SlideShare une entreprise Scribd logo
1  sur  52
Télécharger pour lire hors ligne
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P1 © 2008 Bloombase, Inc.
Encryption of Oracle Databases by
Bloombase StoreSafe on NEC
Express5800/ft Series Fault-Tolerant
Server Application Notes
A Quick Guide to Deploy Bloombase StoreSafe on an NEC
Express5800/ft Series Fault-Tolerant Server for encryption of
Oracle Database
Executive Summary
Bloombase StoreSafe storage security server protects privacy of sensitive enterprise data by transparent encryption and
decryption. This paper summarizes quick notes to setup of Bloombase StoreSafe in High Availability environment on NEC
Express5800/ft series fault-tolerant server to achieve transparent Oracle encryption meeting various information security
regulatory compliance standards without sacrificing performance.
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P2 © 2008 Bloombase, Inc.
Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations,
products, people and events depicted herein are fictitious and no association with any real company, organization, product, person or event is intended or should be inferred. Complying
with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a
retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of
Bloombase.
Bloombase may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in
any written license agreement from Bloombase, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.
This document is the property of Bloombase. No exploitation or transfer of any information contained herein is permitted in the absence of an agreement with Bloombase, and neither the
document nor any such information may be released without the written consent of Bloombase.
© 2008 Bloombase, Inc.
Bloombase, Spitfire, StoreSafe and Keyparc are either registered trademarks or trademarks of Bloombase in the United States, People’s Republic of China, Hong Kong Special
Administrative Region and/or other countries.
NEC is a registered trademark of NEC Corporation.
Oracle is a registered trademark of Oracle Corporation and / or its affiliates.
Microsoft and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and / or other countries.
Red Hat and Red Hat Enterprise Linux are registered trademarks of Red Hat Inc. in the United States and / or other countries
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P3 © 2008 Bloombase, Inc.
Table of Contents
Table of Contents 3
Introduction 5
Purpose and Scope 7
Infrastructure 8
Software......................................................................................................... 8
Oracle Database Server................................................................................... 8
Bloombase Spitfire StoreSafe Server ............................................................... 9
Configuration Overview 10
Encryption of Oracle data files by Spitfire StoreSafe on Microsoft Windows 2003, virtual storage connected by CIFS 12
Preparation for the Oracle server ...................................................................... 12
Create Spitfire StoreSafe virtual storage for encryption ...................................... 14
Migrate Oracle data files.................................................................................. 19
Automatic failover testing ................................................................................ 19
Encryption of Oracle data files by Spitfire StoreSafe on Microsoft Windows 2003, virtual storage connected by NFS 20
Configuration of Microsoft Windows Services for UNIX .......................................20
Preparation for the Oracle server ...................................................................... 21
Create Spitfire StoreSafe virtual storage for encryption ......................................24
Migrate Oracle data files..................................................................................28
Automatic failover testing ................................................................................28
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P4 © 2008 Bloombase, Inc.
Encryption of Oracle data files by Spitfire StoreSafe on Red Hat Enterprise Linux 4, virtual storage connected by CIFS
.................................................................................................................... 29
Preparation for the Oracle server ......................................................................29
Create Spitfire StoreSafe virtual storage for encryption ...................................... 31
Migrate Oracle data files..................................................................................36
Automatic failover testing ................................................................................ 37
Encryption of Oracle data files by Spitfire StoreSafe on Red Hat Enterprise Linux 4, virtual storage connected by NFS
.................................................................................................................... 38
Configuration of Microsoft Windows Services for UNIX .......................................38
Preparation for the Oracle server ......................................................................39
Create Spitfire StoreSafe virtual storage for encryption ......................................42
Migrate Oracle data files..................................................................................46
Automatic failover testing ................................................................................ 47
Automatic Failover of Oracle server ................................................................ 48
Conclusion 49
Acknowledgement 50
Disclaimer 51
Technical Reference 52
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P5 © 2008 Bloombase, Inc.
Introduction
Digital assets including financial reports, legal documents, private human resources information, confidential contracts and
sensitive user data are invaluable properties of a corporation. A business cannot risk losing these information, both
confidentiality and non-repudiation. Nevertheless, the Internet has becoming more pervasive, security attacks have grown.
News and reports have revealed millions of dollars of loss in various enterprises and organizations due to security
breaches.
Data protection at the persistence layer used to be an uncommon subject in information technology industry. Persistence
data, in the old days, are assumed safely kept and stored in highly secure data centers with effective physical access
control and close surveillance. However, trends in the industry in backup, archive and high availability with an aim to
safeguard data from the worst attack and be responsive to rescues, keeping the enterprise core system running non-stop,
have opened up chances confidential data get disclosed and tampered by unauthorized parties.
Numerous security compliance and standards including Sarbanes Oxley, Gramm-Leach-Bliley Act and Personal Data Privacy
Ordinance have raised enterprises’ awareness of securing their core business and customer data. However, persistence
data protection is technically a difficult subject. One has to prepare for additional system complexity, loss of performance,
at the same time, maintaining the same level of stability and scalability, and most important of all, be highly secure, hacker-
proof rather than exposing more security loopholes.
Core business data of an enterprise constitutes a major segment of assets that a corporation possesses. Customer data,
marketing strategies, intellectual properties in form of source codes and business logic, sales history and prediction
figures, and other decision support numerical analysis as result of data-mining may often bury forward looking intelligence
that in some sense have very high future value when put into good use.
This application note discusses the application of Bloombase Spitfire StoreSafe storage security server to protect the most
popular enterprise database server in the world, Oracle, where sensitive business information from ERP, knowledge base to
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P6 © 2008 Bloombase, Inc.
contents, etc are stored, achieving transparent deployment and performance encryption without tedious schema alteration
or application change.
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P7 © 2008 Bloombase, Inc.
Purpose and Scope
Securing Oracle data files is not an easy task as data files are dynamic, they keep updated at all times which means static
way of data encryption offered by encryption utilities are not going to fit the bill. Sensitive data committed to Oracle data
files will also be written to database redo logs, archive logs and
flash recovery logs. Thus, to secure the system as a whole, all data files, redo, archive and flash recovery logs have to be
encrypted as well. Bloombase Spitfire StoreSafe storage security server provides a single solution to various information
security problems that place huge threats to sensitive data stored in Oracle databases.
This document describes application of Bloombase Spitfire StoreSafe storage security server on Oracle databases installed
on Microsoft Windows and Red Hat Enterprise Linux platforms to secure sensitive database information at rest transparently
without tedious second development efforts and numerous deployment risks and enables customers to protect their private
business information and immediately achieve various information security regulatory compliances and standards.
Bloombase Spitfire StoreSafe also offers option for High Availability scenario in Microsoft Windows and Red Hat Enterprise
Linux operating system with the utilization of NEC Express5800/ft series fault-tolerant server.
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P8 © 2008 Bloombase, Inc.
Infrastructure
Software
Oracle Database Oracle Databaser Server 8.1.7
Bloombase Spitfire StoreSafe
Server
Bloombase StoreSafe storage security server 3.0
Oracle Database Server
Server NEC Express5800/320Fd
Processors Quad-core 3.0GHz
Operating System Microsoft Windows Server 2003 RC2 Enterprise Edition
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P9 © 2008 Bloombase, Inc.
Bloombase Spitfire StoreSafe Server
Server NEC Express5800/320Fc
Processors Quad-Core 2.66Hz
Operating System Microsoft Windows Server 2003 RC2 Enterprise Edition / Red Hat Enterprise
Linux 4
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P10 © 2008 Bloombase, Inc.
Configuration Overview
Plaintext at virtual storage
mounted to D:
Oracle server
(192.168.10.30)
Ciphertext at physical location
E:ENCRYPTED
Oracle server
(192.168.10.30)
Spitfire StoreSafe
(192.168.10.20)
To demonstrate the full interoperability of Spitfire StoreSafe on NEC Express5800/ft series fault-tolerant server, we will
perform the testing in 4 different scenario :
1. Encryption of Oracle data files on Microsoft Windows 2003 by Spitfire StoreSafe 3.0 on Microsoft Windows 2003, virtual
storage connected by CIFS
2. Encryption of Oracle data files on Microsoft Windows 2003 by Spitfire StoreSafe 3.0 on Microsoft Windows 2003, virtual
storage connected by NFS
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P11 © 2008 Bloombase, Inc.
3. Encryption of Oracle data files on Microsoft Windows 2003 by Spitfire StoreSafe 3.0 on Red Hat Enterprise Linux 4,
virtual storage connected by CIFS
4. Encryption of Oracle data files on Microsoft Windows 2003 by Spitfire StoreSafe 3.0 on Red Hat Enterprise Linux 4,
virtual storage connected by NFS
Before we start, assume the Oracle server is installed in the NEC Express5800/ft series fault-tolerant server with IP
192.168.10.30
and hostname
FTDEMO
Spitfire StoreSafe is installed in another NEC Express5800/ft series server with IP
192.168.10.20
and hostname
FC_DEMO
An Oracle instance is created and named
DB01
data files are stored at the local drive :
D:ORACLEORADATA
What we aim to achieve is to have all the Oracle data files to get secured by Spitfire StoreSafe
In the testing regarding NFS connection, to connect Spitfire StoreSafe virtual storage by NFS in Microsoft Windows platform,
Windows Services for UNIX needs to be installed. In this testing, we install Windows Services for UNIX 3.5
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P12 © 2008 Bloombase, Inc.
Encryption of Oracle data files by Spitfire StoreSafe on
Microsoft Windows 2003, virtual storage connected by
CIFS
Preparation for the Oracle server
To start with, shutdown Oracle Instance first.
To backup the original oracle data files, copy
D:ORACLE
to another drive eg
C:TEMP
To create a location for encrypted files eg
E:ENCRYPTED
, change the drive letter for the partition
D:
to another drive
E:
Create a windows user eg
ssuser
for user connection from Spitfire StoreSafe server.
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P13 © 2008 Bloombase, Inc.
Share the encrypted file location to the windows user and grant with appropriate access permission.
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P14 © 2008 Bloombase, Inc.
Create Spitfire StoreSafe virtual storage for encryption
Create an encryption key
Create a storage configuration to the encrypted files physical location
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P15 © 2008 Bloombase, Inc.
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P16 © 2008 Bloombase, Inc.
Create a storage user
ssuser
who has the same name as the windows user
Create a virtual storage for the above storage configuration
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P17 © 2008 Bloombase, Inc.
Choose the defined encryption key and the appropriate cryptographic cipher
Grant the user access to the defined storage user so that Oracle instance can connect to the Spitfire StoreSafe virtual
storage
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P18 © 2008 Bloombase, Inc.
On the Spitfre StoreSafe server machine, change Bloombase Spitfire StoreSafe service to log on as the defined windows
user
Back to the Oracle server machine, also change the Oracle instance service and Oracle TNS listener to log on as the windows
user
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P19 © 2008 Bloombase, Inc.
After completed the virtual storage configuration and restarted Spitfire StoreSafe server, connect to the Spitfire StoreSafe
virtual storage protected
Migrate Oracle data files
Encrypt the Oracle data files by copying the file from
C:TEMP
to
D:
Startup Oracle instance service and listener. With the Oracle data files location unchanged and connected as
D:ORACLE
, the Oracle instance can be started up successfully.
Automatic failover testing
To test the failover functionality of NEC Expess FT server, the power cable of the Spitfire StoreSafe server is unplugged to
simulate a server down situation. While 10000 records are being encrypted by Spitfire StoreSafe server and inserted into the
database, the server down and automatic failover provided by NEC Express5800/ft series fault-tolerant server has made the
outage negligible throughout the data encryption process.
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P20 © 2008 Bloombase, Inc.
Encryption of Oracle data files by Spitfire StoreSafe on
Microsoft Windows 2003, virtual storage connected by
NFS
Configuration of Microsoft Windows Services for UNIX
Create mapping between the users in Microsoft Windows platform and UNIX platform. Since Microsoft Windows does not
use uid / gid like UNIX does, we will map the windows users to the immediate uid of -2 and gid of -2 which are the
unmapped id in UNIX.
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P21 © 2008 Bloombase, Inc.
Preparation for the Oracle server
To start with, shutdown Oracle Instance first.
To backup the original oracle data files, copy
D:ORACLE
to another drive eg
C:TEMP
To create a location for encrypted files eg
E:ENCRYPTED
, change the drive letter for the partition
D:
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P22 © 2008 Bloombase, Inc.
to another drive
E:
Create a windows user eg
ssuser
for user connection from Spitfire StoreSafe server.
Share the encrypted file location to the windows user and grant with appropriate access permission
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P23 © 2008 Bloombase, Inc.
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P24 © 2008 Bloombase, Inc.
Create Spitfire StoreSafe virtual storage for encryption
Create an encryption key
Create a storage configuration to the encrypted files physical location
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P25 © 2008 Bloombase, Inc.
Create a virtual storage for the above storage configuration
Choose the defined encryption key and the appropriate cryptographic cipher
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P26 © 2008 Bloombase, Inc.
For the storage access control, specify the default user identifier and group identifier to the unmapped id -2 which is used
for the mapping between the windows users identifier and the unix user identifiers.
Grant the host access to the Oracle server so that Oracle instance can connect to the Spitfire StoreSafe virtual storage
On the Spitfre StoreSafe server machine, change Bloombase Spitfire StoreSafe service to log on as the defined windows
user
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P27 © 2008 Bloombase, Inc.
Back to the Oracle server machine, also change the Oracle instance service and Oracle TNS listener to log on as the windows
user
After completed the virtual storage configuration and restarted Spitfire StoreSafe server, connect to the Spitfire StoreSafe
virtual storage protected
$ mount 192.168.10.20:/protected D:
One of the benefits of NFS connection is the hard mount options, which will keep the re-establishing the lost connection
infinitely.
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P28 © 2008 Bloombase, Inc.
Migrate Oracle data files
Encrypt the Oracle data files by copying the file from
C:TEMP
to
D:
Startup Oracle instance service and listener. With the Oracle data files location unchanged and connected as
D:ORACLE
, the Oracle instance can be started up successfully.
Automatic failover testing
To test the failover functionality of NEC Expess FT server, the power cable of the Spitfire StoreSafe server is unplugged to
simulate a server down situation. While 10000 records are being encrypted by Spitfire StoreSafe server and inserted into the
database, the server down and automatic failover provided by NEC Express5800/ft series server has made the outage
negligible throughout the data encryption process.
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P29 © 2008 Bloombase, Inc.
Encryption of Oracle data files by Spitfire StoreSafe on
Red Hat Enterprise Linux 4, virtual storage connected
by CIFS
Preparation for the Oracle server
To start with, shutdown Oracle Instance first.
To backup the original oracle data files, copy
D:ORACLE
to another drive eg
C:TEMP
To create a location for encrypted files eg
E:ENCRYPTED
, change the drive letter for the partition
D:
to another drive
E:
Create a windows user eg
ssuser
for user connection from Spitfire StoreSafe server.
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P30 © 2008 Bloombase, Inc.
Share the encrypted file location to the windows user and grant with appropriate access permission
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P31 © 2008 Bloombase, Inc.
Create Spitfire StoreSafe virtual storage for encryption
Create an encryption key
Create a storage configuration to the encrypted files physical location
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P32 © 2008 Bloombase, Inc.
Create a storage user
ssuser
who has the same name as the windows user
Create a virtual storage for the above storage configuration
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P33 © 2008 Bloombase, Inc.
Choose the defined encryption key and the appropriate cryptographic cipher
Grant the user access to the defined storage user so that Oracle instance can connect to the Spitfire StoreSafe virtual
storage
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P34 © 2008 Bloombase, Inc.
On the Spitfre StoreSafe server machine, change Bloombase Spitfire StoreSafe service to log on as the defined windows
user
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P35 © 2008 Bloombase, Inc.
Back to the Oracle server machine, also change the Oracle instance service and Oracle TNS listener to log on as the windows
user
After completed the virtual storage configuration and restarted Spitfire StoreSafe server and the Oracle instance, connect to
the Spitfire StoreSafe virtual storage protected
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P36 © 2008 Bloombase, Inc.
Migrate Oracle data files
Encrypt the Oracle data files by copying the file from
C:TEMP
to
D:
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P37 © 2008 Bloombase, Inc.
Startup Oracle instance service and listener. With the Oracle data files location unchanged and connected as
D:ORACLE
, the Oracle instance can be started up successfully.
Automatic failover testing
To test the failover functionality of NEC Expess FT server, the power cable of the Spitfire StoreSafe server is unplugged to
simulate a server down situation. While 10000 records are being encrypted by Spitfire StoreSafe server and inserted into the
database, the server down and automatic failover provided by NEC Express5800/ft series fault-tolerant server has made the
outage negligible throughout the data encryption process.
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P38 © 2008 Bloombase, Inc.
Encryption of Oracle data files by Spitfire StoreSafe on
Red Hat Enterprise Linux 4, virtual storage connected
by NFS
Configuration of Microsoft Windows Services for UNIX
Create mapping between the users in Microsoft Windows platform and UNIX platform. Since Microsoft Windows does not
use uid / gid like UNIX does, we will map the windows users to the root uid of 0 and gid of 0 in UNIX.
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P39 © 2008 Bloombase, Inc.
Preparation for the Oracle server
To start with, shutdown Oracle Instance first.
To backup the original oracle data files, copy
D:ORACLE
to another drive eg
C:TEMP
To create a location for encrypted files eg
E:ENCRYPTED
, change the drive letter for the partition
D:
to another drive
E:
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P40 © 2008 Bloombase, Inc.
Create a windows user eg
ssuser
for user connection from Spitfire StoreSafe server.
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P41 © 2008 Bloombase, Inc.
Share the encrypted file location to the windows user and grant with appropriate access permission
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P42 © 2008 Bloombase, Inc.
Create Spitfire StoreSafe virtual storage for encryption
Create an encryption key
Create a storage configuration to the encrypted files physical location
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P43 © 2008 Bloombase, Inc.
Create a virtual storage for the above storage configuration
Choose the defined encryption key and the appropriate cryptographic cipher
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P44 © 2008 Bloombase, Inc.
Grant the host access to the Oracle server so that Oracle instance can connect to the Spitfire StoreSafe virtual storage
On the Spitfre StoreSafe server machine, change Bloombase Spitfire StoreSafe service to log on as the defined windows
user
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P45 © 2008 Bloombase, Inc.
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P46 © 2008 Bloombase, Inc.
Back to the Oracle server machine, also change the Oracle instance service and Oracle TNS listener to log on as the windows
user
After completed the virtual storage configuration and restarted Spitfire StoreSafe server, connect to the Spitfire StoreSafe
virtual storage protected
$ mount 192.168.10.20:/protected D:
One of the benefits of NFS connection is the hard mount options, which will keep the re-establishing the lost connection
infinitely.
Migrate Oracle data files
Encrypt the Oracle data files by copying the file from
C:TEMP
to
D:
Startup Oracle instance service and listener. With the Oracle data files location unchanged and connected as
D:ORACLE
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P47 © 2008 Bloombase, Inc.
, the Oracle instance can be started up successfully.
Automatic failover testing
To test the failover functionality of NEC Expess FT server, the power cable of the Spitfire StoreSafe server is unplugged to
simulate a server down situation. While 10000 records are being encrypted by Spitfire StoreSafe server and inserted into the
database, the server down and automatic failover provided by NEC Express5800/ft series fault-tolerant server has made the
outage negligible throughout the data encryption process.
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P48 © 2008 Bloombase, Inc.
Automatic Failover of Oracle server
Apart from the automatic failover of Spitfire StoreSafe server with the help of NEC Express5800/ft series fault-tolerant
server, automatic failover of Oracle server on the powerful HA-enabled machine is also performed. To test the failover
functionality of NEC Expess FT server, the hardware module is unplugged to simulate a server down situation. At the same
time, 10000 records are encrypted by Spitfire StoreSafe server and inserted into the database, the automatic failover
provided by NEC Express5800/ft series fault-tolerant server has made the data encryption process continuous without a
single moment of downtime, data loss and interruption to Spitfire StoreSafe security server. The user-transparent fault-
tolerance of NEC’s FT server has significantly improved the system availability.
Before the server outage, both the HA modules are in “System Duplexing” mode.
After unplugged the server module to simulate a server down disaster, the running module will take over to be the active
node and running in “Simplex” mode.
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P49 © 2008 Bloombase, Inc.
Conclusion
Bloombase Spitfire StoreSafe storage security server protects privacy of sensitive enterprise data by transparent encryption
and decryption. This paper summarizes quick notes to setup of Spitfire StoreSafe and simple migration of Oracle database
on NEC Express5800/ft Series Fault-Tolerant Server to achieve transparent Oracle encryption meeting high availability
requirement and various information security regulatory compliance standards without sacrificing performance.
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P50 © 2008 Bloombase, Inc.
Acknowledgement
We would like to thank the following individuals for their contribution (in terms of consultancy and facilities management) to
the testing process and technical report :
Lamson Chan, NEC IT Platform Infrastructure
Kevin Cheung, NEC IT Platform Infrastructure
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P51 © 2008 Bloombase, Inc.
Disclaimer
The tests described in this paper were conducted in the Bloombase InteropLab. Bloombase has not tested this configuration
with all the combinations of hardware and software options available. There may be significant differences in your
configuration that will change the procedures necessary to accomplish the objectives outlined in this paper. If you find that
any of these procedures do not work in your environment, please contact us immediately.
Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P52 © 2008 Bloombase, Inc.
Technical Reference
1. NEC Express5800/ft Fault-Tolerant, http://www.nec.com/global/prod/express/library/brochure/ft_E08FT2.pdf
2. Oracle Storage Program Change Notice, http://www.oracle.com/technology/deploy/availability/htdocs/oscp.html
3. Oracle Database Protection by Spitfire StoreSafe,
http://www.bloombase.com/download/index.jsp?Url=/products/spitfire/storesafe/OracleDatabaseProtectionBy
SpitfireStoreSafe.pdf
4. Bloombase Spitfire StoreSafe Compatibility Matrix for NAS,
http://www.bloombase.com/content/8396639C9Q8dke046yZ3i7Yvfa6iaCNvwpZ81x

Contenu connexe

En vedette

ES-351 Bloombase Spitfire Identity Manager Essentials
ES-351 Bloombase Spitfire Identity Manager EssentialsES-351 Bloombase Spitfire Identity Manager Essentials
ES-351 Bloombase Spitfire Identity Manager EssentialsBloombase
 
Performance Benchmarks for Bloombase Spitfire StoreSafe Encryption Security S...
Performance Benchmarks for Bloombase Spitfire StoreSafe Encryption Security S...Performance Benchmarks for Bloombase Spitfire StoreSafe Encryption Security S...
Performance Benchmarks for Bloombase Spitfire StoreSafe Encryption Security S...Bloombase
 
Bloombase Spitfire Messaging Security Server Specifications
Bloombase Spitfire Messaging Security Server SpecificationsBloombase Spitfire Messaging Security Server Specifications
Bloombase Spitfire Messaging Security Server SpecificationsBloombase
 
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC CelerraBloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC CelerraBloombase
 
Bloombase Spitfire Identity Manager Compatibility Matrix
Bloombase Spitfire Identity Manager Compatibility MatrixBloombase Spitfire Identity Manager Compatibility Matrix
Bloombase Spitfire Identity Manager Compatibility MatrixBloombase
 
Bloombase Spitfire StoreSafe QLogic 10GbE Ethernet Adapter Interoperability
Bloombase Spitfire StoreSafe QLogic 10GbE Ethernet Adapter InteroperabilityBloombase Spitfire StoreSafe QLogic 10GbE Ethernet Adapter Interoperability
Bloombase Spitfire StoreSafe QLogic 10GbE Ethernet Adapter InteroperabilityBloombase
 

En vedette (6)

ES-351 Bloombase Spitfire Identity Manager Essentials
ES-351 Bloombase Spitfire Identity Manager EssentialsES-351 Bloombase Spitfire Identity Manager Essentials
ES-351 Bloombase Spitfire Identity Manager Essentials
 
Performance Benchmarks for Bloombase Spitfire StoreSafe Encryption Security S...
Performance Benchmarks for Bloombase Spitfire StoreSafe Encryption Security S...Performance Benchmarks for Bloombase Spitfire StoreSafe Encryption Security S...
Performance Benchmarks for Bloombase Spitfire StoreSafe Encryption Security S...
 
Bloombase Spitfire Messaging Security Server Specifications
Bloombase Spitfire Messaging Security Server SpecificationsBloombase Spitfire Messaging Security Server Specifications
Bloombase Spitfire Messaging Security Server Specifications
 
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC CelerraBloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
 
Bloombase Spitfire Identity Manager Compatibility Matrix
Bloombase Spitfire Identity Manager Compatibility MatrixBloombase Spitfire Identity Manager Compatibility Matrix
Bloombase Spitfire Identity Manager Compatibility Matrix
 
Bloombase Spitfire StoreSafe QLogic 10GbE Ethernet Adapter Interoperability
Bloombase Spitfire StoreSafe QLogic 10GbE Ethernet Adapter InteroperabilityBloombase Spitfire StoreSafe QLogic 10GbE Ethernet Adapter Interoperability
Bloombase Spitfire StoreSafe QLogic 10GbE Ethernet Adapter Interoperability
 

Similaire à Blbs an-encryption-oracle-bloombase-store safe-nec-express-5800ft-application-notes-uslet-en-r2

Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Bloombase
 
Oracle Key Vault Data Subsetting and Masking
Oracle Key Vault Data Subsetting and MaskingOracle Key Vault Data Subsetting and Masking
Oracle Key Vault Data Subsetting and MaskingDLT Solutions
 
Data restoration lexington ky
Data restoration lexington kyData restoration lexington ky
Data restoration lexington kyLexingtonKy96
 
Offsite backup lexington ky
Offsite backup lexington kyOffsite backup lexington ky
Offsite backup lexington kyLexingtonKy96
 
Off site backup lexington ky
Off site backup lexington kyOff site backup lexington ky
Off site backup lexington kyLexingtonKy96
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...Bloombase
 
Oracle Data Protection - 1. část
Oracle Data Protection - 1. částOracle Data Protection - 1. část
Oracle Data Protection - 1. částMarketingArrowECS_CZ
 
Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely Skytap Cloud
 
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. částExadata z pohledu zákazníka a novinky generace X8M - 1. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. částMarketingArrowECS_CZ
 
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...Bloombase
 
5 here today still here tomorrow new technology for big_forever_archives
5 here today still here tomorrow new technology for big_forever_archives5 here today still here tomorrow new technology for big_forever_archives
5 here today still here tomorrow new technology for big_forever_archivesDr. Wilfred Lin (Ph.D.)
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplaceBloombase
 
Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic Bloombase
 
Exadata x5 investor-relations-final
Exadata x5 investor-relations-finalExadata x5 investor-relations-final
Exadata x5 investor-relations-finalChien Auron
 
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirementsMySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirementsOlivier DASINI
 
pre-FOSDEM MySQL day, February 2018 - MySQL Document Store
pre-FOSDEM MySQL day, February 2018 - MySQL Document Storepre-FOSDEM MySQL day, February 2018 - MySQL Document Store
pre-FOSDEM MySQL day, February 2018 - MySQL Document StoreFrederic Descamps
 
Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...Kal BO
 
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...Bloombase
 
Interoperability of Bloombase Spitfire StoreSafe Security Server and Brocade ...
Interoperability of Bloombase Spitfire StoreSafe Security Server and Brocade ...Interoperability of Bloombase Spitfire StoreSafe Security Server and Brocade ...
Interoperability of Bloombase Spitfire StoreSafe Security Server and Brocade ...Bloombase
 

Similaire à Blbs an-encryption-oracle-bloombase-store safe-nec-express-5800ft-application-notes-uslet-en-r2 (20)

Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
 
Oracle Key Vault Data Subsetting and Masking
Oracle Key Vault Data Subsetting and MaskingOracle Key Vault Data Subsetting and Masking
Oracle Key Vault Data Subsetting and Masking
 
Data restoration lexington ky
Data restoration lexington kyData restoration lexington ky
Data restoration lexington ky
 
Offsite backup lexington ky
Offsite backup lexington kyOffsite backup lexington ky
Offsite backup lexington ky
 
Off site backup lexington ky
Off site backup lexington kyOff site backup lexington ky
Off site backup lexington ky
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
Oracle Data Protection - 1. část
Oracle Data Protection - 1. částOracle Data Protection - 1. část
Oracle Data Protection - 1. část
 
Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely
 
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. částExadata z pohledu zákazníka a novinky generace X8M - 1. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
 
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...
 
5 here today still here tomorrow new technology for big_forever_archives
5 here today still here tomorrow new technology for big_forever_archives5 here today still here tomorrow new technology for big_forever_archives
5 here today still here tomorrow new technology for big_forever_archives
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplace
 
Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic
 
OOW19 - HOL5221
OOW19 - HOL5221OOW19 - HOL5221
OOW19 - HOL5221
 
Exadata x5 investor-relations-final
Exadata x5 investor-relations-finalExadata x5 investor-relations-final
Exadata x5 investor-relations-final
 
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirementsMySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
 
pre-FOSDEM MySQL day, February 2018 - MySQL Document Store
pre-FOSDEM MySQL day, February 2018 - MySQL Document Storepre-FOSDEM MySQL day, February 2018 - MySQL Document Store
pre-FOSDEM MySQL day, February 2018 - MySQL Document Store
 
Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...
 
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...
 
Interoperability of Bloombase Spitfire StoreSafe Security Server and Brocade ...
Interoperability of Bloombase Spitfire StoreSafe Security Server and Brocade ...Interoperability of Bloombase Spitfire StoreSafe Security Server and Brocade ...
Interoperability of Bloombase Spitfire StoreSafe Security Server and Brocade ...
 

Plus de Bloombase

a50009291enw - Letter.pdf
a50009291enw - Letter.pdfa50009291enw - Letter.pdf
a50009291enw - Letter.pdfBloombase
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...Bloombase
 
Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusBloombase
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625Bloombase
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizationsBloombase
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentBloombase
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Bloombase
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enwBloombase
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...Bloombase
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12Bloombase
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16Bloombase
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enwBloombase
 
Bloombase store safe mf solution brief 2017 pdf
Bloombase store safe   mf solution brief 2017 pdfBloombase store safe   mf solution brief 2017 pdf
Bloombase store safe mf solution brief 2017 pdfBloombase
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017Bloombase
 
The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryptionBloombase
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBloombase
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Bloombase
 
Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Bloombase
 
Xsb03030 usen
Xsb03030 usenXsb03030 usen
Xsb03030 usenBloombase
 

Plus de Bloombase (20)

a50009291enw - Letter.pdf
a50009291enw - Letter.pdfa50009291enw - Letter.pdf
a50009291enw - Letter.pdf
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and Morpheus
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizations
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop Environment
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Bloombase store safe mf solution brief 2017 pdf
Bloombase store safe   mf solution brief 2017 pdfBloombase store safe   mf solution brief 2017 pdf
Bloombase store safe mf solution brief 2017 pdf
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017
 
The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryption
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-en
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2
 
Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2
 
Xsb03030 usen
Xsb03030 usenXsb03030 usen
Xsb03030 usen
 

Dernier

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Dernier (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Blbs an-encryption-oracle-bloombase-store safe-nec-express-5800ft-application-notes-uslet-en-r2

  • 1. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P1 © 2008 Bloombase, Inc. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes A Quick Guide to Deploy Bloombase StoreSafe on an NEC Express5800/ft Series Fault-Tolerant Server for encryption of Oracle Database Executive Summary Bloombase StoreSafe storage security server protects privacy of sensitive enterprise data by transparent encryption and decryption. This paper summarizes quick notes to setup of Bloombase StoreSafe in High Availability environment on NEC Express5800/ft series fault-tolerant server to achieve transparent Oracle encryption meeting various information security regulatory compliance standards without sacrificing performance.
  • 2. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P2 © 2008 Bloombase, Inc. Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, people and events depicted herein are fictitious and no association with any real company, organization, product, person or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Bloombase. Bloombase may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Bloombase, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. This document is the property of Bloombase. No exploitation or transfer of any information contained herein is permitted in the absence of an agreement with Bloombase, and neither the document nor any such information may be released without the written consent of Bloombase. © 2008 Bloombase, Inc. Bloombase, Spitfire, StoreSafe and Keyparc are either registered trademarks or trademarks of Bloombase in the United States, People’s Republic of China, Hong Kong Special Administrative Region and/or other countries. NEC is a registered trademark of NEC Corporation. Oracle is a registered trademark of Oracle Corporation and / or its affiliates. Microsoft and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and / or other countries. Red Hat and Red Hat Enterprise Linux are registered trademarks of Red Hat Inc. in the United States and / or other countries
  • 3. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P3 © 2008 Bloombase, Inc. Table of Contents Table of Contents 3 Introduction 5 Purpose and Scope 7 Infrastructure 8 Software......................................................................................................... 8 Oracle Database Server................................................................................... 8 Bloombase Spitfire StoreSafe Server ............................................................... 9 Configuration Overview 10 Encryption of Oracle data files by Spitfire StoreSafe on Microsoft Windows 2003, virtual storage connected by CIFS 12 Preparation for the Oracle server ...................................................................... 12 Create Spitfire StoreSafe virtual storage for encryption ...................................... 14 Migrate Oracle data files.................................................................................. 19 Automatic failover testing ................................................................................ 19 Encryption of Oracle data files by Spitfire StoreSafe on Microsoft Windows 2003, virtual storage connected by NFS 20 Configuration of Microsoft Windows Services for UNIX .......................................20 Preparation for the Oracle server ...................................................................... 21 Create Spitfire StoreSafe virtual storage for encryption ......................................24 Migrate Oracle data files..................................................................................28 Automatic failover testing ................................................................................28
  • 4. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P4 © 2008 Bloombase, Inc. Encryption of Oracle data files by Spitfire StoreSafe on Red Hat Enterprise Linux 4, virtual storage connected by CIFS .................................................................................................................... 29 Preparation for the Oracle server ......................................................................29 Create Spitfire StoreSafe virtual storage for encryption ...................................... 31 Migrate Oracle data files..................................................................................36 Automatic failover testing ................................................................................ 37 Encryption of Oracle data files by Spitfire StoreSafe on Red Hat Enterprise Linux 4, virtual storage connected by NFS .................................................................................................................... 38 Configuration of Microsoft Windows Services for UNIX .......................................38 Preparation for the Oracle server ......................................................................39 Create Spitfire StoreSafe virtual storage for encryption ......................................42 Migrate Oracle data files..................................................................................46 Automatic failover testing ................................................................................ 47 Automatic Failover of Oracle server ................................................................ 48 Conclusion 49 Acknowledgement 50 Disclaimer 51 Technical Reference 52
  • 5. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P5 © 2008 Bloombase, Inc. Introduction Digital assets including financial reports, legal documents, private human resources information, confidential contracts and sensitive user data are invaluable properties of a corporation. A business cannot risk losing these information, both confidentiality and non-repudiation. Nevertheless, the Internet has becoming more pervasive, security attacks have grown. News and reports have revealed millions of dollars of loss in various enterprises and organizations due to security breaches. Data protection at the persistence layer used to be an uncommon subject in information technology industry. Persistence data, in the old days, are assumed safely kept and stored in highly secure data centers with effective physical access control and close surveillance. However, trends in the industry in backup, archive and high availability with an aim to safeguard data from the worst attack and be responsive to rescues, keeping the enterprise core system running non-stop, have opened up chances confidential data get disclosed and tampered by unauthorized parties. Numerous security compliance and standards including Sarbanes Oxley, Gramm-Leach-Bliley Act and Personal Data Privacy Ordinance have raised enterprises’ awareness of securing their core business and customer data. However, persistence data protection is technically a difficult subject. One has to prepare for additional system complexity, loss of performance, at the same time, maintaining the same level of stability and scalability, and most important of all, be highly secure, hacker- proof rather than exposing more security loopholes. Core business data of an enterprise constitutes a major segment of assets that a corporation possesses. Customer data, marketing strategies, intellectual properties in form of source codes and business logic, sales history and prediction figures, and other decision support numerical analysis as result of data-mining may often bury forward looking intelligence that in some sense have very high future value when put into good use. This application note discusses the application of Bloombase Spitfire StoreSafe storage security server to protect the most popular enterprise database server in the world, Oracle, where sensitive business information from ERP, knowledge base to
  • 6. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P6 © 2008 Bloombase, Inc. contents, etc are stored, achieving transparent deployment and performance encryption without tedious schema alteration or application change.
  • 7. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P7 © 2008 Bloombase, Inc. Purpose and Scope Securing Oracle data files is not an easy task as data files are dynamic, they keep updated at all times which means static way of data encryption offered by encryption utilities are not going to fit the bill. Sensitive data committed to Oracle data files will also be written to database redo logs, archive logs and flash recovery logs. Thus, to secure the system as a whole, all data files, redo, archive and flash recovery logs have to be encrypted as well. Bloombase Spitfire StoreSafe storage security server provides a single solution to various information security problems that place huge threats to sensitive data stored in Oracle databases. This document describes application of Bloombase Spitfire StoreSafe storage security server on Oracle databases installed on Microsoft Windows and Red Hat Enterprise Linux platforms to secure sensitive database information at rest transparently without tedious second development efforts and numerous deployment risks and enables customers to protect their private business information and immediately achieve various information security regulatory compliances and standards. Bloombase Spitfire StoreSafe also offers option for High Availability scenario in Microsoft Windows and Red Hat Enterprise Linux operating system with the utilization of NEC Express5800/ft series fault-tolerant server.
  • 8. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P8 © 2008 Bloombase, Inc. Infrastructure Software Oracle Database Oracle Databaser Server 8.1.7 Bloombase Spitfire StoreSafe Server Bloombase StoreSafe storage security server 3.0 Oracle Database Server Server NEC Express5800/320Fd Processors Quad-core 3.0GHz Operating System Microsoft Windows Server 2003 RC2 Enterprise Edition
  • 9. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P9 © 2008 Bloombase, Inc. Bloombase Spitfire StoreSafe Server Server NEC Express5800/320Fc Processors Quad-Core 2.66Hz Operating System Microsoft Windows Server 2003 RC2 Enterprise Edition / Red Hat Enterprise Linux 4
  • 10. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P10 © 2008 Bloombase, Inc. Configuration Overview Plaintext at virtual storage mounted to D: Oracle server (192.168.10.30) Ciphertext at physical location E:ENCRYPTED Oracle server (192.168.10.30) Spitfire StoreSafe (192.168.10.20) To demonstrate the full interoperability of Spitfire StoreSafe on NEC Express5800/ft series fault-tolerant server, we will perform the testing in 4 different scenario : 1. Encryption of Oracle data files on Microsoft Windows 2003 by Spitfire StoreSafe 3.0 on Microsoft Windows 2003, virtual storage connected by CIFS 2. Encryption of Oracle data files on Microsoft Windows 2003 by Spitfire StoreSafe 3.0 on Microsoft Windows 2003, virtual storage connected by NFS
  • 11. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P11 © 2008 Bloombase, Inc. 3. Encryption of Oracle data files on Microsoft Windows 2003 by Spitfire StoreSafe 3.0 on Red Hat Enterprise Linux 4, virtual storage connected by CIFS 4. Encryption of Oracle data files on Microsoft Windows 2003 by Spitfire StoreSafe 3.0 on Red Hat Enterprise Linux 4, virtual storage connected by NFS Before we start, assume the Oracle server is installed in the NEC Express5800/ft series fault-tolerant server with IP 192.168.10.30 and hostname FTDEMO Spitfire StoreSafe is installed in another NEC Express5800/ft series server with IP 192.168.10.20 and hostname FC_DEMO An Oracle instance is created and named DB01 data files are stored at the local drive : D:ORACLEORADATA What we aim to achieve is to have all the Oracle data files to get secured by Spitfire StoreSafe In the testing regarding NFS connection, to connect Spitfire StoreSafe virtual storage by NFS in Microsoft Windows platform, Windows Services for UNIX needs to be installed. In this testing, we install Windows Services for UNIX 3.5
  • 12. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P12 © 2008 Bloombase, Inc. Encryption of Oracle data files by Spitfire StoreSafe on Microsoft Windows 2003, virtual storage connected by CIFS Preparation for the Oracle server To start with, shutdown Oracle Instance first. To backup the original oracle data files, copy D:ORACLE to another drive eg C:TEMP To create a location for encrypted files eg E:ENCRYPTED , change the drive letter for the partition D: to another drive E: Create a windows user eg ssuser for user connection from Spitfire StoreSafe server.
  • 13. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P13 © 2008 Bloombase, Inc. Share the encrypted file location to the windows user and grant with appropriate access permission.
  • 14. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P14 © 2008 Bloombase, Inc. Create Spitfire StoreSafe virtual storage for encryption Create an encryption key Create a storage configuration to the encrypted files physical location
  • 15. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P15 © 2008 Bloombase, Inc.
  • 16. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P16 © 2008 Bloombase, Inc. Create a storage user ssuser who has the same name as the windows user Create a virtual storage for the above storage configuration
  • 17. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P17 © 2008 Bloombase, Inc. Choose the defined encryption key and the appropriate cryptographic cipher Grant the user access to the defined storage user so that Oracle instance can connect to the Spitfire StoreSafe virtual storage
  • 18. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P18 © 2008 Bloombase, Inc. On the Spitfre StoreSafe server machine, change Bloombase Spitfire StoreSafe service to log on as the defined windows user Back to the Oracle server machine, also change the Oracle instance service and Oracle TNS listener to log on as the windows user
  • 19. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P19 © 2008 Bloombase, Inc. After completed the virtual storage configuration and restarted Spitfire StoreSafe server, connect to the Spitfire StoreSafe virtual storage protected Migrate Oracle data files Encrypt the Oracle data files by copying the file from C:TEMP to D: Startup Oracle instance service and listener. With the Oracle data files location unchanged and connected as D:ORACLE , the Oracle instance can be started up successfully. Automatic failover testing To test the failover functionality of NEC Expess FT server, the power cable of the Spitfire StoreSafe server is unplugged to simulate a server down situation. While 10000 records are being encrypted by Spitfire StoreSafe server and inserted into the database, the server down and automatic failover provided by NEC Express5800/ft series fault-tolerant server has made the outage negligible throughout the data encryption process.
  • 20. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P20 © 2008 Bloombase, Inc. Encryption of Oracle data files by Spitfire StoreSafe on Microsoft Windows 2003, virtual storage connected by NFS Configuration of Microsoft Windows Services for UNIX Create mapping between the users in Microsoft Windows platform and UNIX platform. Since Microsoft Windows does not use uid / gid like UNIX does, we will map the windows users to the immediate uid of -2 and gid of -2 which are the unmapped id in UNIX.
  • 21. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P21 © 2008 Bloombase, Inc. Preparation for the Oracle server To start with, shutdown Oracle Instance first. To backup the original oracle data files, copy D:ORACLE to another drive eg C:TEMP To create a location for encrypted files eg E:ENCRYPTED , change the drive letter for the partition D:
  • 22. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P22 © 2008 Bloombase, Inc. to another drive E: Create a windows user eg ssuser for user connection from Spitfire StoreSafe server. Share the encrypted file location to the windows user and grant with appropriate access permission
  • 23. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P23 © 2008 Bloombase, Inc.
  • 24. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P24 © 2008 Bloombase, Inc. Create Spitfire StoreSafe virtual storage for encryption Create an encryption key Create a storage configuration to the encrypted files physical location
  • 25. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P25 © 2008 Bloombase, Inc. Create a virtual storage for the above storage configuration Choose the defined encryption key and the appropriate cryptographic cipher
  • 26. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P26 © 2008 Bloombase, Inc. For the storage access control, specify the default user identifier and group identifier to the unmapped id -2 which is used for the mapping between the windows users identifier and the unix user identifiers. Grant the host access to the Oracle server so that Oracle instance can connect to the Spitfire StoreSafe virtual storage On the Spitfre StoreSafe server machine, change Bloombase Spitfire StoreSafe service to log on as the defined windows user
  • 27. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P27 © 2008 Bloombase, Inc. Back to the Oracle server machine, also change the Oracle instance service and Oracle TNS listener to log on as the windows user After completed the virtual storage configuration and restarted Spitfire StoreSafe server, connect to the Spitfire StoreSafe virtual storage protected $ mount 192.168.10.20:/protected D: One of the benefits of NFS connection is the hard mount options, which will keep the re-establishing the lost connection infinitely.
  • 28. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P28 © 2008 Bloombase, Inc. Migrate Oracle data files Encrypt the Oracle data files by copying the file from C:TEMP to D: Startup Oracle instance service and listener. With the Oracle data files location unchanged and connected as D:ORACLE , the Oracle instance can be started up successfully. Automatic failover testing To test the failover functionality of NEC Expess FT server, the power cable of the Spitfire StoreSafe server is unplugged to simulate a server down situation. While 10000 records are being encrypted by Spitfire StoreSafe server and inserted into the database, the server down and automatic failover provided by NEC Express5800/ft series server has made the outage negligible throughout the data encryption process.
  • 29. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P29 © 2008 Bloombase, Inc. Encryption of Oracle data files by Spitfire StoreSafe on Red Hat Enterprise Linux 4, virtual storage connected by CIFS Preparation for the Oracle server To start with, shutdown Oracle Instance first. To backup the original oracle data files, copy D:ORACLE to another drive eg C:TEMP To create a location for encrypted files eg E:ENCRYPTED , change the drive letter for the partition D: to another drive E: Create a windows user eg ssuser for user connection from Spitfire StoreSafe server.
  • 30. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P30 © 2008 Bloombase, Inc. Share the encrypted file location to the windows user and grant with appropriate access permission
  • 31. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P31 © 2008 Bloombase, Inc. Create Spitfire StoreSafe virtual storage for encryption Create an encryption key Create a storage configuration to the encrypted files physical location
  • 32. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P32 © 2008 Bloombase, Inc. Create a storage user ssuser who has the same name as the windows user Create a virtual storage for the above storage configuration
  • 33. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P33 © 2008 Bloombase, Inc. Choose the defined encryption key and the appropriate cryptographic cipher Grant the user access to the defined storage user so that Oracle instance can connect to the Spitfire StoreSafe virtual storage
  • 34. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P34 © 2008 Bloombase, Inc. On the Spitfre StoreSafe server machine, change Bloombase Spitfire StoreSafe service to log on as the defined windows user
  • 35. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P35 © 2008 Bloombase, Inc. Back to the Oracle server machine, also change the Oracle instance service and Oracle TNS listener to log on as the windows user After completed the virtual storage configuration and restarted Spitfire StoreSafe server and the Oracle instance, connect to the Spitfire StoreSafe virtual storage protected
  • 36. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P36 © 2008 Bloombase, Inc. Migrate Oracle data files Encrypt the Oracle data files by copying the file from C:TEMP to D:
  • 37. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P37 © 2008 Bloombase, Inc. Startup Oracle instance service and listener. With the Oracle data files location unchanged and connected as D:ORACLE , the Oracle instance can be started up successfully. Automatic failover testing To test the failover functionality of NEC Expess FT server, the power cable of the Spitfire StoreSafe server is unplugged to simulate a server down situation. While 10000 records are being encrypted by Spitfire StoreSafe server and inserted into the database, the server down and automatic failover provided by NEC Express5800/ft series fault-tolerant server has made the outage negligible throughout the data encryption process.
  • 38. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P38 © 2008 Bloombase, Inc. Encryption of Oracle data files by Spitfire StoreSafe on Red Hat Enterprise Linux 4, virtual storage connected by NFS Configuration of Microsoft Windows Services for UNIX Create mapping between the users in Microsoft Windows platform and UNIX platform. Since Microsoft Windows does not use uid / gid like UNIX does, we will map the windows users to the root uid of 0 and gid of 0 in UNIX.
  • 39. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P39 © 2008 Bloombase, Inc. Preparation for the Oracle server To start with, shutdown Oracle Instance first. To backup the original oracle data files, copy D:ORACLE to another drive eg C:TEMP To create a location for encrypted files eg E:ENCRYPTED , change the drive letter for the partition D: to another drive E:
  • 40. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P40 © 2008 Bloombase, Inc. Create a windows user eg ssuser for user connection from Spitfire StoreSafe server.
  • 41. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P41 © 2008 Bloombase, Inc. Share the encrypted file location to the windows user and grant with appropriate access permission
  • 42. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P42 © 2008 Bloombase, Inc. Create Spitfire StoreSafe virtual storage for encryption Create an encryption key Create a storage configuration to the encrypted files physical location
  • 43. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P43 © 2008 Bloombase, Inc. Create a virtual storage for the above storage configuration Choose the defined encryption key and the appropriate cryptographic cipher
  • 44. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P44 © 2008 Bloombase, Inc. Grant the host access to the Oracle server so that Oracle instance can connect to the Spitfire StoreSafe virtual storage On the Spitfre StoreSafe server machine, change Bloombase Spitfire StoreSafe service to log on as the defined windows user
  • 45. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P45 © 2008 Bloombase, Inc.
  • 46. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P46 © 2008 Bloombase, Inc. Back to the Oracle server machine, also change the Oracle instance service and Oracle TNS listener to log on as the windows user After completed the virtual storage configuration and restarted Spitfire StoreSafe server, connect to the Spitfire StoreSafe virtual storage protected $ mount 192.168.10.20:/protected D: One of the benefits of NFS connection is the hard mount options, which will keep the re-establishing the lost connection infinitely. Migrate Oracle data files Encrypt the Oracle data files by copying the file from C:TEMP to D: Startup Oracle instance service and listener. With the Oracle data files location unchanged and connected as D:ORACLE
  • 47. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P47 © 2008 Bloombase, Inc. , the Oracle instance can be started up successfully. Automatic failover testing To test the failover functionality of NEC Expess FT server, the power cable of the Spitfire StoreSafe server is unplugged to simulate a server down situation. While 10000 records are being encrypted by Spitfire StoreSafe server and inserted into the database, the server down and automatic failover provided by NEC Express5800/ft series fault-tolerant server has made the outage negligible throughout the data encryption process.
  • 48. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P48 © 2008 Bloombase, Inc. Automatic Failover of Oracle server Apart from the automatic failover of Spitfire StoreSafe server with the help of NEC Express5800/ft series fault-tolerant server, automatic failover of Oracle server on the powerful HA-enabled machine is also performed. To test the failover functionality of NEC Expess FT server, the hardware module is unplugged to simulate a server down situation. At the same time, 10000 records are encrypted by Spitfire StoreSafe server and inserted into the database, the automatic failover provided by NEC Express5800/ft series fault-tolerant server has made the data encryption process continuous without a single moment of downtime, data loss and interruption to Spitfire StoreSafe security server. The user-transparent fault- tolerance of NEC’s FT server has significantly improved the system availability. Before the server outage, both the HA modules are in “System Duplexing” mode. After unplugged the server module to simulate a server down disaster, the running module will take over to be the active node and running in “Simplex” mode.
  • 49. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P49 © 2008 Bloombase, Inc. Conclusion Bloombase Spitfire StoreSafe storage security server protects privacy of sensitive enterprise data by transparent encryption and decryption. This paper summarizes quick notes to setup of Spitfire StoreSafe and simple migration of Oracle database on NEC Express5800/ft Series Fault-Tolerant Server to achieve transparent Oracle encryption meeting high availability requirement and various information security regulatory compliance standards without sacrificing performance.
  • 50. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P50 © 2008 Bloombase, Inc. Acknowledgement We would like to thank the following individuals for their contribution (in terms of consultancy and facilities management) to the testing process and technical report : Lamson Chan, NEC IT Platform Infrastructure Kevin Cheung, NEC IT Platform Infrastructure
  • 51. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P51 © 2008 Bloombase, Inc. Disclaimer The tests described in this paper were conducted in the Bloombase InteropLab. Bloombase has not tested this configuration with all the combinations of hardware and software options available. There may be significant differences in your configuration that will change the procedures necessary to accomplish the objectives outlined in this paper. If you find that any of these procedures do not work in your environment, please contact us immediately.
  • 52. Encryption of Oracle Databases by Bloombase StoreSafe on NEC Express5800/ft Series Fault-Tolerant Server Application Notes P52 © 2008 Bloombase, Inc. Technical Reference 1. NEC Express5800/ft Fault-Tolerant, http://www.nec.com/global/prod/express/library/brochure/ft_E08FT2.pdf 2. Oracle Storage Program Change Notice, http://www.oracle.com/technology/deploy/availability/htdocs/oscp.html 3. Oracle Database Protection by Spitfire StoreSafe, http://www.bloombase.com/download/index.jsp?Url=/products/spitfire/storesafe/OracleDatabaseProtectionBy SpitfireStoreSafe.pdf 4. Bloombase Spitfire StoreSafe Compatibility Matrix for NAS, http://www.bloombase.com/content/8396639C9Q8dke046yZ3i7Yvfa6iaCNvwpZ81x