Making Database Security an IT Security Priority

Oracle Health Sciences Network. 1 Introduction. 1.1 General Security Principles

Oracle Database 10g Express

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

Oracle Database 10g: Security Release 2

Oracle Database. Security Guide 11g Release 1 (11.1) B

Oracle vs. SQL Server. Simon Pane & Steve Recsky First4 Database Partners Inc. September 20, 2012

nshield Modules Integration Guide for Oracle Database 11g Release 2 Transparent Data Encryption

FIFTH EDITION. Oracle Essentials. Rick Greenwald, Robert Stackowiak, and. Jonathan Stern O'REILLY" Tokyo. Koln Sebastopol. Cambridge Farnham.

MS-55096: Securing Data on Microsoft SQL Server 2012

DBMS Questions. 3.) For which two constraints are indexes created when the constraint is added?

Protecting Sensitive Data Reducing Risk with Oracle Database Security

ORACLE DATABASE 11G: COMPLETE

ORACLE CORE DBA ONLINE TRAINING

Oracle Database 11g: Security

Copyright 2014 Oracle and/or its affiliates. All rights reserved.

Integrating LANGuardian with Active Directory

Oracle Database 12c. Peter Schmidt Systemberater Oracle Deutschland BV & CO KG

Managing Oracle E-Business Suite Security

Demystified CONTENTS Acknowledgments xvii Introduction xix CHAPTER 1 Database Fundamentals CHAPTER 2 Exploring Relational Database Components

Cisco Process Orchestrator Installation Guide

SQL Server to Oracle A Database Migration Roadmap

BM482E Introduction to Computer Security

Transcription:

Protecting Data Assets and Reducing Risk Michelle Malcher Enterprise Database Security Oracle Open World 2014 2014 Wells Fargo Bank, N.A. All rights reserved. For public use.

1 Introduction Michelle Malcher Enterprise Database Security Wells Fargo Oracle ACE Director 16+ years DBA experience Co-Author, Oracle Database 12c Install, Configure & Maintain Like a Professional, Securing Oracle Database 12c: A Technical Primer, Oracle Database Administration for the Microsoft SQL Server DBA IOUG Volunteer and presenter

2 Security Journey Database Security for the Practical DBA Database Access Protect Data Assets Maintain Secure Environments Simplify Access and Changes Validate and Report on Security

3 Security Journey Multiple Levels of Security Securing Access not enough Encryption Firewalls Privileged Users Auditing Detection

Security Planning 4

Security Journey Security Planning Security Features Secure Configuration Patching Auditing Compliance Responsibilities DBA Security Admin Education 5

6 Security Journey Security Planning Data Classification Sensitive Data Access limited Public information By database or scattered Matching security for classes

7 Security Journey Security Planning Security matching the business need Sensitive data protected Least Privilege Super users and highly privileged users

Practical Security 8

9 Practical Security Practical Policies Easy to maintain Transparent data protection Creating uniform ways to secure information Protects as a whole for any given class

Practical Security Practical Policies Use tools provided Application security can find sensitive information Credit Card SS# E-Business Suite Fusion Apps Schema Owners Create tables Read, write Execute 10

11 Practical Security Passwords Password Functions Verify_function_11g 8-30 characters and not usernames Ora12c_verify_funciton Ora12c_strong_verify_function Utlpwdmg.sql ALTER PROFILE default LIMIT PASSWORD_VERIFY_FUNCTION ora12c_strong_verify_function; NULL to remove

12 Practical Security Passwords External password store Store credentials for connecting to databases Stop embedding usernames and passwords connect hrmgr@hr:1525 Password: connect/@hr

13 Practical Security Passwords Client side wallet mkstore wrl /u01/hr/wallets -create Password: (for wallet) mkstore wrl /u01/hr/wallets create credential db01 hr Password: (for hr)

Practical Security Wallets sqlnet.ora SQLNET.WALLET_OVERRIDE=TRUE WALLET_LOCATION =(source = method = file) (method_data = (directory =/private/orcl/network/admin))) mkstore wrl wallet_location -listcredential 14

15 Practical Security Encryption Transparent Data Encryption (TDE) Column Data Tablespace Level Wallet Master Encryption key Table Encryption key Password protected Transparent to application

16 Practical Security Encryption Wallet for encryption SQLPLUS> alter system set encryption key identified by password; SQLPLUS> alter system set encryption wallet open identified by password; Auto Login wallet Do not use alter system set encryption Use orapki utility or Oracle Wallet Manager orapki wallet create wallet encrypt pwd password

Practical Security Encryption Column Encryption CREATE TABLE CUSTOMER (CUST_ID NUMBER NOT NULL, FIRST_NAME VARCHAR2(50) NOT NULL, LAST_NAME VARCHAR2(50) NOT NULL, ACCOUNT_ID NUMBER ENCRYPT using AES128, CUST_TYPE VARCHAR2(30), CREATED DATE, UPDATED DATE) 17

18 Practical Security Encryption Tablespace level encryption Wallet needs to be open to view data Remains encrypted in RMAN backup Transparent to application Not for system tablespaces SYSTEM, SYSAUX, UNDO, TEMP DBA_TABLESPACES ENCRYPTED column V$ENCRYPTED_TABLESPACES

19 Practical Security Encryption Encrypted Tablespace CREATE tablespace DATA_ENCRYPT01 datafile /u01/oracle/oradata/mmtest/data_encrypt01.dbf size 100M ENCRYPTION default storage(encrypt);

20 Practical Security Encryption/Wallets Useful Views v$encrypted_tablespaces v$encrypted_wallet v$wallet v$client_secrets v$encryption_keys DBA_ENCRYPTION_KEY_USAGE DBA_TABLESPACES (ENCRYPTED column)

21 Practical Security Redaction Mask Data FULL XXXXXX ******** Partial XXX XX 1234 Random 123 45 6789 -> 454 34 2932 Online and independent of application code

22 Practical Security Redaction Policies Users Applications Label Security

Practical Security Redaction 23

Practical Security Redaction 24

Practical Security Restrict System 07_DICTIONARY_ACCESSIBILITY=FALSE Restricts changes to SYSTEM objects Default is now FALSE ANY privilege does not = SYSTEM objects SELECT_CATALOG_ROLE Role changes Connect Resource No longer unlimited tablespace 25

26 Practical Security Controlling Caller Privileges Procedure runs as invoker rights GRANT INHERIT PRIVILEGES on USER invoking_user to procedure_user (role) Public inherit privilege Definer Rights

Use Roles!!! 27

28 Practical Security Use Roles Manage Permissions and Privileges with roles Keep it simple and set standards New roles for administrators Separation of duties with roles

Least Privileged 29

30 Least Privileged New accounts without DBA and SYSTEM access Only logging in with privileges needed SELECT CATALOG? Different system roles Granting the roles that are needed

31 Least Privileged Privilege Analysis See the permissions used Be able to maintain least privilege Verify Permissions

Least Privileged Privilege Analysis Getting to the Least Privilege Model Captures and reports on permissions used Shows unused privileges DBMS_PRIVILEGE_CAPTURE Enable Policies Generate Reports DBA_ tables DBA_USED (PRIVS, OBJPRIVS) DBA_UNUSED (PRIVS, OBJPRIVS) 32

33 Least Privileged Privilege Analysis BEGIN DBMS_PRIVILEGE_CAPTURE.CREATE_CAPTURE (NAME => dba_capture_all_privs, DESCRIPTION=> privilege_analysis_exp_for_all_user, TYPE=> DBMS_PRIVILEGE_CAPTURE.G_DATABASE); END; BEGIN DBMS_PRIVILEGE_CAPTURE.GENERATE_RESULT (NAME => dba_capture_all_privs ); END;

34 Least Privileged Privilege Analysis Capture different privileges for the database, roles and context G_DATABASE, G_ROLE, G_CONTEXT G_ROLE_AND_CONTEXT Creating scripts to create a role or revoke privileges DBA_USED_OBJPRIVS DBA_UNUSED_OBJPRIVS

Use Roles!!! 35

36 Least Privileged Container and Pluggable Oracle 12c CDB and PDB Separate administration Application DBAs permission by PDB Different permissions by tasks Users separated by PDB

Least Privileged Common and Local Oracle 12c CDB and PDB Common Container => existing and future Local Where permission was granted Container=current PUBLIC should not get common PDB own set of PUBLIC Ex: grant create any table to C##ADMIN CONTAINER=ALL 37

38 Least Privileged Virtual Private Database Based on policies to restrict access to data Examples: By Job Title By Department By program By group or roles

39 Least Privileged Virtual Private Database Triggers and Policies in the database Protects and Restricts the data Inside Applications Ad-Hoc Queries Restrict Columns or other values even with permissions on objects

Least Privileged Virtual Private Database Create Policy BEGIN DBMS_RLS.ADD_POLICY ( object_schema => HR,object_name => EMP_DETAILS,policy_name => EMP_IU,function_schema => HR,policy_function => MANAGER_ROLE_ONLY,statement_types => SELECT,policy_type => dbms_rls.dynamic,long_predicate => FALSE,update_check => TRUE,static_policy => FALSE,enable => TRUE); END; 40

41 Least Privileged Virtual Private Database Create Procedure CREATE or REPLACE PROCEDURE HR.set_role_mgr as var_role varchar2(30); begin select rolename into var_role from HR_ROLES where upper(username)= upper(sys_context( userenv, session_user )); dbms_session.set_context(namespace=> realm_role_ctx, attribute => rolename, value => var_role); end;

42 Least Privileged Virtual Private Database Create Trigger CREATE or REPLACE TRIGGER SYS.set_user_role after logon on database begin HR.set_role_mgr; exception when no_data_found then null; end;

43 Least Privileged Database Vault Restrict privileged users from sensitive data Access to perform DBA tasks Simple Configuration Mandatory Realms Performance

Least Privileged Database Vault Simple Configuration Installed with database (12c) Configure users Vault admin and vault manager Different roles Security team? Different than DBAs Enable Create Realms Create and use roles Management in OEM 44

45 Least Privileged Database Vault Mandatory Realms (12c) Highly sensitive data protected from all users Patching and maintenance available without object access

Least Privileged Database Vault Administration tools Create and Edit Realms Add and Manage Users Security Team can use to grant access Another team can manage Realms Validate Install Check that it is enabled in the database, run the following: SQLPLUS> select * from v$option where parameter = Oracle Database Vault ; Bring up Vault Administration in OEM 46

Reporting and Maintenance 47

Also known as Auditing 48

49 Reporting and Maintenance Auditing Login Logoff Failed Attempts Object creation New users Change in permissions and privileges Others?

50 Reporting and Maintenance Auditing Audit Reports OEM and security tools Security options implemented Reporting Add new Upgrade

51 Reporting and Maintenance Auditing Default reports Maintaining information that fits the security put into place Privileged users report Reporting on least privilege After changes, verify secure configuration Upgrades, patching Application changes

52 Reporting and Maintenance Unified Auditing (12c) Policies and Conditions AUDIT_ADMIN and AUDIT_VIEWER roles Single audit trail Includes Database Firewall Analytics on audit log and firewall data for reporting

53 Reporting and Maintenance Security policies and conditions Vault Audit Redaction Roles New roles and separation of duties Validating Privileges

54 Summary Layers of security Data Classification Least Privilege Especially admins Practical Security Matching the level of data Maintainable Reportable

Questions??? 55