SlideShare a Scribd company logo
Secure Multitenancy on Oracle SuperCluster
Copyright	©	2015,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Oracle	SuperCluster	
Secure	MulBtenancy	with	Compliance	
	
	
	
Glenn	BruneGe,		Director,		Cybersecurity	
Ramesh	Nagappan,	Security	Architect,	Engineered	Systems	
	
Oracle	ConfidenBal
Copyright	©	2015,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Program	Agenda:	
Oracle	ConfidenBal	 3	
SituaBonal	Awareness	
Value	PerspecBve	
Secure	IsolaBon	
Data	ProtecBon	
Access	Control	
Compliance	Audit	
Summary	
1	
2	
3	
4	
5	
6	
6
Copyright	©	2015,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	 4	
Everything!	Know	Your	Data!	
What’s	at	Stake?	
Non	Personal		
InformaAon	
Market	SensiAve	
InformaAon	
External	Facing	
Network	
Core	UAliAes		
Infrastructure	
Customer	Data	 Intellectual	Property	 Payment	Card	Data	
Oracle	ConfidenBal
Copyright	©	2015,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	 5	
The	Cyber	Kill	Chain	
Criminal	Mind	
S1	
ADVERSARY	
S2	
RESEARCH	
S3	
INFILTRATION	
S4	
DISCOVERY	
S5	
CAPTURE	
S6	
EXFILTRATION	
S7	
MARKET	
Oracle	ConfidenBal
Copyright	©	2015,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	 6	
The	Cyber	Kill	Chain	
Criminal	Mind	
ADVERSARY	
S2	
RESEARCH	
S3	
INFILTRATION	
S4	
DISCOVERY	
S5	
CAPTURE	
S6	
EXFILTRATION	
S7	
MARKET	
Think	Like	A	Bad	Guy.	
$€¥	
Oracle	ConfidenBal
Copyright	©	2015,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	 7	
Defense	In	Depth	
Security	@	the	core	
ENTRANT	
S2	
SECURE	ENTRY	
DELEGATED	USER	
SECURE	ISOLATION	
	
S3	
TAMPER-PROOF	ENVIRONMENT	
ENTERPRISE-WIDE	KEY	MGMT.	
	
S4	
NETWORK	WIDE	ACLS	
BUILT-IN	INTELLIGENT	FIREWALL	
ENCRYPTION	POLICIES	W/	HIGHER	RESTRICTIONS	
	
S5	
ROLE	BASED	ACCESS	CONTROL	
ALWAYS	ON	SYSTEM	WIDE	ENCRYPTION	
	
S6	
MONITOR	&	LOG	ACTIVITY	
COMPLIANCE	&	AUDITING	
	
	
S7	
END	TO	END	SECURITY	
PROTECTION	@	the	core!	
Oracle	ConfidenBal
Copyright	©	2015,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Security	at	Each	Layer	 Security	Between	Layers	
8	
Security	between	Systems	
Security	Inside	Out	
Security	Starts	@	The	Core	
Oracle	ConfidenBal
Copyright	©	2015,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Tell	me	more	about	what	we	are	going	to	
talk	about.	
9	Oracle	ConfidenBal
Copyright	©	2015,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	 Oracle	ConfidenBal	 10	
Secure	MulBtenancy	on	Oracle	SuperCluster	
‒  Success	of	the	business	relies	on	
workload	deployments	in	a	
secure	agile	environment	
‒  Ensuring	high	security	requires	
complex	setups	and	it	is	a	Bme	
consuming	process	
‒  Nonstandard	procedures	can	be	
error-prone,	expensive	against	
aGacks	and	compromises	
Challenge	
‒  IsolaBon,	data	protecBon,	
access	control,	automated	
monitoring	&	logging	with		
audit	&	compliance	
‒  Encrypted	datacenter	with	high	
security	measures	throughout	
the	enterprise		
SoluAon	
‒  Always-On	protecBon	helps	
data	confidenBality	and	privacy		
in-use,	in-transit,	and	at-rest	
‒  Business	can	meet	today’s	
tough	regulatory	industry	
compliance	mandates	with	ease	
Benefits
Copyright	©	2015,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
§  ZS3	Mixed-use	Storage	
•  160	TB	(raw)	storage	for	Virtual	Machine	and	system	data	
§  QDR	InfiniBand	Unified	Ultra-fast	Network	
•  40Gb/s	QDR	InfiniBand	IO	backplane	
§  M7	Servers	for	Databases	&	ApplicaAons	
•  1	or	2	M7	Chassis	per	system	(ElasBc	ConfiguraBons)	
•  2	Physical	Domains	per	M7	chassis,	1	-	4	processors	ea.	
•  Up	to	8TB	RAM	per	rack	
§  Exadata	Storage	Servers	for	Oracle	Database	
§  From	3	to	11	per	configuraBon	(Flex.	Config.)	
§  High	Capacity	(96TB	raw	disk	ea.)	
§  Extreme	Flash	(12.8TB	raw	flash	ea.)	
SuperCluster	M7:	Hardware	Architecture	
Oracle	ConfidenBal	 11	
SuperCluster	M7	
8/15/17
Copyright	©	2015,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	 Oracle	ConfidenBal	 12	
Private	Cloud	Deployment	
Providers	View	
Zone	IsolaBon	
Domain	IsolaBon	
System	IsolaBon	
RDS	v3	
RDS	v3	
iSCSI	
NFS	v4	
InfiniBand	Network	40	Gb/sec		
[Full/Limited	Membership]	
10	GbE	Network	
[Client	Access]	
Electrical	IsolaBon	
App	Domain	DB	Domain	
Oracle	ZFS	Storage	Appliance	
Encrypted	ZFS	Data	Sets	
bin,	configs,	backups,	logs	
Oracle	Exadata	Storage	Servers	
Oracle	ASM	Scoped	Security	Disk	Group(s)	
Transparent	Data	EncrypBon	
Layered	Security	
Read-Only	Immutable	Zones	
Secure	Silicon	Memory	
Fine	Grained	RBAC	
IP	Filter	Firewalls	
Secure	Channels	
Centralized	Audit	
Oracle	Key	
Manager	
Secure	
ConnecBon	
VLAN-A	
VLAN-B	
Secure	
ConnecBon	
Oracle	SuperCluster	M7	
Oracle	Solaris	Zone
Copyright	©	2015,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	 Oracle	ConfidenBal	 13	
Cloud	Consumer	PerspecBve	
Consumer	View	
ApplicaBon	Storage	
Database	Storage	
RDS	v3	
NFS	v4	
iSCSI	
Oracle	Database	RAC	
IPoIB,	SDP,	RDSv3	
IPoIB,	SDP	
Secure		
ConnecBon	
Tenant	Specific	NAS	Storage	
Encrypted	ZFS	Data	Sets	
bin,	configs,	backups,	logs	
Tenant	Specific	Oracle	ASM	Security	Groups	
Transparent	Data	EncrypBon		
Tenant	Specific		
Internal	CommunicaDon	
Infiniband	Network		
[Full/Limited	Membership]	
Oracle	Traffic	Director	
Oracle	Fusion	ApplicaDons	
Tamper-Proof	Environment
Copyright	©	2015,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	 Oracle	ConfidenBal	 14	
SuperCluster	M7	
Secure	MulBtenancy	–	Fundamentals	
Audit	&	Compliance		
Efficient	Monitoring	&	Logging	
End-to-End	Access	Control	
Comprehensive	Data	ProtecAon	
Secure	IsolaAon
Copyright	©	2015,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Is	there	a	way	to	segregate	all	the	moving	
parts?	
15	Oracle	ConfidenBal
Copyright	©	2015,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
•  Sandboxed	Workload	Environment	
•  Containment	of	Resources	
•  Controlled/Monitored	Environment	
•  High	Secure	Deployment	
•  Prevents	aGacks	against:	
– Compute,	Storage,	Network	
Oracle	ConfidenBal	
16	
End-To-End	Secure	IsolaBon	
Tenant	
Oracle	SuperCluster	
Engineered	System	
Oracle	
Private	
Cloud
Copyright	©	2015,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	 17	
Secure	IsolaBon	 Oracle	Solaris	Zone	
ApplicaBon	HosBng	
Oracle	Solaris	Zone	
Oracle	Weblogic	
Fusion	ApplicaBon	
Oracle	Weblogic	
Oracle	Database	11gR2	
Root	Domain	 DB	Domain	2	App	Domain	DB	Domain	1	
DB	I/O	Domain	1	 App	I/O	Domain	2	
Physical	Domain	2	Physical	Domain	1	
Oracle	Database	12c	
Oracle	Database	12c	
Oracle	SuperCluster	M7	
Oracle	Traffic	Director	
Electrical	IsolaBon	
Fusion	ApplicaBon	
Oracle	ConfidenBal
Copyright	©	2015,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	 18	
Client	Access	Network	IsolaBon	
Dedicated	Domain	
Database	B-1	
Dedicated	Domain	
Tenant	A	
IPMI	A-1	IPMI	B-1	
Database	A-1	
Database	C-1	
Tenant	B	
Tenant	C	
VLAN	-	B	
Network	
	IPSec	/	TLS	VLAN	-	C	
Network	
AddiDonal	Cryptographic	
IsolaDon	
VLAN	A-1-0	
VLAN	A-1-1	
VLAN	B-1-0	
VLAN	B-1-1	
Layer	2	VNIC	and	VLAN	
IsolaDon	
VLAN	-	A	
Network	 net0	
net1	
Oracle	Solaris	Zones	
Oracle	Solaris	Zone	hosDng	Database	
Oracle	SuperCluster	M7	
Oracle	ConfidenBal
Copyright	©	2015,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	 19	
InfiniBand	Network	IsolaBon	
App	Domain	DB	Domain	
Oracle	Solaris	Zones	hosDng	ApplicaDon	
A-1	
B-1	
C-1	
D-1	
ParDDon:	0x8503	
Protocol:	NFS/IPoIB	
Limited	Membership	
ParDDon:	0x8503	
Protocol:	NFS/IPoIB	
Limited	Membership	
ParDDon:	0xFFFF	
Protocol:	RDSv3	
Full	Membership	
ParDDon:	0xFFFF	
Protocol:	RDSv3	
Full	Membership	
Oracle	Solaris	Zones	hosDng	Database	
Oracle	ZFS	Storage	Appliance	
ZFS	Data	Set	A-1	
Oracle	ZFS	Storage	Appliance	
ZFS	Data	Set	B-1	
Oracle	Exadata	Storage	Servers	
Oracle	ASM	Disk	Group	C-1	
Oracle	Exadata	Storage	Servers	
Oracle	ASM	Disk	Group	D-1	
InfiniBand	Network	40Gb/s	
[Full/Limited	Membership]	10GbE	Network	
[Client	Access]	
TLSv1.2	
VLAN-A	
Tenant-A	
Tenant-B	
TLSv1.2	
VLAN-B	
TLSv1.2	
VLAN-C	
Tenant-C	
Tenant-D	
TLSv1.2	
VLAN-D	
Oracle	SuperCluster	M7	
Oracle	ConfidenBal
Copyright	©	2015,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
What	are	the	many	ways	to	accomplish	
comprehensive	data	protecBon?	
20	Oracle	ConfidenBal
Copyright	©	2015,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	 Oracle	ConfidenBal	 21	
Comprehensive	Data	ProtecBon	
Silicon	Secured	Memory	 Encrypted	Network	Traffic	 Encrypted	Storage	Medium	
In	Transit	–	In	the	Network	 At	Rest	–	In	the	Storage	In	Use	–	In	the	Memory
Copyright	©	2015,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	 22	
Data	ProtecBon	
Hardware-Assisted	
Cryptography,	
Silicon	Secured	Memory	
Oracle	Solaris	
Cryptographic	
Framework	
DB	Domain	
Oracle	Exadata	Storage	Server	
Oracle	ZFS	Storage	Appliance	
RDS	v3	 Intel	AES-NI	
Hardware	Crypto	
Accelerator	
Oracle	ASM	Disk	Group	A-1	
Encrypted	Tablespaces	
Encrypted	ZFS	Data	Set	A-1	
bin,	configs,	backups,	logs	
TLSv1.2	
Secure	ConnecBon	
NFS	v4	A-1	
SDP	TLS	
App	Domain	
Solaris	PKCS#11	
Keystore	
A-1	 A-1	
Tenant-A	
Oracle	Solaris	Zone		
hosDng	ApplicaDon	
Oracle	Solaris	Zone	hosDng		
Database	Instance	
Oracle	SuperCluster	M7	
Oracle	ConfidenBal
Copyright	©	2015,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	 23	
Secure	Key	Management	
RDS	v3	
RDS	v3	
iSCSI	
NFS	v4	
10	GbE	Network	
[Client	Access]	
TLSv1.2	
App	Domain	DB	Domain	
TLSv1.2	
Oracle	ZFS	Storage	
Encrypted	ZFS		
Data	Sets	
configs,	backups,	logs	
Oracle	Exadata	Storage	
Oracle	ASM	Scoped	Security		
Disk	Group(s)	
Transparent	Data	EncrypBon	
Oracle	Key	Manager	
Secure	ConnecBon	
VLAN-A	
VLAN-B	
Secure	ConnecBon	
Tenant-A	
Tenant-B	
TLS	
MulBple	Tenant	
Key	Groups	
Key	Agent	B	
Key	Agent	A	
Key	Agent	A	
Key	Agent	B	
Oracle	SuperCluster	M7	
Oracle	Solaris	Zone	
hosBng	ApplicaBon	
Oracle	Solaris	Zone	
hosBng	Database	
Oracle	ConfidenBal
Copyright	©	2015,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	 24	
Per	Tenant	Scoped	Security	
RAC	DB1	
Tenant	D	 Tenant	B	 Tenant	C	 Tenant	D	Tenant	A	Zone	1	 Tenant	A	Zone	2	
App	Domain	 App	Domain	DB	Domain	DB	Domain	
Oracle	Exadata	Storage	Servers	
Oracle	ZFS	Storage	Appliance	
Tenant	B	
Disk	Group	4	
Tenant	A	
Disk	Group	1	
Tenant	A	
Disk	Group	2	
Tenant	A	
Disk	Group	3	
Tenant	C	
Disk	Group	4	
Tenant	C	
Disk	Group	5	
/common	/u01	
rpool	
Tenant	D	 Tenant	B	 Tenant	A	
Zone	1		
Tenant	A	
Zone	2		
Tenant	C		 Tenant	D		
/common	/u01	
rpool	
/common	/u01	
rpool	
/common	/u01	 /common	/u01	 /common	/u01	
rpool	 rpool	 rpool	
Oracle	SuperCluster	M7	 Oracle	Solaris	Zone	
Oracle	ConfidenBal
Copyright	©	2015,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
How	do	we	ensure	end-to-end	access	
control?	
25	Oracle	ConfidenBal
Copyright	©	2015,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	 Oracle	ConfidenBal	 26	
End-to-End Access Control	
Compute	
Strong	
AuthenBcaBon	
Role-Based	
Access	Control	
Privileged	User	
Access	Control	
Storage	
Oracle	ASM/DB	
Scoped	Security	
Host-Based	
Access	Controls	
iSCSI	Access	
Controls	
Network	
Boundary	
Hardening	
Network	
ParBBoning	
Packet	Filtering	
Database	
Strong	
AuthenBcaBon	
Role-Based	
Access	Control	
Privileged	User	
Access	Control
Copyright	©	2015,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	 Oracle	ConfidenBal	 27	
End-to-End Access Control
Rigorous Controls for high security	
D	
C	
C	
D	
RequesDng	to	access	other	tenants’	resources	
Super	User	login	request	
D	Access	Denied	
OS	Access	Denied	
CHAP	authenDcaDon	request	
iSCSI	Access	Granted	
Non	Secure	Protocol	CommunicaDon	
Access	with	delegated	privilege	profile	
Malicious	program	knocking	around	doors	
Firewall	Block	
D	
OS	Access	Granted	
Access	Denied	
D	
ApplicaDon’s	domain	accessing	Exadata	Storage	
Access	Denied	
D	
Aempt	to	destroy	or	tamper	with	audit	log	records	
AcDon	Impossible	
D	
Unknown	IP	Address	requesDng	access	
Access	Denied	
D	
Database	access	with	Open	Security	
Not	Permied	
D	
SNMP	traps	prior	to	version	3.0	
Not	Permied	
D	
Access	over	SSL	3.0	and	TLS	1.0	channel	
Not	Accessible
Copyright	©	2015,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Wow,	so	much	informaBon.	
Let’s	recap!	Let’s	put	this	in	perspecBve.	
28	Oracle	ConfidenBal
Copyright	©	2015,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	 29	
Private	Cloud	Deployment	
Puwng	all	Together	 Zone	IsolaBon	
Domain	IsolaBon	
System	IsolaBon	
RDS	v3	
RDS	v3	
iSCSI	
NFS	v4	
InfiniBand	Network	40	Gb/sec		
[Full/Limited	Membership]	
10	GbE	Network	
[Client	Access]	
Electrical	IsolaBon	
TLSv1.2	
App	Domain	DB	Domain	
TLSv1.2	
Oracle	ZFS	Storage	Appliance	
Encrypted	ZFS	Data	Sets	
bin,	configs,	backups,	logs	
Oracle	Exadata	Storage	Servers	
Oracle	ASM	Scoped	Security	Disk	Group(s)	
Transparent	Data	EncrypBon	
Layered	Security	
Read-Only	Immutable	Zones	
Dedicated	IB	ParBBon	
Fine	Grained	RBAC	
IP	Filter	Firewalls	
IPSec/IKE	Channels	
Centralized	Audit	
Oracle	Key	
Manager	
Secure	ConnecBon	
VLAN-A	
VLAN-B	
Secure	ConnecBon	Tenant-A	
Tenant-B	
Oracle	SuperCluster	M7	
Oracle	Solaris	Zone	
Oracle	ConfidenBal
Copyright	©	2015,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
SuperCluster	M7:	Compliance	Made	Easy	
•  Get	compliant	faster	and		
stay	compliant	more	easily		
•  SuperCluster	includes	automated	tools	
leverages	Solaris	Compliance	uBlity	for	
Security	Benchmarks	
–  Center	for	Internet	Security		(CIS)	benchmark		
–  Security	Technical	InformaBon	Guide	(STIG)	
–  	Payment	Card	Industry’s	PCI-DSS	compliant	secure	
mulB-tenancy	
Customer	may	‘tailor’	policies	for	
addiBonal	security	benchmarks/profiles	
Oracle	ConfidenBal	 30
Copyright	©	2015,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Achieving	PCI	DSS	in	Oracle	SuperCluster	
Six	major	themes	comprising	of	twelve	requirements	
• Secure	IsolaBon	of	SuperCluster	Domains	&	Zones	and	network	communicaBon	
• IP	Filter	Firewall	for	secure	network	traffic	
• Secure-by-Default	&	Password	policies	
Build	&	Maintain	a	secure	network	
• Encrypted	ZFS	Storage	and	use	of	database	encrypBon	with	ASM	scoped	security	
• Use	of	Secure	protocols	and	encrypted	communicaBon	Protect	cardholder	data	
• Use	of	Immutable	Solaris	Zones	with	Memory	aGack	protecBon	
• Use	of	Solaris	VScan	services	for	AnB-Virus/Malware	scans	
• Use	of	Oracle	latest	Quarterly	Full	Stack	Download	Patch	and	automated	CVE	updates	
Maintain		a	vulnerability	management	program	
• Role	Based	Access	Control	and	Rights/Privilege	Profiles	
• Strong	authenBcaBon	using	PAM	and	password	Policies	Implement	strong	access	measures	
• Automated	logging	and	audit	policies	for	all	operaBons	
• File	Integrity	Checks	and	monitoring	(BART)	
• Establish	Process,	Policies,	Procedure	Controls	
Regularly	monitor	and	test	networks	
• Stronger	encrypBon	in	Solaris	FIPS	mode	
• Verified	boot	on	ILOM,	secure	key	management	enterprise	wide	Maintain	an	informaBon	security	policy	
Oracle	ConfidenBal	 31	
*Refer:	“Oracle	SuperCluster	and	PCI	Compliance	–	Coalfire,	September	2014”
Copyright	©	2015,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	 32	
Oracle	SuperCluster	Private	Cloud	
Secure	IsolaAon	Ground-Up	For	MulAtenancy		
•  Cryptographic	IsolaBon	
•  Global/Non-Global	Tenant	resources	
•  Secure	network	isolaBon		
•  Limited	Membership	on	Infiniband	
•  AnB-snoop	link	protecBon	
Tamper-proof	Compute	Environment		
•  Read-only	Global	Zones		
•  Domains	&	IO	Domains	
•  Non-Global	Zones	
Trusted	Path	Access	To	Zones	and	Domains	
•  Trusted	Path	To	Tenant	Zones	and	Domains	
•  Dedicated	Role	and	Rights	
•  Support	patches/updates	without	reboot	
Total	Data	ProtecAon	For	Tenants	and	Domains	
•  Data	EncrypBon	at	all	layers	(ZFS,	DB,	TLS)		
•  Supports	TDE,	EM	Agent	EncrypBon	
Compliance	Guidance	and	VerificaAon	
•  Solaris	Compliance	guide	for	Security	controls	
•  Run	compliance	profile	reports		
•  SCAP/XCCDF,	OVAL,	HTML	reports	
Comprehensive	Monitoring	and	AudiAng	
•  Tenant	Zone(s)	level	logging		
•  Accountability	on	audit	policy	enforcement	
Stronger	Access	Control	At	All	Layers	
•  Dedicated	Rights	profile	and	RBAC		
•  Cloud	Environment,	Tenant	and	DB	Admins	
•  Immutable	firewall	and	IPSec	policies		
•  Restricted	access	to	ZFS-SA	
•  Restricted	access	to	Exadata	Storage	
Centralized	Tenant	Key	Management	SoluAon	
•  Tenant	owned	Keys	
•  Key	Management	for	TDE	and	ApplicaBons	
Oracle	ConfidenBal
Copyright	©	2015,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Oracle SuperCluster Security Capability Summary
Compute Storage Network Database
Secure
Isolation
!  Physical
!  Electrical
!  Hypervisor-Mediated
!  Kernel-Mediated
!  Physical
!  ASM Instances
!  ZFS Data Sets
!  Physical (Ethernet)
!  Ethernet VLANs
!  InfiniBand Partitions
!  Multitenant
!  Instances
!  Schema
!  Labels
Access
Control
!  RBAC / Privileges
!  LDOM Administration
!  Zone Administration
!  ZFS ACLs
!  Exadata Security
!  NFS Security
!  IP Filter / iptables
!  Switch ACLs
!  Audit Vault and
Database Firewall
!  Roles and Privileges
!  Real Application
Security
!  Database Vault
Data
Protection
!  Immutable Zones
!  Read-Only Mounts
!  ZFS Administration
!  ZFS Encryption
!  LOFI Encryption
!  TDE
!  SSH
!  SSL / TLS
!  IPsec / IKE
!  Virtual Private DB
!  Data Masking
!  Redaction
Monitoring
and Auditing
!  Solaris Auditing
!  Linux Auditing
!  BART / AIDE
!  ZFS Storage
Appliance Logs
!  Exadata Storage
Auditing
!  IP Filter / iptables
!  Switch Logs
!  Database Auditing
!  Audit Vault and
Database Firewall
33	Oracle	ConfidenBal
Copyright	©	2015,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	 34	Oracle	ConfidenBal

More Related Content

PDF
Secure Multi-tenancy on Private Cloud Environment (Oracle SuperCluster)
PDF
TLV - Whats new in MySQL 8
PDF
Management Cloud Oracle
PDF
Oow MySQL Whats new in security overview sept 2017 v1
PDF
Percona Live - Dublin 01 my sql ha-mysql-clusters
PPTX
Oracle Cloud Hybrid Storage Tiering
PPTX
Capgemini technology vision Oracle Database Firewall
PDF
Why MySQL High Availability Matters
Secure Multi-tenancy on Private Cloud Environment (Oracle SuperCluster)
TLV - Whats new in MySQL 8
Management Cloud Oracle
Oow MySQL Whats new in security overview sept 2017 v1
Percona Live - Dublin 01 my sql ha-mysql-clusters
Oracle Cloud Hybrid Storage Tiering
Capgemini technology vision Oracle Database Firewall
Why MySQL High Availability Matters

What's hot (20)

PDF
Troubleshooting tldr
PDF
Percona Live - Dublin 02 security + tuning
PDF
Percona Live - Dublin 03 ee + cloud
PDF
MySQL Clusters
PDF
MySQL Enterprise Edition
PDF
Intermedia Customer Presentation
PDF
Cisco Connect Halifax 2018 Cisco dna - deeper dive
PDF
Security Automation Simplified via NIST OSCAL: We’re Not in Kansas Anymore
PDF
Cisco Connect Halifax 2018 Application agility and programmability with cis...
PDF
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
PDF
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
PDF
Cisco Connect Vancouver 2017 - Embedding IR into the DNA of the business
PDF
ChaoSlingr: Introducing Security-Based Chaos Testing
PDF
How Partners Can Tap into a New Revenue Stream w/MySQL EE
PDF
Cisco Connect Ottawa 2018 data centre security
PDF
Cisco Connect Halifax 2018 Application insight and zero trust policies with...
PDF
AIOUG-GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Preser...
PDF
Cisco connect montreal 2018 saalvare md-program-xr-v2
PDF
Cisco Digital Network Architecture - Introducing the Network Intuitive
PDF
Cisco Connect Halifax 2018 cloud and on premises collaboration security exp...
Troubleshooting tldr
Percona Live - Dublin 02 security + tuning
Percona Live - Dublin 03 ee + cloud
MySQL Clusters
MySQL Enterprise Edition
Intermedia Customer Presentation
Cisco Connect Halifax 2018 Cisco dna - deeper dive
Security Automation Simplified via NIST OSCAL: We’re Not in Kansas Anymore
Cisco Connect Halifax 2018 Application agility and programmability with cis...
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Vancouver 2017 - Embedding IR into the DNA of the business
ChaoSlingr: Introducing Security-Based Chaos Testing
How Partners Can Tap into a New Revenue Stream w/MySQL EE
Cisco Connect Ottawa 2018 data centre security
Cisco Connect Halifax 2018 Application insight and zero trust policies with...
AIOUG-GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Preser...
Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco Digital Network Architecture - Introducing the Network Intuitive
Cisco Connect Halifax 2018 cloud and on premises collaboration security exp...
Ad

Similar to Secure Multitenancy on Oracle SuperCluster (20)

PPTX
Oracle Security Overview from Cloud World 2022
PDF
Oracle-Security_Executive-Presentation
PDF
Lucw lsec-securit-20110907-4-final-5
PDF
Security Challenges in Cloud
PPTX
Capgemini technology vision for Oracle Database Security
PPTX
Autonomous Database Security Features
PDF
Integrating Enterprise Controls with the Cloud
PDF
Oracle Identity Governance Technical Overview - 11gR2PS3
PDF
Advanced Controls access and user security for superusers con8824
PDF
C7 defending the cloud with monitoring and auditing
PDF
Securing and Managing the Oracle HTTP Server - White Paper
PPTX
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
PPTX
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
PDF
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
PDF
A5 cloud security_now_a_reason_to_move_to_the_cloud
PPTX
We are all info sec
PPTX
Defense In Depth With AOP
PPTX
Oracle here. now. your choice.
PDF
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
PPTX
OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...
Oracle Security Overview from Cloud World 2022
Oracle-Security_Executive-Presentation
Lucw lsec-securit-20110907-4-final-5
Security Challenges in Cloud
Capgemini technology vision for Oracle Database Security
Autonomous Database Security Features
Integrating Enterprise Controls with the Cloud
Oracle Identity Governance Technical Overview - 11gR2PS3
Advanced Controls access and user security for superusers con8824
C7 defending the cloud with monitoring and auditing
Securing and Managing the Oracle HTTP Server - White Paper
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
A5 cloud security_now_a_reason_to_move_to_the_cloud
We are all info sec
Defense In Depth With AOP
Oracle here. now. your choice.
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...
Ad

More from Ramesh Nagappan (14)

PDF
Post Quantum Cryptography: Technical Overview
PDF
Biometric Authentication for J2EE applications - JavaONE 2005
PDF
Interoperable Provisioning in a distributed world
PDF
High Performance Security and Virtualization for Oracle Database and Cloud-En...
PDF
High Performance Security With SPARC T4 Hardware Assisted Cryptography
PDF
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
PDF
ICAM - Demo Architecture review
PDF
Government Citizen ID using Java Card Platform
PDF
PIV Card based Identity Assurance in Sun Ray and IDM environment
PDF
Java Platform Security Architecture
PDF
Managing PIV Card Lifecycle and Converging Physical & Logical Access Control
PDF
Stronger Authentication with Biometric SSO
PDF
Stronger/Multi-factor Authentication for Enterprise Applications
PDF
Wire-speed Cryptographic Acceleration for SOA and Java EE Security
Post Quantum Cryptography: Technical Overview
Biometric Authentication for J2EE applications - JavaONE 2005
Interoperable Provisioning in a distributed world
High Performance Security and Virtualization for Oracle Database and Cloud-En...
High Performance Security With SPARC T4 Hardware Assisted Cryptography
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
ICAM - Demo Architecture review
Government Citizen ID using Java Card Platform
PIV Card based Identity Assurance in Sun Ray and IDM environment
Java Platform Security Architecture
Managing PIV Card Lifecycle and Converging Physical & Logical Access Control
Stronger Authentication with Biometric SSO
Stronger/Multi-factor Authentication for Enterprise Applications
Wire-speed Cryptographic Acceleration for SOA and Java EE Security

Recently uploaded (20)

PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
sap open course for s4hana steps from ECC to s4
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Spectroscopy.pptx food analysis technology
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
The Rise and Fall of 3GPP – Time for a Sabbatical?
sap open course for s4hana steps from ECC to s4
“AI and Expert System Decision Support & Business Intelligence Systems”
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Dropbox Q2 2025 Financial Results & Investor Presentation
Machine learning based COVID-19 study performance prediction
Spectroscopy.pptx food analysis technology
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Chapter 3 Spatial Domain Image Processing.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Encapsulation_ Review paper, used for researhc scholars
Network Security Unit 5.pdf for BCA BBA.
Understanding_Digital_Forensics_Presentation.pptx
Unlocking AI with Model Context Protocol (MCP)

Secure Multitenancy on Oracle SuperCluster