SlideShare a Scribd company logo
1
How to protect your sensitive data using Oracle Database Vault / Creating and Testing Realms
Part II
Any measures that should be taken for data security purposes should also beconsidered atthe databaselevel,
similar to hardware,network and operation system levels. Generally,companies buy a firewall productand think
that they have already solved the problems related to security. Researches show that despite it is possibleto take
measures againstexternal attacks by the firewall products,no sufficientmeasures may be taken againstinternal
attacks.In particular,no action related to protection of the data is executed on the server where the database
operates. Taking into account that a user havingDBA authority will haveall typeauthority atthe databaseand may
perform the same operations even when s/he gets connected from other computers, possiblesecurity gaps should
be considered.Access of a databaseadmin to every data is as disadvantageous as him/her to connect from other
computers and perform the same operations,and is even a security gap. OracleDatabaseVault,which is one of
the security solutions of OracleDatabase,may be recommended as an application which may assistin solvingof
the abovementioned problems.
With the increased sophistication of attacks on data, the need to put more operational controls on the databaseis
greater than ever. Given the fact that most customers have a small number of DBAs to manage their databases,it
is very importantto keep databasesecurity related tasks separatein their own dedicated databaseaccounts.
Creating dedicated databaseaccounts to manage databasesecurity helps customers prevent privileged DBA
accounts from accessingapplication data,restricts ad hoc databasechanges,and enforces controls over how,
when and where application data can beaccessed.OracleDatabaseVaultprovides security benefits to customers
even when they have a singleDBA by:
 Preventing hackers from usingprivileged users’accounts to steal application data
 Protecting databasestructures from unauthorized and/or harmful changes
 Enforcingcontrols over how, when and where application data can beaccessed
 Securingexistingdatabaseenvironments transparently and without any application changes
Among the more common auditfindings areunauthorized changes to databaseentitlements, includinggrants of
the DBA role, as well as new accounts and databaseobjects.Preventing unauthorized changes to production
environments is importantnot only for security,but also for complianceas such changes can weaken security and
open doors to hackers,violatingprivacy and complianceregulations.OracleDatabaseVaultSQL Command
Controls allow customers to control operations insidethedatabase,includingcommands such as createtable,
truncate table, and create user. Various out-of-the-box factors such as IP address,authentication method, and
program name help implement multi-factor authorization to deter attacks leveragingstolen passwords.These
controls prevent accidental configuration changes and also preventhackers and malicious insiders fromtampering
with applications.TheDuty Separation feature of OracleDatabaseVaultwill createthree different responsibilities
such as the security administration on the database,the accountmanagement and the databaseadministration.
The Security Administrator (Security Administration),the responsibleperson for Security is also themanager of the
OracleDatabaseVault.S/he is responsiblefor all security operations atthe database.S/he may manage Realms,
command rules and factors and may operate DatabaseVault report, while s/he may not get access to the
application data.
The Account Manager (Account Management) may create, delete and change user accounts.
And the DatabaseAdministrator (DatabaseAdministration) hasdba functions such as backup/restoration,patch
application and performancemanagement.
2
Oraclecustomers today still havehundreds and even thousands of databases distributed throughout the
enterprise and around the world.However, databaseconsolidation will continueas a cost-savingstrategy in the
coming years.The physical security provided by the distributed databasearchitecturemust be availablein the
consolidated environment. OracleDatabaseVaultaddresses the primary security concerns of database
consolidation.
First,it's importantto understand the basic architectureof the application you wish to protect. For example, are
the objects associated with the application spread acrossmultipledatabaseschemas or arethey contained in a
singledatabaseschema? This analysisshould includeall objects related to application data includingtables,views,
materialized views,and stored procedures.Identify the programs,processes,middle tier connections,database
users,and application administratorsthatinteractwith the application objects.Oncethis information is obtained,
the OracleDatabaseRealmdefinitions can becreated and you can authorize who should be ableto access
application data.Application end users typically accessapplication data through the middle tier. Some legacy
applicationsmay still usethe clientserver architecturewhere end users havetheir own accountin the database.
More sophisticated applicationsmay have application specific processes thatrun on the server hostingthe Oracle
Database.
Along this review document, we used the databaseVault Administrator (DVA) consoleto administrateOracle
DatabaseVault. UsingDVA, we created an HR Data Realm to protect human resources data. In order to set up this
realmwith DVA we should firstly click Realms,then click Create, and then namingand defining the realmHR Data
Realm.
3
Duringthe setup procedure, one of the main objective was to ensure that the users with the high privileges was
not ableto access HR data but could still administer the databasecontainingthe HR Data Realm. . Once the realm
was named and enabled, we selected Audit on failurein order to send a notification if rules areviolated.These are
referred to as Realm Secured Objects. For each object in realmowner, object type and name need to be specified.
In this case,we used the wildcard (%) option to identify all objects owned by the HR user.
In this point of setup procedure, the next step was to determine controls of privileged user,such as System, when
the user accesses objects in the realm.In this case, the goal is whenever System user or other privileged user
attempt to query HR object resultin message should be likeSystem had insufficientprivileges or this object.
Similarly,SYSTEM could not be ableto create objects in the HR Data Realm, and Oracle DatabaseVaultreturned a
violation notification.
We also run queries as the HR user to define what owner of the object could do when a Secured Realm existed for
the object they owned. And also we ensure that no specific privileges had been granted within OracleDatabase
4
Vault to HR atthis point. By default, the owner of the object could only be apply Data Manipulation language
(DML) queries. Data Definition Language (DDL) could not be issued atthis point.
Some employees will need authorization to modify the databaseas businessneeds dictate. After runningthe test
above, the user,HR, was added to HR Data Realm usingrealmauthorizations.
Once authorized, this user could issueany statement chosen, includingDDL and DML statements.
Thus privileged databaseaccounts areone of the most commonly used pathways for gainingaccess to sensitive
applicationsdata in the database.Whiletheir broad and unrestricted access facilitates databasemaintenance,the
same access also creates a pointof attack for gainingaccess to largeamounts of data.OracleDatabaseVault
Realms around application schemas,sensitivetables and stored procedures providecontrols to prevent privileged
accounts from being exploited by hackers and insiders to access sensiti veapplication data.
Source : Oracle® Database Vault Administrator's Guide 11gRelease 2 (11.2)
https://docs.oracle.com/cd/B28359_01/server.111/b31222/dvintro.htm#DVADM001
Ad

Recommended

Oracle GoldenGate
Oracle GoldenGate
Anar Godjaev
 
how to protect your sensitive data using oracle database vault
how to protect your sensitive data using oracle database vault
Anar Godjaev
 
Real-Time Query for Data Guard
Real-Time Query for Data Guard
Uwe Hesse
 
Dataguard physical stand by setup
Dataguard physical stand by setup
smajeed1
 
High Availability And Oracle Data Guard 11g R2
High Availability And Oracle Data Guard 11g R2
Mario Redón Luz
 
Data guard oracle
Data guard oracle
Antony James Vijay
 
Data Guard25 August
Data Guard25 August
Guenadi JILEVSKI
 
Oracle data guard configuration in 12c
Oracle data guard configuration in 12c
uzzal basak
 
Nabil Nawaz Oracle Oracle 12c Data Guard Deep Dive Presentation
Nabil Nawaz Oracle Oracle 12c Data Guard Deep Dive Presentation
Nabil Nawaz
 
Data guard architecture
Data guard architecture
Vimlendu Kumar
 
Oracle Data Guard
Oracle Data Guard
Martin Meyer
 
Cloug Troubleshooting Oracle 11g Rac 101 Tips And Tricks
Cloug Troubleshooting Oracle 11g Rac 101 Tips And Tricks
Scott Jenner
 
Dataguard presentation
Dataguard presentation
Vimlendu Kumar
 
153 Oracle dba interview questions
153 Oracle dba interview questions
Sandeep Sharma IIMK Smart City,IoT,Bigdata,Cloud,BI,DW
 
Oracle Data Guard Broker Webinar
Oracle Data Guard Broker Webinar
Zohar Elkayam
 
Data Guard Deep Dive UKOUG 2012
Data Guard Deep Dive UKOUG 2012
Emre Baransel
 
Active / Active configurations with Oracle Active Data Guard
Active / Active configurations with Oracle Active Data Guard
Aris Prassinos
 
Rac questions
Rac questions
parvezsigan
 
Exadata Smart Scan - What is so smart about it?
Exadata Smart Scan - What is so smart about it?
Uwe Hesse
 
Oracle12c data guard farsync and whats new
Oracle12c data guard farsync and whats new
Nassyam Basha
 
Database security best_practices
Database security best_practices
Tarik Essawi
 
Oracle Active Data Guard 12c: Far Sync Instance, Real-Time Cascade and Other ...
Oracle Active Data Guard 12c: Far Sync Instance, Real-Time Cascade and Other ...
Ludovico Caldara
 
Postgre sql best_practices
Postgre sql best_practices
Emiliano Fusaglia
 
Analyzing awr report
Analyzing awr report
satish Gaddipati
 
Oracle Active Data Guard 12cR2. Is it the best option?
Oracle Active Data Guard 12cR2. Is it the best option?
Ludovico Caldara
 
RAC - The Savior of DBA
RAC - The Savior of DBA
Nikhil Kumar
 
Dba 3+ exp qus
Dba 3+ exp qus
krreddy21
 
Doag data replication with oracle golden gate: Looking behind the scenes
Doag data replication with oracle golden gate: Looking behind the scenes
Trivadis
 
Wait Interface
Wait Interface
Anar Godjaev
 
Tuning SGA
Tuning SGA
Anar Godjaev
 

More Related Content

What's hot (20)

Nabil Nawaz Oracle Oracle 12c Data Guard Deep Dive Presentation
Nabil Nawaz Oracle Oracle 12c Data Guard Deep Dive Presentation
Nabil Nawaz
 
Data guard architecture
Data guard architecture
Vimlendu Kumar
 
Oracle Data Guard
Oracle Data Guard
Martin Meyer
 
Cloug Troubleshooting Oracle 11g Rac 101 Tips And Tricks
Cloug Troubleshooting Oracle 11g Rac 101 Tips And Tricks
Scott Jenner
 
Dataguard presentation
Dataguard presentation
Vimlendu Kumar
 
153 Oracle dba interview questions
153 Oracle dba interview questions
Sandeep Sharma IIMK Smart City,IoT,Bigdata,Cloud,BI,DW
 
Oracle Data Guard Broker Webinar
Oracle Data Guard Broker Webinar
Zohar Elkayam
 
Data Guard Deep Dive UKOUG 2012
Data Guard Deep Dive UKOUG 2012
Emre Baransel
 
Active / Active configurations with Oracle Active Data Guard
Active / Active configurations with Oracle Active Data Guard
Aris Prassinos
 
Rac questions
Rac questions
parvezsigan
 
Exadata Smart Scan - What is so smart about it?
Exadata Smart Scan - What is so smart about it?
Uwe Hesse
 
Oracle12c data guard farsync and whats new
Oracle12c data guard farsync and whats new
Nassyam Basha
 
Database security best_practices
Database security best_practices
Tarik Essawi
 
Oracle Active Data Guard 12c: Far Sync Instance, Real-Time Cascade and Other ...
Oracle Active Data Guard 12c: Far Sync Instance, Real-Time Cascade and Other ...
Ludovico Caldara
 
Postgre sql best_practices
Postgre sql best_practices
Emiliano Fusaglia
 
Analyzing awr report
Analyzing awr report
satish Gaddipati
 
Oracle Active Data Guard 12cR2. Is it the best option?
Oracle Active Data Guard 12cR2. Is it the best option?
Ludovico Caldara
 
RAC - The Savior of DBA
RAC - The Savior of DBA
Nikhil Kumar
 
Dba 3+ exp qus
Dba 3+ exp qus
krreddy21
 
Doag data replication with oracle golden gate: Looking behind the scenes
Doag data replication with oracle golden gate: Looking behind the scenes
Trivadis
 
Nabil Nawaz Oracle Oracle 12c Data Guard Deep Dive Presentation
Nabil Nawaz Oracle Oracle 12c Data Guard Deep Dive Presentation
Nabil Nawaz
 
Data guard architecture
Data guard architecture
Vimlendu Kumar
 
Cloug Troubleshooting Oracle 11g Rac 101 Tips And Tricks
Cloug Troubleshooting Oracle 11g Rac 101 Tips And Tricks
Scott Jenner
 
Dataguard presentation
Dataguard presentation
Vimlendu Kumar
 
Oracle Data Guard Broker Webinar
Oracle Data Guard Broker Webinar
Zohar Elkayam
 
Data Guard Deep Dive UKOUG 2012
Data Guard Deep Dive UKOUG 2012
Emre Baransel
 
Active / Active configurations with Oracle Active Data Guard
Active / Active configurations with Oracle Active Data Guard
Aris Prassinos
 
Exadata Smart Scan - What is so smart about it?
Exadata Smart Scan - What is so smart about it?
Uwe Hesse
 
Oracle12c data guard farsync and whats new
Oracle12c data guard farsync and whats new
Nassyam Basha
 
Database security best_practices
Database security best_practices
Tarik Essawi
 
Oracle Active Data Guard 12c: Far Sync Instance, Real-Time Cascade and Other ...
Oracle Active Data Guard 12c: Far Sync Instance, Real-Time Cascade and Other ...
Ludovico Caldara
 
Oracle Active Data Guard 12cR2. Is it the best option?
Oracle Active Data Guard 12cR2. Is it the best option?
Ludovico Caldara
 
RAC - The Savior of DBA
RAC - The Savior of DBA
Nikhil Kumar
 
Dba 3+ exp qus
Dba 3+ exp qus
krreddy21
 
Doag data replication with oracle golden gate: Looking behind the scenes
Doag data replication with oracle golden gate: Looking behind the scenes
Trivadis
 

Viewers also liked (10)

Wait Interface
Wait Interface
Anar Godjaev
 
Tuning SGA
Tuning SGA
Anar Godjaev
 
Oracle Golden Gate
Oracle Golden Gate
Anar Godjaev
 
Table Partitions
Table Partitions
Anar Godjaev
 
Asm disk group migration from
Asm disk group migration from
Anar Godjaev
 
Conditional Control
Conditional Control
Anar Godjaev
 
Backup and Recovery
Backup and Recovery
Anar Godjaev
 
Database Vault / Verinin Güvenliği
Database Vault / Verinin Güvenliği
Anar Godjaev
 
Audit Mekani̇zmasi
Audit Mekani̇zmasi
Anar Godjaev
 
Backup and Recovery Procedure
Backup and Recovery Procedure
Anar Godjaev
 
Oracle Golden Gate
Oracle Golden Gate
Anar Godjaev
 
Asm disk group migration from
Asm disk group migration from
Anar Godjaev
 
Conditional Control
Conditional Control
Anar Godjaev
 
Backup and Recovery
Backup and Recovery
Anar Godjaev
 
Database Vault / Verinin Güvenliği
Database Vault / Verinin Güvenliği
Anar Godjaev
 
Audit Mekani̇zmasi
Audit Mekani̇zmasi
Anar Godjaev
 
Backup and Recovery Procedure
Backup and Recovery Procedure
Anar Godjaev
 
Ad

Similar to How to protect your sensitive data using oracle database vault / Creating and Testing realms part 2 (20)

DOAG Oracle Database Vault
DOAG Oracle Database Vault
Stefan Oehrli
 
Vault_KT.pptx
Vault_KT.pptx
SDPL Technologies
 
Security Inside Out: Latest Innovations in Oracle Database 12c
Security Inside Out: Latest Innovations in Oracle Database 12c
Troy Kitch
 
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Edgar Alejandro Villegas
 
Securing data in Oracle Database 12c - 2015
Securing data in Oracle Database 12c - 2015
Connor McDonald
 
Security In Oracle Database V19c
Security In Oracle Database V19c
alixa13
 
Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...
Kal BO
 
Oracle Database Vault
Oracle Database Vault
Marco Alamanni
 
Oracle Database Security
Oracle Database Security
Troy Kitch
 
Oracle database 12c security and compliance
Oracle database 12c security and compliance
FITSFSd
 
Oracle 11g security - 2014
Oracle 11g security - 2014
Connor McDonald
 
Presentation database security audit vault & database firewall
Presentation database security audit vault & database firewall
xKinAnx
 
ppt-security-dbsat-222-overview-nodemo.pdf
ppt-security-dbsat-222-overview-nodemo.pdf
camyla81
 
Database Private Security Jurisprudence: A Case Study using Oracle
Database Private Security Jurisprudence: A Case Study using Oracle
IJDMS
 
Security of the database
Security of the database
Pratik Tamgadge
 
Odv oracle customer_demo
Odv oracle customer_demo
Viaggio Italia
 
Autonomous Database Security Features
Autonomous Database Security Features
SinanPetrusToma
 
Oracle Security Presentation
Oracle Security Presentation
Francisco Alvarez
 
DATABASE PRIVATE SECURITY JURISPRUDENCE: A CASE STUDY USING ORACLE
DATABASE PRIVATE SECURITY JURISPRUDENCE: A CASE STUDY USING ORACLE
IJDMS
 
Database Security
Database Security
ShingalaKrupa
 
DOAG Oracle Database Vault
DOAG Oracle Database Vault
Stefan Oehrli
 
Security Inside Out: Latest Innovations in Oracle Database 12c
Security Inside Out: Latest Innovations in Oracle Database 12c
Troy Kitch
 
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Edgar Alejandro Villegas
 
Securing data in Oracle Database 12c - 2015
Securing data in Oracle Database 12c - 2015
Connor McDonald
 
Security In Oracle Database V19c
Security In Oracle Database V19c
alixa13
 
Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...
Kal BO
 
Oracle Database Security
Oracle Database Security
Troy Kitch
 
Oracle database 12c security and compliance
Oracle database 12c security and compliance
FITSFSd
 
Oracle 11g security - 2014
Oracle 11g security - 2014
Connor McDonald
 
Presentation database security audit vault & database firewall
Presentation database security audit vault & database firewall
xKinAnx
 
ppt-security-dbsat-222-overview-nodemo.pdf
ppt-security-dbsat-222-overview-nodemo.pdf
camyla81
 
Database Private Security Jurisprudence: A Case Study using Oracle
Database Private Security Jurisprudence: A Case Study using Oracle
IJDMS
 
Security of the database
Security of the database
Pratik Tamgadge
 
Odv oracle customer_demo
Odv oracle customer_demo
Viaggio Italia
 
Autonomous Database Security Features
Autonomous Database Security Features
SinanPetrusToma
 
Oracle Security Presentation
Oracle Security Presentation
Francisco Alvarez
 
DATABASE PRIVATE SECURITY JURISPRUDENCE: A CASE STUDY USING ORACLE
DATABASE PRIVATE SECURITY JURISPRUDENCE: A CASE STUDY USING ORACLE
IJDMS
 
Ad

More from Anar Godjaev (19)

Oracle 10g Database Server Kurulum
Oracle 10g Database Server Kurulum
Anar Godjaev
 
DataPump ile Single Parititon Export
DataPump ile Single Parititon Export
Anar Godjaev
 
Redologlar ve Yöneti̇mi̇
Redologlar ve Yöneti̇mi̇
Anar Godjaev
 
Contraints
Contraints
Anar Godjaev
 
Oracle SQL
Oracle SQL
Anar Godjaev
 
Veri̇tabani ve Kullanici Yöneti̇mi̇
Veri̇tabani ve Kullanici Yöneti̇mi̇
Anar Godjaev
 
Instance ve Media Bozukluklarını Inceleme
Instance ve Media Bozukluklarını Inceleme
Anar Godjaev
 
PL/SQL Blocks
PL/SQL Blocks
Anar Godjaev
 
Parallel Server
Parallel Server
Anar Godjaev
 
Memory Management
Memory Management
Anar Godjaev
 
LogMiner
LogMiner
Anar Godjaev
 
Undo Management
Undo Management
Anar Godjaev
 
ASM
ASM
Anar Godjaev
 
Oracle Managed Files
Oracle Managed Files
Anar Godjaev
 
Recovery Manager (RMAN)
Recovery Manager (RMAN)
Anar Godjaev
 
Oracle Enterprise Linux 5
Oracle Enterprise Linux 5
Anar Godjaev
 
Oracle Database 11g R2 Installation
Oracle Database 11g R2 Installation
Anar Godjaev
 
Change DB Name
Change DB Name
Anar Godjaev
 
Oracle Tablespace Yonetimi
Oracle Tablespace Yonetimi
Anar Godjaev
 
Oracle 10g Database Server Kurulum
Oracle 10g Database Server Kurulum
Anar Godjaev
 
DataPump ile Single Parititon Export
DataPump ile Single Parititon Export
Anar Godjaev
 
Redologlar ve Yöneti̇mi̇
Redologlar ve Yöneti̇mi̇
Anar Godjaev
 
Veri̇tabani ve Kullanici Yöneti̇mi̇
Veri̇tabani ve Kullanici Yöneti̇mi̇
Anar Godjaev
 
Instance ve Media Bozukluklarını Inceleme
Instance ve Media Bozukluklarını Inceleme
Anar Godjaev
 
Oracle Managed Files
Oracle Managed Files
Anar Godjaev
 
Recovery Manager (RMAN)
Recovery Manager (RMAN)
Anar Godjaev
 
Oracle Enterprise Linux 5
Oracle Enterprise Linux 5
Anar Godjaev
 
Oracle Database 11g R2 Installation
Oracle Database 11g R2 Installation
Anar Godjaev
 
Oracle Tablespace Yonetimi
Oracle Tablespace Yonetimi
Anar Godjaev
 

Recently uploaded (20)

ENGLISH-5 Q1 Lesson 1.pptx - Story Elements
ENGLISH-5 Q1 Lesson 1.pptx - Story Elements
Mayvel Nadal
 
Gladiolous Cultivation practices by AKL.pdf
Gladiolous Cultivation practices by AKL.pdf
kushallamichhame
 
ECONOMICS, DISASTER MANAGEMENT, ROAD SAFETY - STUDY MATERIAL [10TH]
ECONOMICS, DISASTER MANAGEMENT, ROAD SAFETY - STUDY MATERIAL [10TH]
SHERAZ AHMAD LONE
 
INDUCTIVE EFFECT slide for first prof pharamacy students
INDUCTIVE EFFECT slide for first prof pharamacy students
SHABNAM FAIZ
 
English 3 Quarter 1_LEwithLAS_Week 1.pdf
English 3 Quarter 1_LEwithLAS_Week 1.pdf
DeAsisAlyanajaneH
 
Paper 106 | Ambition and Corruption: A Comparative Analysis of ‘The Great Gat...
Paper 106 | Ambition and Corruption: A Comparative Analysis of ‘The Great Gat...
Rajdeep Bavaliya
 
Q1_ENGLISH_PPT_WEEK 1 power point grade 3 Quarter 1 week 1
Q1_ENGLISH_PPT_WEEK 1 power point grade 3 Quarter 1 week 1
jutaydeonne
 
This is why students from these 44 institutions have not received National Se...
This is why students from these 44 institutions have not received National Se...
Kweku Zurek
 
ENGLISH_Q1_W1 PowerPoint grade 3 quarter 1 week 1
ENGLISH_Q1_W1 PowerPoint grade 3 quarter 1 week 1
jutaydeonne
 
IIT KGP Quiz Week 2024 Sports Quiz (Prelims + Finals)
IIT KGP Quiz Week 2024 Sports Quiz (Prelims + Finals)
IIT Kharagpur Quiz Club
 
CRYPTO TRADING COURSE BY FINANCEWORLD.IO
CRYPTO TRADING COURSE BY FINANCEWORLD.IO
AndrewBorisenko3
 
Tanja Vujicic - PISA for Schools contact Info
Tanja Vujicic - PISA for Schools contact Info
EduSkills OECD
 
2025 June Year 9 Presentation: Subject selection.pptx
2025 June Year 9 Presentation: Subject selection.pptx
mansk2
 
Photo chemistry Power Point Presentation
Photo chemistry Power Point Presentation
mprpgcwa2024
 
LDMMIA Shop & Student News Summer Solstice 25
LDMMIA Shop & Student News Summer Solstice 25
LDM & Mia eStudios
 
Public Health For The 21st Century 1st Edition Judy Orme Jane Powell
Public Health For The 21st Century 1st Edition Judy Orme Jane Powell
trjnesjnqg7801
 
F-BLOCK ELEMENTS POWER POINT PRESENTATIONS
F-BLOCK ELEMENTS POWER POINT PRESENTATIONS
mprpgcwa2024
 
VCE Literature Section A Exam Response Guide
VCE Literature Section A Exam Response Guide
jpinnuck
 
Values Education 10 Quarter 1 Module .pptx
Values Education 10 Quarter 1 Module .pptx
JBPafin
 
THE PSYCHOANALYTIC OF THE BLACK CAT BY EDGAR ALLAN POE (1).pdf
THE PSYCHOANALYTIC OF THE BLACK CAT BY EDGAR ALLAN POE (1).pdf
nabilahk908
 
ENGLISH-5 Q1 Lesson 1.pptx - Story Elements
ENGLISH-5 Q1 Lesson 1.pptx - Story Elements
Mayvel Nadal
 
Gladiolous Cultivation practices by AKL.pdf
Gladiolous Cultivation practices by AKL.pdf
kushallamichhame
 
ECONOMICS, DISASTER MANAGEMENT, ROAD SAFETY - STUDY MATERIAL [10TH]
ECONOMICS, DISASTER MANAGEMENT, ROAD SAFETY - STUDY MATERIAL [10TH]
SHERAZ AHMAD LONE
 
INDUCTIVE EFFECT slide for first prof pharamacy students
INDUCTIVE EFFECT slide for first prof pharamacy students
SHABNAM FAIZ
 
English 3 Quarter 1_LEwithLAS_Week 1.pdf
English 3 Quarter 1_LEwithLAS_Week 1.pdf
DeAsisAlyanajaneH
 
Paper 106 | Ambition and Corruption: A Comparative Analysis of ‘The Great Gat...
Paper 106 | Ambition and Corruption: A Comparative Analysis of ‘The Great Gat...
Rajdeep Bavaliya
 
Q1_ENGLISH_PPT_WEEK 1 power point grade 3 Quarter 1 week 1
Q1_ENGLISH_PPT_WEEK 1 power point grade 3 Quarter 1 week 1
jutaydeonne
 
This is why students from these 44 institutions have not received National Se...
This is why students from these 44 institutions have not received National Se...
Kweku Zurek
 
ENGLISH_Q1_W1 PowerPoint grade 3 quarter 1 week 1
ENGLISH_Q1_W1 PowerPoint grade 3 quarter 1 week 1
jutaydeonne
 
IIT KGP Quiz Week 2024 Sports Quiz (Prelims + Finals)
IIT KGP Quiz Week 2024 Sports Quiz (Prelims + Finals)
IIT Kharagpur Quiz Club
 
CRYPTO TRADING COURSE BY FINANCEWORLD.IO
CRYPTO TRADING COURSE BY FINANCEWORLD.IO
AndrewBorisenko3
 
Tanja Vujicic - PISA for Schools contact Info
Tanja Vujicic - PISA for Schools contact Info
EduSkills OECD
 
2025 June Year 9 Presentation: Subject selection.pptx
2025 June Year 9 Presentation: Subject selection.pptx
mansk2
 
Photo chemistry Power Point Presentation
Photo chemistry Power Point Presentation
mprpgcwa2024
 
LDMMIA Shop & Student News Summer Solstice 25
LDMMIA Shop & Student News Summer Solstice 25
LDM & Mia eStudios
 
Public Health For The 21st Century 1st Edition Judy Orme Jane Powell
Public Health For The 21st Century 1st Edition Judy Orme Jane Powell
trjnesjnqg7801
 
F-BLOCK ELEMENTS POWER POINT PRESENTATIONS
F-BLOCK ELEMENTS POWER POINT PRESENTATIONS
mprpgcwa2024
 
VCE Literature Section A Exam Response Guide
VCE Literature Section A Exam Response Guide
jpinnuck
 
Values Education 10 Quarter 1 Module .pptx
Values Education 10 Quarter 1 Module .pptx
JBPafin
 
THE PSYCHOANALYTIC OF THE BLACK CAT BY EDGAR ALLAN POE (1).pdf
THE PSYCHOANALYTIC OF THE BLACK CAT BY EDGAR ALLAN POE (1).pdf
nabilahk908
 

How to protect your sensitive data using oracle database vault / Creating and Testing realms part 2

  • 1. 1 How to protect your sensitive data using Oracle Database Vault / Creating and Testing Realms Part II Any measures that should be taken for data security purposes should also beconsidered atthe databaselevel, similar to hardware,network and operation system levels. Generally,companies buy a firewall productand think that they have already solved the problems related to security. Researches show that despite it is possibleto take measures againstexternal attacks by the firewall products,no sufficientmeasures may be taken againstinternal attacks.In particular,no action related to protection of the data is executed on the server where the database operates. Taking into account that a user havingDBA authority will haveall typeauthority atthe databaseand may perform the same operations even when s/he gets connected from other computers, possiblesecurity gaps should be considered.Access of a databaseadmin to every data is as disadvantageous as him/her to connect from other computers and perform the same operations,and is even a security gap. OracleDatabaseVault,which is one of the security solutions of OracleDatabase,may be recommended as an application which may assistin solvingof the abovementioned problems. With the increased sophistication of attacks on data, the need to put more operational controls on the databaseis greater than ever. Given the fact that most customers have a small number of DBAs to manage their databases,it is very importantto keep databasesecurity related tasks separatein their own dedicated databaseaccounts. Creating dedicated databaseaccounts to manage databasesecurity helps customers prevent privileged DBA accounts from accessingapplication data,restricts ad hoc databasechanges,and enforces controls over how, when and where application data can beaccessed.OracleDatabaseVaultprovides security benefits to customers even when they have a singleDBA by:  Preventing hackers from usingprivileged users’accounts to steal application data  Protecting databasestructures from unauthorized and/or harmful changes  Enforcingcontrols over how, when and where application data can beaccessed  Securingexistingdatabaseenvironments transparently and without any application changes Among the more common auditfindings areunauthorized changes to databaseentitlements, includinggrants of the DBA role, as well as new accounts and databaseobjects.Preventing unauthorized changes to production environments is importantnot only for security,but also for complianceas such changes can weaken security and open doors to hackers,violatingprivacy and complianceregulations.OracleDatabaseVaultSQL Command Controls allow customers to control operations insidethedatabase,includingcommands such as createtable, truncate table, and create user. Various out-of-the-box factors such as IP address,authentication method, and program name help implement multi-factor authorization to deter attacks leveragingstolen passwords.These controls prevent accidental configuration changes and also preventhackers and malicious insiders fromtampering with applications.TheDuty Separation feature of OracleDatabaseVaultwill createthree different responsibilities such as the security administration on the database,the accountmanagement and the databaseadministration. The Security Administrator (Security Administration),the responsibleperson for Security is also themanager of the OracleDatabaseVault.S/he is responsiblefor all security operations atthe database.S/he may manage Realms, command rules and factors and may operate DatabaseVault report, while s/he may not get access to the application data. The Account Manager (Account Management) may create, delete and change user accounts. And the DatabaseAdministrator (DatabaseAdministration) hasdba functions such as backup/restoration,patch application and performancemanagement.
  • 2. 2 Oraclecustomers today still havehundreds and even thousands of databases distributed throughout the enterprise and around the world.However, databaseconsolidation will continueas a cost-savingstrategy in the coming years.The physical security provided by the distributed databasearchitecturemust be availablein the consolidated environment. OracleDatabaseVaultaddresses the primary security concerns of database consolidation. First,it's importantto understand the basic architectureof the application you wish to protect. For example, are the objects associated with the application spread acrossmultipledatabaseschemas or arethey contained in a singledatabaseschema? This analysisshould includeall objects related to application data includingtables,views, materialized views,and stored procedures.Identify the programs,processes,middle tier connections,database users,and application administratorsthatinteractwith the application objects.Oncethis information is obtained, the OracleDatabaseRealmdefinitions can becreated and you can authorize who should be ableto access application data.Application end users typically accessapplication data through the middle tier. Some legacy applicationsmay still usethe clientserver architecturewhere end users havetheir own accountin the database. More sophisticated applicationsmay have application specific processes thatrun on the server hostingthe Oracle Database. Along this review document, we used the databaseVault Administrator (DVA) consoleto administrateOracle DatabaseVault. UsingDVA, we created an HR Data Realm to protect human resources data. In order to set up this realmwith DVA we should firstly click Realms,then click Create, and then namingand defining the realmHR Data Realm.
  • 3. 3 Duringthe setup procedure, one of the main objective was to ensure that the users with the high privileges was not ableto access HR data but could still administer the databasecontainingthe HR Data Realm. . Once the realm was named and enabled, we selected Audit on failurein order to send a notification if rules areviolated.These are referred to as Realm Secured Objects. For each object in realmowner, object type and name need to be specified. In this case,we used the wildcard (%) option to identify all objects owned by the HR user. In this point of setup procedure, the next step was to determine controls of privileged user,such as System, when the user accesses objects in the realm.In this case, the goal is whenever System user or other privileged user attempt to query HR object resultin message should be likeSystem had insufficientprivileges or this object. Similarly,SYSTEM could not be ableto create objects in the HR Data Realm, and Oracle DatabaseVaultreturned a violation notification. We also run queries as the HR user to define what owner of the object could do when a Secured Realm existed for the object they owned. And also we ensure that no specific privileges had been granted within OracleDatabase
  • 4. 4 Vault to HR atthis point. By default, the owner of the object could only be apply Data Manipulation language (DML) queries. Data Definition Language (DDL) could not be issued atthis point. Some employees will need authorization to modify the databaseas businessneeds dictate. After runningthe test above, the user,HR, was added to HR Data Realm usingrealmauthorizations. Once authorized, this user could issueany statement chosen, includingDDL and DML statements. Thus privileged databaseaccounts areone of the most commonly used pathways for gainingaccess to sensitive applicationsdata in the database.Whiletheir broad and unrestricted access facilitates databasemaintenance,the same access also creates a pointof attack for gainingaccess to largeamounts of data.OracleDatabaseVault Realms around application schemas,sensitivetables and stored procedures providecontrols to prevent privileged accounts from being exploited by hackers and insiders to access sensiti veapplication data. Source : Oracle® Database Vault Administrator's Guide 11gRelease 2 (11.2) https://docs.oracle.com/cd/B28359_01/server.111/b31222/dvintro.htm#DVADM001