SlideShare une entreprise Scribd logo
1  sur  10
Télécharger pour lire hors ligne
Best Practices in Implementing
                            Oracle Database Security Products



      White Papers          Abstract


                            Information is the world’s new currency. Databases are the
                            digital banks that store and retrieve valuable information. The
                            growing number of high-profile incidents in which customer
                            records, confidential information and intellectual property are
                            leaked, lost or stolen has created an explosive demand for
                            solutions that protect against the deliberate or inadvertent
                            release of sensitive information. Moreover, numerous
                            information-intensive government and industry regulations
                            require organizations to protect the integrity of customer,
                            employee and proprietary information and corporate digital
                            assets. Security breaches can no longer be "swept under the
                            rug" because of strict breach disclosure laws.

                            Addressing information protection and control (IPC) is a
                            complex challenge. Today, nearly all organizational
                            information exists in electronic form, typically stored in
                            databases. So, it stands to reason that enterprises must
                            secure their databases as part of any IPC strategy to protect
                            sensitive information and comply with regulations. Database
                            security represents a preemptive strategy to preventing
                            enterprise data theft and regulatory compliance infractions.
Seemakiran
                            Oracle is the global leader in relational database technology,
Head of India Operations    and has built a rich set of database security products and
                            database features within its product portfolio. Implementing
                            effective database security on the Oracle platform requires a
Estuate                     deep knowledge of the Oracle product stack and experience
1183 Bordeaux Dr, Suite 4   in real-world security implementation using Oracle. Estuate
                            brings strong credentials to its clients in both respects,
Sunnyvale, CA 94089         emanating from our deep Oracle product engineering roots
Phone: +1 408-400-0680      and years of Oracle-based client work.
Fax: +1 408-400-0683
                            This paper profiles the best practices in implementing Oracle-
www.estuate.com             based information security that we have built from our years
                            of experience.


January 2009
ESTUATE
         WHITEPAPER
                                                                                 Complex Applications Made Easy




Estuate is a global information technology (IT) services company based in the heart of Silicon Valley.
Our founders have decades of deep software product experience at Oracle, particularly in Oracle-based
applications development, integration and modernization, and unmatched Oracle E-Business Suite
product knowledge. Our focus is two-fold:

 • Providing expert software product development services to software companies
 • Providing high-value application implementation and management services to enterprise clients.

We pride ourselves on being highly-responsive, nimble and efficient, and we are very honored to let our
clients speak on our behalf.

Our software product development focus includes core product development and testing, business
process integration and technology modernization.        Our software company clients include Arena
Solutions, Cisco, Citrix, Escalate, IBM, Oracle, Performant, Pictage, Salesforce.com, DataFlux (division
of SAS) and WebEx.

Our enterprise application implementation and management focus is on custom application development
and the full Oracle E-Business Suite platform. Our enterprise application clients include Bechtel, Fox
Interactive Media, HP, Matson, Stanford University, Visa and Wells Fargo.

For more information, please contact info@estuate.com or visit www.estuate.com




                            Copyright © 2009 Estuate Inc. All rights reserved.

           The entire contents of this document are subject to copyright with all rights reserved.
All copyrightable text and graphics, the selection, arrangement and presentation of all information and the
              overall design of the document are the sole and exclusive property of Estuate.



                                                                                                              2

                                      © 2009 Estuate. All rights reserved.
ESTUATE
     WHITEPAPER
                                                                      Complex Applications Made Easy




                                       Contents




1. Overview of Oracle Security Products……...............................4

2. User Management Best Practices…………………………..…....5

3. Access Control Best Practices…………………………………...6

4. Data Protection Best Practices…………………...………….......7

5. Compliance Monitoring Best Practices…….............................9

6. Conclusion……………………………………………....................10




                                                                                          3

                               © 2009 Estuate. All rights reserved.
ESTUATE
         WHITEPAPER
                                                                            Complex Applications Made Easy




       Overview of Oracle Security Products
With solutions spanning user management, access control, data protection, and monitoring/alerting for
compliance management, Oracle provides a comprehensive information security architecture and best-in-
class products.




                                  Oracle Security Data Products




                                                                                                        4

                                     © 2009 Estuate. All rights reserved.
ESTUATE
          WHITEPAPER
                                                                                Complex Applications Made Easy




User Management Best Practices
We have effectively used Oracle Enterprise User Security to simplify user management for a
manufacturing client. We accomplished this by enabling database user accounts to be centrally managed
in the Oracle Internet Directory, the core of Oracle’s Identity Management product suite. Oracle Directory
Synchronization Service, part of Oracle Internet Directory, facilitates synchronization between Oracle
Internet Directory and other directories and user repositories, including Microsoft Active Directory and
SunONE, allowing users to authenticate data using credentials stored in one of these other repositories.
Oracle Enterprise User Security provides support for strong authentication based on PKI digital
certificates or Kerberos.




                                                                                                             5

                                       © 2009 Estuate. All rights reserved.
ESTUATE
          WHITEPAPER
                                                                              Complex Applications Made Easy




Access Control Best Practices
Another client, a world-class university, wanted to protect highly-confidential, sensitive employee data
from its organization’s internal database administrators. We accomplished this by implementing Oracle
Database Vault.


Oracle Database Vault




                                 Oracle Database Vault Overview


Oracle Database Vault provides enterprises with protection from insider threats and inadvertent leakage
of sensitive application data. Access to application data by users and database administrators (DBAs) is
controlled using Database Vault realms, command rules and multifactor authorization. Database Vault
addresses access privilege by separating access to application data from traditional database and
security administration responsibilities. Database Vault realms block ANY-type privileges (SELECT ANY)
commonly available to DBAs from being used to access application data. Using multifactor authorization,
database access can be easily restricted based on IP address, time of day and other parameters.
Command rules enable Database Vault security administrators to associate rule sets or policies with
Oracle Database commands. Combined with multifactor authorization, command rules allow powerful
policies to be deployed inside the database, further reducing the security risk associated with insiders
bypassing the application.

Additionally, Database Vault’s numerous out-of-the-box reports address a wide range of security metrics,
such as attempted data access requests blocked by Realms. For example, if a DBA attempts to access
data from an application table protected by a Realm, Database Vault creates an audit record in a
specially-protected table within Database Vault. A Realm violation report makes it easy to view these
audit records.



                                                                                                           6

                                      © 2009 Estuate. All rights reserved.
ESTUATE
          WHITEPAPER
                                                                                Complex Applications Made Easy




Data Protection Best Practices




                              Transparent Data Encryption Overview




Oracle Advanced Security

We have successfully implemented data protection policies and procedures for several Estuate clients
using Oracle Advanced Security. Oracle Advanced Security Transparent Data Encryption (TDE) provides
the most advanced encryption capabilities for protecting sensitive information without requiring any
changes to the existing application. TDE is a native database solution that is completely transparent to
existing applications with no triggers, views or other application changes required. Data is transparently
encrypted when written to disk, and transparently decrypted after an application user has successfully
authenticated and passed all authorization checks. Authorization checks include verifying that the user
has the necessary read/update privileges. TDE can be used to encrypt columns that contain sensitive
data, or entire database objects residing in a tablespace. Tablespace encryption ensures all database
objects are encrypted at the file system level. When the database reads data blocks from the encrypted
tablespace, it transparently decrypts the data blocks. TDE also supports storing the TDE master
encryption key on a hardware security module (HSM) device. This provides an even higher level of
assurance protecting the TDE master key, as well as centralized key management in a clustered
environment.

Advanced Security also provides strong protection for data in transit by using comprehensive network
encryption capabilities. Advanced Security’s easy-to-deploy, comprehensive network encryption provides
both native network encryption and SSL/TLS-based encryption. In addition, it can be configured to accept
or reject communication from clients not using encryption, providing optimal deployment flexibility.
Configuration of network security is managed using the Oracle Network Configuration administration tool,
allowing businesses to easily deploy network encryption without any changes to applications.




                                                                                                             7

                                       © 2009 Estuate. All rights reserved.
ESTUATE
          WHITEPAPER
                                                                                 Complex Applications Made Easy




Oracle Secure Backup (OSB)

We have also implemented effective backup security for Estuate clients using Oracle’s comprehensive
tape backup solution for Oracle databases and file systems. Tight integration with the Oracle Database
provides optimal security and performance, eliminating backup of any associated database UNDO data.

A centralized administrative server provides a single point of control for enterprise-wide tape backup and
any associated encryption keys. The administrative server maintains a tape backup catalog and manages
security policies for distributed servers and tape devices. OSB encrypts data before the data leaves the
database, resulting in continuous data security when in transit to the tape drive unit. OSB also provides
the ability to back up and encrypt file systems directly to tape.



Oracle Data Masking Pack

We use Oracle Data Masking Pack to maintain the confidentiality of sensitive or confidential client data in
development, test or staging environments. The Data Masking Pack uses an irreversible process to
replace sensitive data with realistic-looking but scrubbed data based on masking rules, and ensures that
the original data cannot be retrieved or recovered. The Data Masking Pack provides out-of-the-box mask
primitives for various data types, such as random numbers, random digits, random dates and constants,
as well as built-in masking routines, such as shuffling, which shuffles the values in a column across
different rows. The Data Masking Pack helps maintain the integrity of the application while masking
sensitive data.




                                                                                                              8

                                       © 2009 Estuate. All rights reserved.
ESTUATE
          WHITEPAPER
                                                                                  Complex Applications Made Easy




Compliance Monitoring Best Practices




                                     Oracle Audit Vault Overview


Oracle Audit Vault

We use Oracle Audit Vault as an effective security compliance monitoring tool for our clients.

Audit Vault transparently collects and consolidates audit data from multiple databases across the
enterprise, providing valuable insight into who did what to which data when, including privileged users
who have direct access to the database. The integrity of audit data is ensured by using sophisticated
controls, including Oracle Database Vault and Oracle Advanced Security. Access to the audit data within
Audit Vault is strictly controlled. Privileged DBA users cannot view or modify the audit data, and even
auditors are prevented from modifying the audit data.

Audit Vault provides proactive threat detection through alerting. Event alerts help mitigate risk and protect
from insider threats by providing proactive notification of suspicious activity across the enterprise. Audit
Vault continuously monitors the inbound audit data, evaluating audit data against alert conditions. Alerts
can be associated with any auditable database event, including system events such as changes to
application tables, role grants and privileged user creation on sensitive systems. Audit Vault provides
graphical summaries of activities causing alerts. In addition, database audit settings are centrally
managed and monitored from within Audit Vault to ensure consistent auditing policies across the
enterprise.




                                                                                                                9

                                        © 2009 Estuate. All rights reserved.
ESTUATE
          WHITEPAPER
                                                                               Complex Applications Made Easy




Conclusion
Using Oracle Database Security products, we have delivered a full range of data security solutions to our
clients across the spectrum of user management, access control, data protection and compliance
monitoring business processes. We find that Oracle Database Security products, when properly
implemented using our best practices, provide comprehensive, world-class information security across all
Oracle-based applications.




                                                                                                            10

                                       © 2009 Estuate. All rights reserved.

Contenu connexe

Tendances

Azure information protection_datasheet_en-us
Azure information protection_datasheet_en-usAzure information protection_datasheet_en-us
Azure information protection_datasheet_en-usKjetil Lund-Paulsen
 
Securing Oracle Database 12c
Securing Oracle Database 12cSecuring Oracle Database 12c
Securing Oracle Database 12cInprise Group
 
5. 2010 11-03 bucharest oracle-tech_day_security
5. 2010 11-03 bucharest oracle-tech_day_security5. 2010 11-03 bucharest oracle-tech_day_security
5. 2010 11-03 bucharest oracle-tech_day_securityDoina Draganescu
 
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET Journal
 
Get ahead of cybersecurity with MS Enterprise Mobility + Security
Get ahead of cybersecurity with MS Enterprise Mobility + Security Get ahead of cybersecurity with MS Enterprise Mobility + Security
Get ahead of cybersecurity with MS Enterprise Mobility + Security Kjetil Lund-Paulsen
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataOnline Business
 
8 isecurity database
8 isecurity database8 isecurity database
8 isecurity databaseAnil Pandey
 
Classification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionClassification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionGianmarco Ferri
 
Secure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on CampusSecure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on CampusCisco Security
 
SaaS Platform - Alice
SaaS Platform - AliceSaaS Platform - Alice
SaaS Platform - AliceEkartha Inc
 
10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutionsFuji Xerox Singapore
 
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsDSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsAndris Soroka
 
Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...SubmissionResearchpa
 
Soonr IT Buyer's Guide
Soonr IT Buyer's GuideSoonr IT Buyer's Guide
Soonr IT Buyer's GuideReece Gaumont
 
Microsoft Rights Management
Microsoft Rights ManagementMicrosoft Rights Management
Microsoft Rights ManagementPeter1020
 
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...IRJET Journal
 
марко Safe net@rainbow-informzashita - februar 2012
марко Safe net@rainbow-informzashita - februar 2012марко Safe net@rainbow-informzashita - februar 2012
марко Safe net@rainbow-informzashita - februar 2012Валерий Коржов
 
Data security in a big data environment sweden
Data security in a big data environment   swedenData security in a big data environment   sweden
Data security in a big data environment swedenIBM Sverige
 

Tendances (20)

Azure information protection_datasheet_en-us
Azure information protection_datasheet_en-usAzure information protection_datasheet_en-us
Azure information protection_datasheet_en-us
 
Securing Oracle Database 12c
Securing Oracle Database 12cSecuring Oracle Database 12c
Securing Oracle Database 12c
 
5. 2010 11-03 bucharest oracle-tech_day_security
5. 2010 11-03 bucharest oracle-tech_day_security5. 2010 11-03 bucharest oracle-tech_day_security
5. 2010 11-03 bucharest oracle-tech_day_security
 
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on Cloud
 
Information Rights Management (IRM)
Information Rights Management (IRM)Information Rights Management (IRM)
Information Rights Management (IRM)
 
IQProtector Suite
IQProtector SuiteIQProtector Suite
IQProtector Suite
 
Get ahead of cybersecurity with MS Enterprise Mobility + Security
Get ahead of cybersecurity with MS Enterprise Mobility + Security Get ahead of cybersecurity with MS Enterprise Mobility + Security
Get ahead of cybersecurity with MS Enterprise Mobility + Security
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
8 isecurity database
8 isecurity database8 isecurity database
8 isecurity database
 
Classification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionClassification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtection
 
Secure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on CampusSecure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on Campus
 
SaaS Platform - Alice
SaaS Platform - AliceSaaS Platform - Alice
SaaS Platform - Alice
 
10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions
 
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsDSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
 
Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...
 
Soonr IT Buyer's Guide
Soonr IT Buyer's GuideSoonr IT Buyer's Guide
Soonr IT Buyer's Guide
 
Microsoft Rights Management
Microsoft Rights ManagementMicrosoft Rights Management
Microsoft Rights Management
 
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
 
марко Safe net@rainbow-informzashita - februar 2012
марко Safe net@rainbow-informzashita - februar 2012марко Safe net@rainbow-informzashita - februar 2012
марко Safe net@rainbow-informzashita - februar 2012
 
Data security in a big data environment sweden
Data security in a big data environment   swedenData security in a big data environment   sweden
Data security in a big data environment sweden
 

Similaire à Best Practices in Implementing Oracle Database Security Products

Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2Oracle BH
 
Oracle Sparc Cloud
Oracle Sparc CloudOracle Sparc Cloud
Oracle Sparc CloudErnest Jones
 
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom KyteOracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom KyteEdgar Alejandro Villegas
 
Capgemini technology vision for Oracle Database Security
Capgemini technology vision for Oracle Database SecurityCapgemini technology vision for Oracle Database Security
Capgemini technology vision for Oracle Database SecurityJohan Louwers
 
Oracle database 12c security and compliance
Oracle database 12c security and complianceOracle database 12c security and compliance
Oracle database 12c security and complianceFITSFSd
 
Oracle-Security_Executive-Presentation
Oracle-Security_Executive-PresentationOracle-Security_Executive-Presentation
Oracle-Security_Executive-Presentationstefanjung
 
Oracle Identity Management Leveraging Oracle’s Engineered Systems
Oracle Identity Management Leveraging Oracle’s Engineered SystemsOracle Identity Management Leveraging Oracle’s Engineered Systems
Oracle Identity Management Leveraging Oracle’s Engineered SystemsGregOracle
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksEmmanuel Oshogwe Akpeokhai
 
OOW13: Developing secure mobile applications (CON8902)
OOW13: Developing secure mobile applications (CON8902)OOW13: Developing secure mobile applications (CON8902)
OOW13: Developing secure mobile applications (CON8902)GregOracle
 
Oracle Key Vault Data Subsetting and Masking
Oracle Key Vault Data Subsetting and MaskingOracle Key Vault Data Subsetting and Masking
Oracle Key Vault Data Subsetting and MaskingDLT Solutions
 
Blbs an-encryption-oracle-bloombase-store safe-nec-express-5800ft-application...
Blbs an-encryption-oracle-bloombase-store safe-nec-express-5800ft-application...Blbs an-encryption-oracle-bloombase-store safe-nec-express-5800ft-application...
Blbs an-encryption-oracle-bloombase-store safe-nec-express-5800ft-application...Bloombase
 
Brochure Imperva Securesphere Vormetric Encryption
Brochure Imperva Securesphere Vormetric EncryptionBrochure Imperva Securesphere Vormetric Encryption
Brochure Imperva Securesphere Vormetric EncryptionMichelle Guerrero Montalvo
 
Con8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalCon8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalOracleIDM
 
8.1.6 newsecurity features
8.1.6 newsecurity features8.1.6 newsecurity features
8.1.6 newsecurity featuresAnil Pandey
 
Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - ...
Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - ...Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - ...
Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - ...Nadine Schoene
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsLindaWatson19
 

Similaire à Best Practices in Implementing Oracle Database Security Products (20)

Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2
 
Oracle Sparc Cloud
Oracle Sparc CloudOracle Sparc Cloud
Oracle Sparc Cloud
 
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom KyteOracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
 
Capgemini technology vision for Oracle Database Security
Capgemini technology vision for Oracle Database SecurityCapgemini technology vision for Oracle Database Security
Capgemini technology vision for Oracle Database Security
 
Oracle database 12c security and compliance
Oracle database 12c security and complianceOracle database 12c security and compliance
Oracle database 12c security and compliance
 
Oracle-Security_Executive-Presentation
Oracle-Security_Executive-PresentationOracle-Security_Executive-Presentation
Oracle-Security_Executive-Presentation
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
 
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
 
2015 AUG 24-Oracle EBS
2015 AUG 24-Oracle EBS2015 AUG 24-Oracle EBS
2015 AUG 24-Oracle EBS
 
Oracle Identity Management Leveraging Oracle’s Engineered Systems
Oracle Identity Management Leveraging Oracle’s Engineered SystemsOracle Identity Management Leveraging Oracle’s Engineered Systems
Oracle Identity Management Leveraging Oracle’s Engineered Systems
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External Attacks
 
OOW13: Developing secure mobile applications (CON8902)
OOW13: Developing secure mobile applications (CON8902)OOW13: Developing secure mobile applications (CON8902)
OOW13: Developing secure mobile applications (CON8902)
 
Oracle Key Vault Data Subsetting and Masking
Oracle Key Vault Data Subsetting and MaskingOracle Key Vault Data Subsetting and Masking
Oracle Key Vault Data Subsetting and Masking
 
Blbs an-encryption-oracle-bloombase-store safe-nec-express-5800ft-application...
Blbs an-encryption-oracle-bloombase-store safe-nec-express-5800ft-application...Blbs an-encryption-oracle-bloombase-store safe-nec-express-5800ft-application...
Blbs an-encryption-oracle-bloombase-store safe-nec-express-5800ft-application...
 
Brochure Imperva Securesphere Vormetric Encryption
Brochure Imperva Securesphere Vormetric EncryptionBrochure Imperva Securesphere Vormetric Encryption
Brochure Imperva Securesphere Vormetric Encryption
 
Con8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalCon8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-final
 
8.1.6 newsecurity features
8.1.6 newsecurity features8.1.6 newsecurity features
8.1.6 newsecurity features
 
Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - ...
Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - ...Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - ...
Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - ...
 
Oracle Cloud Essentials
Oracle Cloud EssentialsOracle Cloud Essentials
Oracle Cloud Essentials
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production Environments
 

Plus de Estuate, Inc.

Webinar: Amplify your information governance with a robust data lineage
Webinar: Amplify your information governance with a robust data lineageWebinar: Amplify your information governance with a robust data lineage
Webinar: Amplify your information governance with a robust data lineageEstuate, Inc.
 
Using hadoop for enterprise data management
Using hadoop for enterprise data managementUsing hadoop for enterprise data management
Using hadoop for enterprise data managementEstuate, Inc.
 
How to neutralize vulnerabilities in a mixed cloud- on premise environment
How to neutralize vulnerabilities in a mixed cloud- on premise environmentHow to neutralize vulnerabilities in a mixed cloud- on premise environment
How to neutralize vulnerabilities in a mixed cloud- on premise environmentEstuate, Inc.
 
Webinar on IBM Optim Test Data Management and Data Privacy
Webinar on IBM Optim Test Data Management and Data PrivacyWebinar on IBM Optim Test Data Management and Data Privacy
Webinar on IBM Optim Test Data Management and Data PrivacyEstuate, Inc.
 
Webinar on Managing your Oracle EBS for Productivity
Webinar on Managing your Oracle EBS for ProductivityWebinar on Managing your Oracle EBS for Productivity
Webinar on Managing your Oracle EBS for ProductivityEstuate, Inc.
 
Stop Hunger Now Partners with Estuate to package 10,000 Meals
Stop Hunger Now Partners with Estuate to package 10,000 MealsStop Hunger Now Partners with Estuate to package 10,000 Meals
Stop Hunger Now Partners with Estuate to package 10,000 MealsEstuate, Inc.
 
Upcoming Webinar on Retiring Applications - The Low Hanging Fruit in IT Savings
Upcoming Webinar on Retiring Applications - The Low Hanging Fruit in IT SavingsUpcoming Webinar on Retiring Applications - The Low Hanging Fruit in IT Savings
Upcoming Webinar on Retiring Applications - The Low Hanging Fruit in IT SavingsEstuate, Inc.
 
Estuate helps major wireless telecom save tens of millions
Estuate helps major wireless telecom save tens of millionsEstuate helps major wireless telecom save tens of millions
Estuate helps major wireless telecom save tens of millionsEstuate, Inc.
 
Estuate EDM Checklist
Estuate EDM ChecklistEstuate EDM Checklist
Estuate EDM ChecklistEstuate, Inc.
 
Ready To Make The Move To Oracle Release 12
Ready To Make The Move To Oracle Release 12Ready To Make The Move To Oracle Release 12
Ready To Make The Move To Oracle Release 12Estuate, Inc.
 
Estuate - Control Application Data Growth
Estuate - Control Application Data GrowthEstuate - Control Application Data Growth
Estuate - Control Application Data GrowthEstuate, Inc.
 
Integration of Oracle EAM with Oracle AutoVue
Integration of Oracle EAM with Oracle AutoVueIntegration of Oracle EAM with Oracle AutoVue
Integration of Oracle EAM with Oracle AutoVueEstuate, Inc.
 
Coeur D Alene Case Study
Coeur D Alene Case StudyCoeur D Alene Case Study
Coeur D Alene Case StudyEstuate, Inc.
 
Estuate Service Offerings
Estuate Service OfferingsEstuate Service Offerings
Estuate Service OfferingsEstuate, Inc.
 
Five Characteristics of a Good Oracle Exadata Implementation Partner
Five Characteristics of a Good Oracle Exadata Implementation PartnerFive Characteristics of a Good Oracle Exadata Implementation Partner
Five Characteristics of a Good Oracle Exadata Implementation PartnerEstuate, Inc.
 
Estuate IBM Optim Service Offerings
Estuate IBM Optim Service OfferingsEstuate IBM Optim Service Offerings
Estuate IBM Optim Service OfferingsEstuate, Inc.
 
Business Intelligence Solutions
Business Intelligence SolutionsBusiness Intelligence Solutions
Business Intelligence SolutionsEstuate, Inc.
 

Plus de Estuate, Inc. (18)

Webinar: Amplify your information governance with a robust data lineage
Webinar: Amplify your information governance with a robust data lineageWebinar: Amplify your information governance with a robust data lineage
Webinar: Amplify your information governance with a robust data lineage
 
Using hadoop for enterprise data management
Using hadoop for enterprise data managementUsing hadoop for enterprise data management
Using hadoop for enterprise data management
 
How to neutralize vulnerabilities in a mixed cloud- on premise environment
How to neutralize vulnerabilities in a mixed cloud- on premise environmentHow to neutralize vulnerabilities in a mixed cloud- on premise environment
How to neutralize vulnerabilities in a mixed cloud- on premise environment
 
Webinar on IBM Optim Test Data Management and Data Privacy
Webinar on IBM Optim Test Data Management and Data PrivacyWebinar on IBM Optim Test Data Management and Data Privacy
Webinar on IBM Optim Test Data Management and Data Privacy
 
Webinar on Managing your Oracle EBS for Productivity
Webinar on Managing your Oracle EBS for ProductivityWebinar on Managing your Oracle EBS for Productivity
Webinar on Managing your Oracle EBS for Productivity
 
Stop Hunger Now Partners with Estuate to package 10,000 Meals
Stop Hunger Now Partners with Estuate to package 10,000 MealsStop Hunger Now Partners with Estuate to package 10,000 Meals
Stop Hunger Now Partners with Estuate to package 10,000 Meals
 
Upcoming Webinar on Retiring Applications - The Low Hanging Fruit in IT Savings
Upcoming Webinar on Retiring Applications - The Low Hanging Fruit in IT SavingsUpcoming Webinar on Retiring Applications - The Low Hanging Fruit in IT Savings
Upcoming Webinar on Retiring Applications - The Low Hanging Fruit in IT Savings
 
Estuate helps major wireless telecom save tens of millions
Estuate helps major wireless telecom save tens of millionsEstuate helps major wireless telecom save tens of millions
Estuate helps major wireless telecom save tens of millions
 
Estuate EDM Checklist
Estuate EDM ChecklistEstuate EDM Checklist
Estuate EDM Checklist
 
Ready To Make The Move To Oracle Release 12
Ready To Make The Move To Oracle Release 12Ready To Make The Move To Oracle Release 12
Ready To Make The Move To Oracle Release 12
 
MySQL Migration
MySQL MigrationMySQL Migration
MySQL Migration
 
Estuate - Control Application Data Growth
Estuate - Control Application Data GrowthEstuate - Control Application Data Growth
Estuate - Control Application Data Growth
 
Integration of Oracle EAM with Oracle AutoVue
Integration of Oracle EAM with Oracle AutoVueIntegration of Oracle EAM with Oracle AutoVue
Integration of Oracle EAM with Oracle AutoVue
 
Coeur D Alene Case Study
Coeur D Alene Case StudyCoeur D Alene Case Study
Coeur D Alene Case Study
 
Estuate Service Offerings
Estuate Service OfferingsEstuate Service Offerings
Estuate Service Offerings
 
Five Characteristics of a Good Oracle Exadata Implementation Partner
Five Characteristics of a Good Oracle Exadata Implementation PartnerFive Characteristics of a Good Oracle Exadata Implementation Partner
Five Characteristics of a Good Oracle Exadata Implementation Partner
 
Estuate IBM Optim Service Offerings
Estuate IBM Optim Service OfferingsEstuate IBM Optim Service Offerings
Estuate IBM Optim Service Offerings
 
Business Intelligence Solutions
Business Intelligence SolutionsBusiness Intelligence Solutions
Business Intelligence Solutions
 

Dernier

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 

Dernier (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

Best Practices in Implementing Oracle Database Security Products

  • 1. Best Practices in Implementing Oracle Database Security Products White Papers Abstract Information is the world’s new currency. Databases are the digital banks that store and retrieve valuable information. The growing number of high-profile incidents in which customer records, confidential information and intellectual property are leaked, lost or stolen has created an explosive demand for solutions that protect against the deliberate or inadvertent release of sensitive information. Moreover, numerous information-intensive government and industry regulations require organizations to protect the integrity of customer, employee and proprietary information and corporate digital assets. Security breaches can no longer be "swept under the rug" because of strict breach disclosure laws. Addressing information protection and control (IPC) is a complex challenge. Today, nearly all organizational information exists in electronic form, typically stored in databases. So, it stands to reason that enterprises must secure their databases as part of any IPC strategy to protect sensitive information and comply with regulations. Database security represents a preemptive strategy to preventing enterprise data theft and regulatory compliance infractions. Seemakiran Oracle is the global leader in relational database technology, Head of India Operations and has built a rich set of database security products and database features within its product portfolio. Implementing effective database security on the Oracle platform requires a Estuate deep knowledge of the Oracle product stack and experience 1183 Bordeaux Dr, Suite 4 in real-world security implementation using Oracle. Estuate brings strong credentials to its clients in both respects, Sunnyvale, CA 94089 emanating from our deep Oracle product engineering roots Phone: +1 408-400-0680 and years of Oracle-based client work. Fax: +1 408-400-0683 This paper profiles the best practices in implementing Oracle- www.estuate.com based information security that we have built from our years of experience. January 2009
  • 2. ESTUATE WHITEPAPER Complex Applications Made Easy Estuate is a global information technology (IT) services company based in the heart of Silicon Valley. Our founders have decades of deep software product experience at Oracle, particularly in Oracle-based applications development, integration and modernization, and unmatched Oracle E-Business Suite product knowledge. Our focus is two-fold: • Providing expert software product development services to software companies • Providing high-value application implementation and management services to enterprise clients. We pride ourselves on being highly-responsive, nimble and efficient, and we are very honored to let our clients speak on our behalf. Our software product development focus includes core product development and testing, business process integration and technology modernization. Our software company clients include Arena Solutions, Cisco, Citrix, Escalate, IBM, Oracle, Performant, Pictage, Salesforce.com, DataFlux (division of SAS) and WebEx. Our enterprise application implementation and management focus is on custom application development and the full Oracle E-Business Suite platform. Our enterprise application clients include Bechtel, Fox Interactive Media, HP, Matson, Stanford University, Visa and Wells Fargo. For more information, please contact info@estuate.com or visit www.estuate.com Copyright © 2009 Estuate Inc. All rights reserved. The entire contents of this document are subject to copyright with all rights reserved. All copyrightable text and graphics, the selection, arrangement and presentation of all information and the overall design of the document are the sole and exclusive property of Estuate. 2 © 2009 Estuate. All rights reserved.
  • 3. ESTUATE WHITEPAPER Complex Applications Made Easy Contents 1. Overview of Oracle Security Products……...............................4 2. User Management Best Practices…………………………..…....5 3. Access Control Best Practices…………………………………...6 4. Data Protection Best Practices…………………...………….......7 5. Compliance Monitoring Best Practices…….............................9 6. Conclusion……………………………………………....................10 3 © 2009 Estuate. All rights reserved.
  • 4. ESTUATE WHITEPAPER Complex Applications Made Easy Overview of Oracle Security Products With solutions spanning user management, access control, data protection, and monitoring/alerting for compliance management, Oracle provides a comprehensive information security architecture and best-in- class products. Oracle Security Data Products 4 © 2009 Estuate. All rights reserved.
  • 5. ESTUATE WHITEPAPER Complex Applications Made Easy User Management Best Practices We have effectively used Oracle Enterprise User Security to simplify user management for a manufacturing client. We accomplished this by enabling database user accounts to be centrally managed in the Oracle Internet Directory, the core of Oracle’s Identity Management product suite. Oracle Directory Synchronization Service, part of Oracle Internet Directory, facilitates synchronization between Oracle Internet Directory and other directories and user repositories, including Microsoft Active Directory and SunONE, allowing users to authenticate data using credentials stored in one of these other repositories. Oracle Enterprise User Security provides support for strong authentication based on PKI digital certificates or Kerberos. 5 © 2009 Estuate. All rights reserved.
  • 6. ESTUATE WHITEPAPER Complex Applications Made Easy Access Control Best Practices Another client, a world-class university, wanted to protect highly-confidential, sensitive employee data from its organization’s internal database administrators. We accomplished this by implementing Oracle Database Vault. Oracle Database Vault Oracle Database Vault Overview Oracle Database Vault provides enterprises with protection from insider threats and inadvertent leakage of sensitive application data. Access to application data by users and database administrators (DBAs) is controlled using Database Vault realms, command rules and multifactor authorization. Database Vault addresses access privilege by separating access to application data from traditional database and security administration responsibilities. Database Vault realms block ANY-type privileges (SELECT ANY) commonly available to DBAs from being used to access application data. Using multifactor authorization, database access can be easily restricted based on IP address, time of day and other parameters. Command rules enable Database Vault security administrators to associate rule sets or policies with Oracle Database commands. Combined with multifactor authorization, command rules allow powerful policies to be deployed inside the database, further reducing the security risk associated with insiders bypassing the application. Additionally, Database Vault’s numerous out-of-the-box reports address a wide range of security metrics, such as attempted data access requests blocked by Realms. For example, if a DBA attempts to access data from an application table protected by a Realm, Database Vault creates an audit record in a specially-protected table within Database Vault. A Realm violation report makes it easy to view these audit records. 6 © 2009 Estuate. All rights reserved.
  • 7. ESTUATE WHITEPAPER Complex Applications Made Easy Data Protection Best Practices Transparent Data Encryption Overview Oracle Advanced Security We have successfully implemented data protection policies and procedures for several Estuate clients using Oracle Advanced Security. Oracle Advanced Security Transparent Data Encryption (TDE) provides the most advanced encryption capabilities for protecting sensitive information without requiring any changes to the existing application. TDE is a native database solution that is completely transparent to existing applications with no triggers, views or other application changes required. Data is transparently encrypted when written to disk, and transparently decrypted after an application user has successfully authenticated and passed all authorization checks. Authorization checks include verifying that the user has the necessary read/update privileges. TDE can be used to encrypt columns that contain sensitive data, or entire database objects residing in a tablespace. Tablespace encryption ensures all database objects are encrypted at the file system level. When the database reads data blocks from the encrypted tablespace, it transparently decrypts the data blocks. TDE also supports storing the TDE master encryption key on a hardware security module (HSM) device. This provides an even higher level of assurance protecting the TDE master key, as well as centralized key management in a clustered environment. Advanced Security also provides strong protection for data in transit by using comprehensive network encryption capabilities. Advanced Security’s easy-to-deploy, comprehensive network encryption provides both native network encryption and SSL/TLS-based encryption. In addition, it can be configured to accept or reject communication from clients not using encryption, providing optimal deployment flexibility. Configuration of network security is managed using the Oracle Network Configuration administration tool, allowing businesses to easily deploy network encryption without any changes to applications. 7 © 2009 Estuate. All rights reserved.
  • 8. ESTUATE WHITEPAPER Complex Applications Made Easy Oracle Secure Backup (OSB) We have also implemented effective backup security for Estuate clients using Oracle’s comprehensive tape backup solution for Oracle databases and file systems. Tight integration with the Oracle Database provides optimal security and performance, eliminating backup of any associated database UNDO data. A centralized administrative server provides a single point of control for enterprise-wide tape backup and any associated encryption keys. The administrative server maintains a tape backup catalog and manages security policies for distributed servers and tape devices. OSB encrypts data before the data leaves the database, resulting in continuous data security when in transit to the tape drive unit. OSB also provides the ability to back up and encrypt file systems directly to tape. Oracle Data Masking Pack We use Oracle Data Masking Pack to maintain the confidentiality of sensitive or confidential client data in development, test or staging environments. The Data Masking Pack uses an irreversible process to replace sensitive data with realistic-looking but scrubbed data based on masking rules, and ensures that the original data cannot be retrieved or recovered. The Data Masking Pack provides out-of-the-box mask primitives for various data types, such as random numbers, random digits, random dates and constants, as well as built-in masking routines, such as shuffling, which shuffles the values in a column across different rows. The Data Masking Pack helps maintain the integrity of the application while masking sensitive data. 8 © 2009 Estuate. All rights reserved.
  • 9. ESTUATE WHITEPAPER Complex Applications Made Easy Compliance Monitoring Best Practices Oracle Audit Vault Overview Oracle Audit Vault We use Oracle Audit Vault as an effective security compliance monitoring tool for our clients. Audit Vault transparently collects and consolidates audit data from multiple databases across the enterprise, providing valuable insight into who did what to which data when, including privileged users who have direct access to the database. The integrity of audit data is ensured by using sophisticated controls, including Oracle Database Vault and Oracle Advanced Security. Access to the audit data within Audit Vault is strictly controlled. Privileged DBA users cannot view or modify the audit data, and even auditors are prevented from modifying the audit data. Audit Vault provides proactive threat detection through alerting. Event alerts help mitigate risk and protect from insider threats by providing proactive notification of suspicious activity across the enterprise. Audit Vault continuously monitors the inbound audit data, evaluating audit data against alert conditions. Alerts can be associated with any auditable database event, including system events such as changes to application tables, role grants and privileged user creation on sensitive systems. Audit Vault provides graphical summaries of activities causing alerts. In addition, database audit settings are centrally managed and monitored from within Audit Vault to ensure consistent auditing policies across the enterprise. 9 © 2009 Estuate. All rights reserved.
  • 10. ESTUATE WHITEPAPER Complex Applications Made Easy Conclusion Using Oracle Database Security products, we have delivered a full range of data security solutions to our clients across the spectrum of user management, access control, data protection and compliance monitoring business processes. We find that Oracle Database Security products, when properly implemented using our best practices, provide comprehensive, world-class information security across all Oracle-based applications. 10 © 2009 Estuate. All rights reserved.