SlideShare a Scribd company logo
All About Oracle Database Security
Thomas Kyte
http://asktom.oracle.com/
3 Copyright © 2010, Oracle. All rights reserved
Data security remains the top priority for enterprise IT security shops
with 89% of enterprises citing it as a critical or high priority. Enterprises
are also continuing to focus on cutting costs and increasing efficiency.
Top Priority for IT Security?
Source: Forrester - The State Of Enterprise IT Security And Emerging Trends: 2009 To 2010
4 Copyright © 2010, Oracle. All rights reserved
More data than ever…
Source: IDC, 2008
1,800 Exabytes
Growth
Doubles
Yearly
2006 2011
Two Thirds of Sensitive and
Regulated Data Resides in
Databases…
5 Copyright © 2010, Oracle. All rights reserved
More breaches then ever…
Once exposed, the data is out there – the bell can’t be un-rung
PUBLICLY REPORTED DATA BREACHES
Total Personally
Identifying Information
Records Exposed
(Millions)
Source: DataLossDB
0
100
200
300
400
500
600
2005 2006 2007 2008 2009
Remediation Cost Exceeds $300/record
6 Copyright © 2010, Oracle. All rights reserved
More threats than ever…
Insider Fraud Is Involved in 60% of Data Breaches
Source: Wall Street & Technology
© 2010 Oracle Corporation 7
• Database Vault
• Label Security
• Identity
Management
• Advanced Security
• Secure Backup
• Data Masking
Database Security Defense In Depth
Oracle Database Security Solutions
• Audit Vault
• Total Recall
• Configuration
Management
Encryption
& Masking
Access
Control
Auditing
• Database Firewall
Monitoring
& Blocking
• Monitor and block threats before they reach databases
• Track changes and audit database activity
• Control access to data within the database
• Prevent access by non database users
• Remove sensitive data from non production environments
© 2010 Oracle Corporation 8
Oracle Database Firewall
First Line of Defense
PoliciesBuilt-in
Reports
Alerts Custom
Reports
Applications
Block
Log
Allow
Alert
Substitute
• Monitor database activity to prevent unauthorized database access, SQL
injections, privilege or role escalation, illegal access to sensitive data, etc.
• Highly accurate SQL grammar based analysis without costly false positives
• Flexible SQL level enforcement options based on white lists and black lists
• Scalable architecture provides enterprise performance in all deployment modes
• Built-in and custom compliance reports for SOX, PCI, and other regulations
© 2010 Oracle Corporation 9
Oracle Configuration Management
Secure Your Database Environment
• Discover and classify databases into policy groups
• Scan databases against 400+ best practices and industry standards, custom
enterprise-specific configuration policies
• Detect and event prevent unauthorized database configuration changes
• Change management dashboards and compliance reports
Monitor
Configuration
Management
& Audit
Vulnerability
Management
Fix
Analysis &
Analytics
Prioritize
Policy
Management
AssessClassify MonitorDiscover
Asset
Management
© 2010 Oracle Corporation 10
Oracle Total Recall
Track Changes to Sensitive Data
select salary from emp AS OF TIMESTAMP
'02-MAY-09 12.00 AM‘ where emp.title = ‘admin’
• Transparently track application data changes over time
• Efficient, tamper-resistant storage of archives in the database
• Real-time access to historical application data using SQL
• Simplified incident forensics and recovery
© 2010 Oracle Corporation 11
Oracle Audit Vault
Audit Database Activity in Real-Time
• Consolidate database audit trail into secure centralized repository
• Detect and alert on suspicious activities, including privileged users
• Out-of-the box compliance reports for SOX, PCI, and other regulations
• E.g., privileged user audit, entitlements, failed logins, regulated data changes
• Streamline audits with report generation, notification, attestation, archiving, etc.
CRM Data
ERP Data
Databases
HR Data
Audit
Data
Policies
Built-in
Reports
Alerts
Custom
Reports
!
Auditor
© 2010 Oracle Corporation 12
Oracle Database Vault
Enforce Security Policies Inside the Database
• Automatic and customizable DBA separation of duties and protective realms
• Enforce who, where, when, and how using rules and factors
• Enforce least privilege for privileged database users
• Prevent application by-pass and enforce enterprise data governance
• Securely consolidate application data or enable multi-tenant data management
Procurement
HR
Finance
Application
DBA
select * from finance.customers
DBA
Security
DBA
Application
© 2010 Oracle Corporation 13
Disk
Backups
Exports
Off-Site
Facilities
Oracle Advanced Security
Protect Data from Unauthorized Users
• Complete encryption for application data at rest to prevent direct access to
data stored in database files, on tape, exports, etc. by IT Staff/OS users
• Efficient application data encryption without application changes
• Built-in two-tier key management for SoD with support for centralized key
management using HSM/KMS
• Strong authentication of database users for greater identity assurance
Application
© 2010 Oracle Corporation 14
Oracle Data Masking
Irreversibly De-Identify Data for Non-Production Use
• Make application data securely available in non-production environments
• Prevent application developers and testers from seeing production data
• Extensible template library and policies for data masking automation
• Referential integrity automatically preserved so applications continue to work
• Real Application Testing friendly
LAST_NAME SSN SALARY
ANSKEKSL 111—23-1111 60,000
BKJHHEIEDK 222-34-1345 40,000
LAST_NAME SSN SALARY
AGUILAR 203-33-3234 40,000
BENSON 323-22-2943 60,000
Production Non-Production
Data never leaves Database
© 2010 Oracle Corporation 15
Oracle Database Security Solutions
Defense-in-Depth for Maximum Security
Activity Monitoring
Database Firewall
Auditing and Reporting
DETECTIVE
Redaction and Masking
Multi-Factor
Authorization
Encryption
PREVENTIVE ADMINISTRATIVE
Data Discovery
and Classification
Vulnerability Scanning
Database Lifecycle
Management
© 2010 Oracle Corporation 16
• Database Vault
• Label Security
• Identity
Management
• Advanced Security
• Secure Backup
• Data Masking
Oracle Database Security Solutions
Complete Defense-in-Depth
• Audit Vault
• Total Recall
• Configuration
Management
Encryption
& Masking
Access
Control
Auditing
• Database Firewall
Monitoring
& Blocking
• Comprehensive – single vendor addresses all your requirements
• Transparent – no changes to existing applications or databases
• Easy to deploy – point and click interfaces deliver value within hours
• Cost Effective – integrated solutions reduce risk and lower TCO
• Proven – #1 Database with over 30 years of security innovation!
© 2010 Oracle Corporation 17
Oracle Database 12c
 Privilege Analysis
 Data Redaction
 Auditing
 Encryption Advancements
 Code Based Access Control
 Invokers Rights
 Separation of duties
18 Copyright © 2010, Oracle. All rights reserved
For More Information
oracle.com/database/security
search.oracle.com
or
database security
19 Copyright © 2010, Oracle. All rights reserved
Thomas.Kyte@oracle.com
20 Copyright © 2010, Oracle. All rights reserved

More Related Content

PDF
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
PPTX
Security Inside Out: Latest Innovations in Oracle Database 12c
PPTX
Oracle Database Security
PDF
Oracle database 12c 2 day + security guide
PDF
Oracle database 12c security and compliance
PPT
Auditing security of Oracle DB (Karel Miko)
PPTX
Introducing Oracle Audit Vault and Database Firewall
PDF
AV/DF Advanced Security Option
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Security Inside Out: Latest Innovations in Oracle Database 12c
Oracle Database Security
Oracle database 12c 2 day + security guide
Oracle database 12c security and compliance
Auditing security of Oracle DB (Karel Miko)
Introducing Oracle Audit Vault and Database Firewall
AV/DF Advanced Security Option

What's hot (20)

PPSX
Ppt dbsec-oow2013-avdf
PDF
Best Practices in Implementing Oracle Database Security Products
PDF
Wp security-data-safe
PDF
Oracle Sparc Cloud
PDF
2015 AUG 24-Oracle EBS
PPTX
Application Data Security | Seclore
PDF
Bloombase store safe mf solution brief 2018 r0.91
PPTX
Presentation1
PPTX
IRDAI Compliance & Data-Centric Security | Seclore
PDF
Oracle-Security_Executive-Presentation
PPTX
Cloud Data Security
PPTX
Securing Remote Workforce | Seclore
PPTX
GDPR Compliance & Data-Centric Security | Seclore
PPTX
Compliance regulations with Data Centric Security | Seclore
PPTX
Protecting the Healthcare Database
PDF
Azure Information Protection
PPTX
Insider Threat Protection | Seclore
PPTX
Inbound Data Protection
PPTX
[de Jager] Classify, Label and Protect your data with Azure Information Prote...
PPTX
Securing application data | Seclore
Ppt dbsec-oow2013-avdf
Best Practices in Implementing Oracle Database Security Products
Wp security-data-safe
Oracle Sparc Cloud
2015 AUG 24-Oracle EBS
Application Data Security | Seclore
Bloombase store safe mf solution brief 2018 r0.91
Presentation1
IRDAI Compliance & Data-Centric Security | Seclore
Oracle-Security_Executive-Presentation
Cloud Data Security
Securing Remote Workforce | Seclore
GDPR Compliance & Data-Centric Security | Seclore
Compliance regulations with Data Centric Security | Seclore
Protecting the Healthcare Database
Azure Information Protection
Insider Threat Protection | Seclore
Inbound Data Protection
[de Jager] Classify, Label and Protect your data with Azure Information Prote...
Securing application data | Seclore
Ad

Similar to Oracle 11g security - 2014 (20)

PPTX
Database Options
PDF
5. 2010 11-03 bucharest oracle-tech_day_security
PDF
Best Practices for implementing Database Security Comprehensive Database Secu...
PPTX
Varhol oracle database_firewall_oct2011
PPTX
Hadoop and Manufacturing
PPTX
Part 2: Cloudera’s Operational Database: Unlocking New Benefits in the Cloud
PDF
Customer migration to Azure SQL database, December 2019
PDF
3. (mjk) otd maa
PDF
Ppt security-database-overview-11g r2
PDF
A Logical Architecture is Always a Flexible Architecture (ASEAN)
PDF
Hortonworks Hybrid Cloud - Putting you back in control of your data
PPTX
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
PPTX
Securing data in Oracle Database 12c - 2015
PDF
Modern Data Management for Federal Modernization
PPTX
There are 250 Database products, are you running the right one?
PPTX
Webinar | Introducing DataStax Enterprise 4.6
PDF
ADV Slides: The Evolution of the Data Platform and What It Means to Enterpris...
PDF
Presentation database security audit vault & database firewall
PDF
Systems Advantage Forum : Autonomous DB e DBaaS
PPTX
Delivering Data Democratization in the Cloud with Snowflake
Database Options
5. 2010 11-03 bucharest oracle-tech_day_security
Best Practices for implementing Database Security Comprehensive Database Secu...
Varhol oracle database_firewall_oct2011
Hadoop and Manufacturing
Part 2: Cloudera’s Operational Database: Unlocking New Benefits in the Cloud
Customer migration to Azure SQL database, December 2019
3. (mjk) otd maa
Ppt security-database-overview-11g r2
A Logical Architecture is Always a Flexible Architecture (ASEAN)
Hortonworks Hybrid Cloud - Putting you back in control of your data
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
Securing data in Oracle Database 12c - 2015
Modern Data Management for Federal Modernization
There are 250 Database products, are you running the right one?
Webinar | Introducing DataStax Enterprise 4.6
ADV Slides: The Evolution of the Data Platform and What It Means to Enterpris...
Presentation database security audit vault & database firewall
Systems Advantage Forum : Autonomous DB e DBaaS
Delivering Data Democratization in the Cloud with Snowflake
Ad

More from Connor McDonald (20)

PDF
Flashback ITOUG
PDF
Sangam 19 - PLSQL still the coolest
PDF
Sangam 19 - Analytic SQL
PDF
UKOUG - 25 years of hints and tips
PDF
Sangam 19 - Successful Applications on Autonomous
PDF
Sangam 2019 - The Latest Features
PDF
UKOUG 2019 - SQL features
PDF
APEX tour 2019 - successful development with autonomous
PDF
APAC Groundbreakers 2019 - Perth/Melbourne
PDF
OOW19 - Flashback, not just for DBAs
PDF
OOW19 - Read consistency
PDF
OOW19 - Slower and less secure applications
PDF
OOW19 - Killing database sessions
PDF
OOW19 - Ten Amazing SQL features
PDF
Latin America Tour 2019 - 18c and 19c featues
PDF
Latin America tour 2019 - Flashback
PDF
Latin America Tour 2019 - 10 great sql features
PDF
Latin America Tour 2019 - pattern matching
PDF
Latin America Tour 2019 - slow data and sql processing
PDF
ANSI vs Oracle language
Flashback ITOUG
Sangam 19 - PLSQL still the coolest
Sangam 19 - Analytic SQL
UKOUG - 25 years of hints and tips
Sangam 19 - Successful Applications on Autonomous
Sangam 2019 - The Latest Features
UKOUG 2019 - SQL features
APEX tour 2019 - successful development with autonomous
APAC Groundbreakers 2019 - Perth/Melbourne
OOW19 - Flashback, not just for DBAs
OOW19 - Read consistency
OOW19 - Slower and less secure applications
OOW19 - Killing database sessions
OOW19 - Ten Amazing SQL features
Latin America Tour 2019 - 18c and 19c featues
Latin America tour 2019 - Flashback
Latin America Tour 2019 - 10 great sql features
Latin America Tour 2019 - pattern matching
Latin America Tour 2019 - slow data and sql processing
ANSI vs Oracle language

Recently uploaded (20)

PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
cuic standard and advanced reporting.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Cloud computing and distributed systems.
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Encapsulation theory and applications.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
Chapter 3 Spatial Domain Image Processing.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Empathic Computing: Creating Shared Understanding
Reach Out and Touch Someone: Haptics and Empathic Computing
cuic standard and advanced reporting.pdf
MIND Revenue Release Quarter 2 2025 Press Release
MYSQL Presentation for SQL database connectivity
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Big Data Technologies - Introduction.pptx
Cloud computing and distributed systems.
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Diabetes mellitus diagnosis method based random forest with bat algorithm
Mobile App Security Testing_ A Comprehensive Guide.pdf
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Spectral efficient network and resource selection model in 5G networks
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Encapsulation theory and applications.pdf
NewMind AI Weekly Chronicles - August'25 Week I

Oracle 11g security - 2014

  • 1. All About Oracle Database Security Thomas Kyte http://asktom.oracle.com/
  • 2. 3 Copyright © 2010, Oracle. All rights reserved Data security remains the top priority for enterprise IT security shops with 89% of enterprises citing it as a critical or high priority. Enterprises are also continuing to focus on cutting costs and increasing efficiency. Top Priority for IT Security? Source: Forrester - The State Of Enterprise IT Security And Emerging Trends: 2009 To 2010
  • 3. 4 Copyright © 2010, Oracle. All rights reserved More data than ever… Source: IDC, 2008 1,800 Exabytes Growth Doubles Yearly 2006 2011 Two Thirds of Sensitive and Regulated Data Resides in Databases…
  • 4. 5 Copyright © 2010, Oracle. All rights reserved More breaches then ever… Once exposed, the data is out there – the bell can’t be un-rung PUBLICLY REPORTED DATA BREACHES Total Personally Identifying Information Records Exposed (Millions) Source: DataLossDB 0 100 200 300 400 500 600 2005 2006 2007 2008 2009 Remediation Cost Exceeds $300/record
  • 5. 6 Copyright © 2010, Oracle. All rights reserved More threats than ever… Insider Fraud Is Involved in 60% of Data Breaches Source: Wall Street & Technology
  • 6. © 2010 Oracle Corporation 7 • Database Vault • Label Security • Identity Management • Advanced Security • Secure Backup • Data Masking Database Security Defense In Depth Oracle Database Security Solutions • Audit Vault • Total Recall • Configuration Management Encryption & Masking Access Control Auditing • Database Firewall Monitoring & Blocking • Monitor and block threats before they reach databases • Track changes and audit database activity • Control access to data within the database • Prevent access by non database users • Remove sensitive data from non production environments
  • 7. © 2010 Oracle Corporation 8 Oracle Database Firewall First Line of Defense PoliciesBuilt-in Reports Alerts Custom Reports Applications Block Log Allow Alert Substitute • Monitor database activity to prevent unauthorized database access, SQL injections, privilege or role escalation, illegal access to sensitive data, etc. • Highly accurate SQL grammar based analysis without costly false positives • Flexible SQL level enforcement options based on white lists and black lists • Scalable architecture provides enterprise performance in all deployment modes • Built-in and custom compliance reports for SOX, PCI, and other regulations
  • 8. © 2010 Oracle Corporation 9 Oracle Configuration Management Secure Your Database Environment • Discover and classify databases into policy groups • Scan databases against 400+ best practices and industry standards, custom enterprise-specific configuration policies • Detect and event prevent unauthorized database configuration changes • Change management dashboards and compliance reports Monitor Configuration Management & Audit Vulnerability Management Fix Analysis & Analytics Prioritize Policy Management AssessClassify MonitorDiscover Asset Management
  • 9. © 2010 Oracle Corporation 10 Oracle Total Recall Track Changes to Sensitive Data select salary from emp AS OF TIMESTAMP '02-MAY-09 12.00 AM‘ where emp.title = ‘admin’ • Transparently track application data changes over time • Efficient, tamper-resistant storage of archives in the database • Real-time access to historical application data using SQL • Simplified incident forensics and recovery
  • 10. © 2010 Oracle Corporation 11 Oracle Audit Vault Audit Database Activity in Real-Time • Consolidate database audit trail into secure centralized repository • Detect and alert on suspicious activities, including privileged users • Out-of-the box compliance reports for SOX, PCI, and other regulations • E.g., privileged user audit, entitlements, failed logins, regulated data changes • Streamline audits with report generation, notification, attestation, archiving, etc. CRM Data ERP Data Databases HR Data Audit Data Policies Built-in Reports Alerts Custom Reports ! Auditor
  • 11. © 2010 Oracle Corporation 12 Oracle Database Vault Enforce Security Policies Inside the Database • Automatic and customizable DBA separation of duties and protective realms • Enforce who, where, when, and how using rules and factors • Enforce least privilege for privileged database users • Prevent application by-pass and enforce enterprise data governance • Securely consolidate application data or enable multi-tenant data management Procurement HR Finance Application DBA select * from finance.customers DBA Security DBA Application
  • 12. © 2010 Oracle Corporation 13 Disk Backups Exports Off-Site Facilities Oracle Advanced Security Protect Data from Unauthorized Users • Complete encryption for application data at rest to prevent direct access to data stored in database files, on tape, exports, etc. by IT Staff/OS users • Efficient application data encryption without application changes • Built-in two-tier key management for SoD with support for centralized key management using HSM/KMS • Strong authentication of database users for greater identity assurance Application
  • 13. © 2010 Oracle Corporation 14 Oracle Data Masking Irreversibly De-Identify Data for Non-Production Use • Make application data securely available in non-production environments • Prevent application developers and testers from seeing production data • Extensible template library and policies for data masking automation • Referential integrity automatically preserved so applications continue to work • Real Application Testing friendly LAST_NAME SSN SALARY ANSKEKSL 111—23-1111 60,000 BKJHHEIEDK 222-34-1345 40,000 LAST_NAME SSN SALARY AGUILAR 203-33-3234 40,000 BENSON 323-22-2943 60,000 Production Non-Production Data never leaves Database
  • 14. © 2010 Oracle Corporation 15 Oracle Database Security Solutions Defense-in-Depth for Maximum Security Activity Monitoring Database Firewall Auditing and Reporting DETECTIVE Redaction and Masking Multi-Factor Authorization Encryption PREVENTIVE ADMINISTRATIVE Data Discovery and Classification Vulnerability Scanning Database Lifecycle Management
  • 15. © 2010 Oracle Corporation 16 • Database Vault • Label Security • Identity Management • Advanced Security • Secure Backup • Data Masking Oracle Database Security Solutions Complete Defense-in-Depth • Audit Vault • Total Recall • Configuration Management Encryption & Masking Access Control Auditing • Database Firewall Monitoring & Blocking • Comprehensive – single vendor addresses all your requirements • Transparent – no changes to existing applications or databases • Easy to deploy – point and click interfaces deliver value within hours • Cost Effective – integrated solutions reduce risk and lower TCO • Proven – #1 Database with over 30 years of security innovation!
  • 16. © 2010 Oracle Corporation 17 Oracle Database 12c  Privilege Analysis  Data Redaction  Auditing  Encryption Advancements  Code Based Access Control  Invokers Rights  Separation of duties
  • 17. 18 Copyright © 2010, Oracle. All rights reserved For More Information oracle.com/database/security search.oracle.com or database security
  • 18. 19 Copyright © 2010, Oracle. All rights reserved Thomas.Kyte@oracle.com
  • 19. 20 Copyright © 2010, Oracle. All rights reserved