SlideShare a Scribd company logo
Database security class presentation
Providers: Zahra Taghipoor kolaei
Seyyedeh Fatemeh Mousazadeh Mousavi
Professor: Dr.Sadegh Dorri Nogoorani
winter 2022
Security in oracle
1
Oracle database
1
2
About oracle
◉ Relational database
◉ ORDBMS
◉ SQL Based
3
Security
2
4
About Oracle Database security
Oracle Label Security
secures database tables at the
row level, allowing you to
filter user access to row data
based on privileges.
Real Application Security
Administration Console (RASADM)
lets you create Real Application
Security data security policies
using a graphical user interface.
Enterprise User Security
addresses user, administrative, and
security challenges by relying on the
identity management services
supplied by Oracle Internet Directory,
an LDAP-compliant directory service.
5
Transparent Data Encryption
enables you to encrypt data so
that only an authorized recipient
can read it.
Oracle Data Redaction
enables you to redact (mask)
column data using several
redaction types.
Data Masking and Subsetting
process of replacing sensitive
data with fictitious yet realistic
looking data and process of
downsizing either by discarding
or extracting data
continue
Key Vault
enables you to accelerate security
and encryption deployments by
centrally managing encryption
keys, Oracle wallets, Java
keystores, and credential files.
Oracle Audit Vault and Database
Firewall
provides a comprehensive Database
Activity Monitoring (DAM) solution
that combines database audit logs
with SQL traffic capture.
6
Database Assessment Tools
Identify database configuration,
operation, or implementation
introduces risk.
Database Vault
restrict access to application data by
privileged database users.
Reducing the risk of insider and
outside threats.
Oracle Lable Security
3
7
About Oracle Label Security
◉ controls the display of individual table rows using labels
◉ works by comparing the row label with a user's label
authorizations to enable you to easily restrict sensitive information
to only authorized users
◉ based on multi-level security (MLS) requirements
◉ installed by default, but not automatically enabled
8
Benefits of Oracle Label Security
◉ It enables row level data classification and provides out-of-the box
access mediation based on the data classification and the user label
authorization or security clearance.
◉ It enables you to assign label authorizations or security clearances
to both database users and application users.
◉ It provides both APIs and a graphical user interface for defining
and storing data classification labels and user label authorizations.
◉ It integrates with Oracle Database Vault and Oracle Advanced
Security Data Redaction, enabling security clearances to be use in
both Database Vault command rules and Data Redaction policy
definitions.
9
Components of Oracle Label Security
◉ Labels: authorizations for users and program units, govern access
to specified protected objects
• Levels: indicate the type of sensitivity that you want to assign to the row
• Compartments: represent the projects in this example that help define more
precise access controls
• Groups: identify organizations owning or accessing the data
◉ Policy: name associated with these labels, rules, authorizations,
and protected tables
10
Oracle Label Security Architecture
11
Data Masking and Subsetting
4
12
The Need to Mask and Subset data
◉ Limit sensitive data proliferation
◉ Share what is necessary
◉ Comply with data privacy laws and standards
◉ Minimize storage costs
13
Major Components of Oracle Data
Masking and Subsetting
◉ Application Data Modeling
◉ Data Masking Format Library
◉ Data Masking Transformations
◉ Data Subsetting
◉ Application Templates
14
Architecture
15
Deployment Options
◉ In-Database mode
◉ In-Export mode
◉ Heterogeneous mode
16
Methodology
17
Auditting database activities
5
18
What is Auditing
◉ the monitoring and recording of selected user database actions,
from both database users and nondatabase users
◉ The actions that you audit are recorded in either data dictionary
tables or in operating system files
19
Why is Auditing Used
◉ Enable accountability for actions
◉ Investigate suspicious activity
◉ Notify an auditor of the actions of an unauthorized user
◉ Monitor and gather data about specific database activities
◉ Detect problems with an authorization or access control
implementation
20
Auditing
Unified and Conditional Auditing
➢ Audit data managed using the built-
in audit data management package
within the database
➢ The AUDIT_ADMIN and
AUDIT_VIEWER roles provides
separation of duty
➢ Oracle audit vault and database
firewall is integrated with this
Traditional Database Auditing
➢ Prevent overhead on the source
database system
➢ Be written to the operating system
files as this configuration
21
references
1) https://docs.oracle.com/en/database/oracle/oracle-database/21/
2) https://docs.oracle.com/cd/E11882_01/network.112/e36292/intro.ht
m#DBSEG001
22
Any questions ?
You can find us at
◉ zahrataghipoor75@gmail.com
◉ sfmousazadeh99@gmail.com
Thanks!
23

More Related Content

PPT
Auditing security of Oracle DB (Karel Miko)
PDF
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
PDF
Database security issues
PDF
8 isecurity database
PDF
Database security
PPTX
Database Security
PPTX
Database security and security in networks
PPTX
Scalable and secure sharing of personal health records in cloud computing usi...
Auditing security of Oracle DB (Karel Miko)
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Database security issues
8 isecurity database
Database security
Database Security
Database security and security in networks
Scalable and secure sharing of personal health records in cloud computing usi...

What's hot (20)

PPTX
Security of the database
PDF
Data sheet workshare data security, policy enforcement, and data center arc...
PPTX
DBMS SECURITY
PPTX
Database security
ODP
Decentralised entity registry “WikiReg”
PPTX
HEBE Platform Technology
PPTX
Scalable Data Management: Automation and the Modern Research Data Portal
PDF
Oracle database 12c 2 day + security guide
PDF
Database & Technology 1 _ Barbara Rabinowicz _ Database Security Methoda and ...
PPTX
Data base security & integrity
DOC
Hasbe a hierarchical attribute based solution
PDF
Brk30010 - With so many different ways to secure data across the Office 365 p...
PDF
CIS14: Is the Cloud Ready for Enterprise Identity and Security Requirements?
PPTX
Database Security And Authentication
PPT
Privacy preserving public auditing for regenerating-code-based
PPT
Dbms ii mca-ch12-security-2013
PPTX
security and privacy in dbms and in sql database
PPT
Database Security & Encryption
PPT
Case Study for Ego-centric Citation Network
DOCX
An Attribute-based Controlled Collaborative Access Control Scheme for Public ...
Security of the database
Data sheet workshare data security, policy enforcement, and data center arc...
DBMS SECURITY
Database security
Decentralised entity registry “WikiReg”
HEBE Platform Technology
Scalable Data Management: Automation and the Modern Research Data Portal
Oracle database 12c 2 day + security guide
Database & Technology 1 _ Barbara Rabinowicz _ Database Security Methoda and ...
Data base security & integrity
Hasbe a hierarchical attribute based solution
Brk30010 - With so many different ways to secure data across the Office 365 p...
CIS14: Is the Cloud Ready for Enterprise Identity and Security Requirements?
Database Security And Authentication
Privacy preserving public auditing for regenerating-code-based
Dbms ii mca-ch12-security-2013
security and privacy in dbms and in sql database
Database Security & Encryption
Case Study for Ego-centric Citation Network
An Attribute-based Controlled Collaborative Access Control Scheme for Public ...
Ad

Similar to Security in oracle (20)

PDF
Oracle database 12c security and compliance
PPTX
Introduction to Oracle Database Security.pptx
PDF
Oracle-Security_Executive-Presentation
PDF
ppt-security-dbsat-222-overview-nodemo.pdf
PPTX
Creating a Multi-Layered Secured Postgres Database
 
PDF
Wp security-data-safe
PPTX
Oracle Database Security
DOCX
Database Security – Issues and Best PracticesOutline
PDF
8.1.6 newsecurity features
PDF
The Benefits of Having a Data Privacy Vault Tech domain news.pdf
PDF
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
PDF
A robust and verifiable threshold multi authority access control system in pu...
PPTX
Database Options
DOCX
How to protect your sensitive data using oracle database vault / Creating and...
PDF
5. 2010 11-03 bucharest oracle-tech_day_security
PPTX
MobileDBSecurity.pptx
PPTX
ch20 Secuity & Admin Transparencies-6E.pptx
PPTX
Security Inside Out: Latest Innovations in Oracle Database 12c
PDF
Oracle Key Vault Data Subsetting and Masking
PPTX
PCI Compliance: How to Remain Compliant and Gain Near Real-Time Analytics on ...
Oracle database 12c security and compliance
Introduction to Oracle Database Security.pptx
Oracle-Security_Executive-Presentation
ppt-security-dbsat-222-overview-nodemo.pdf
Creating a Multi-Layered Secured Postgres Database
 
Wp security-data-safe
Oracle Database Security
Database Security – Issues and Best PracticesOutline
8.1.6 newsecurity features
The Benefits of Having a Data Privacy Vault Tech domain news.pdf
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
A robust and verifiable threshold multi authority access control system in pu...
Database Options
How to protect your sensitive data using oracle database vault / Creating and...
5. 2010 11-03 bucharest oracle-tech_day_security
MobileDBSecurity.pptx
ch20 Secuity & Admin Transparencies-6E.pptx
Security Inside Out: Latest Innovations in Oracle Database 12c
Oracle Key Vault Data Subsetting and Masking
PCI Compliance: How to Remain Compliant and Gain Near Real-Time Analytics on ...
Ad

Recently uploaded (20)

PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Computing-Curriculum for Schools in Ghana
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
Classroom Observation Tools for Teachers
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
RMMM.pdf make it easy to upload and study
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
Final Presentation General Medicine 03-08-2024.pptx
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Anesthesia in Laparoscopic Surgery in India
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
Computing-Curriculum for Schools in Ghana
Renaissance Architecture: A Journey from Faith to Humanism
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Classroom Observation Tools for Teachers
TR - Agricultural Crops Production NC III.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPH.pptx obstetrics and gynecology in nursing
Pharmacology of Heart Failure /Pharmacotherapy of CHF
RMMM.pdf make it easy to upload and study
STATICS OF THE RIGID BODIES Hibbelers.pdf
Supply Chain Operations Speaking Notes -ICLT Program

Security in oracle

  • 1. Database security class presentation Providers: Zahra Taghipoor kolaei Seyyedeh Fatemeh Mousazadeh Mousavi Professor: Dr.Sadegh Dorri Nogoorani winter 2022 Security in oracle 1
  • 3. About oracle ◉ Relational database ◉ ORDBMS ◉ SQL Based 3
  • 5. About Oracle Database security Oracle Label Security secures database tables at the row level, allowing you to filter user access to row data based on privileges. Real Application Security Administration Console (RASADM) lets you create Real Application Security data security policies using a graphical user interface. Enterprise User Security addresses user, administrative, and security challenges by relying on the identity management services supplied by Oracle Internet Directory, an LDAP-compliant directory service. 5 Transparent Data Encryption enables you to encrypt data so that only an authorized recipient can read it. Oracle Data Redaction enables you to redact (mask) column data using several redaction types. Data Masking and Subsetting process of replacing sensitive data with fictitious yet realistic looking data and process of downsizing either by discarding or extracting data
  • 6. continue Key Vault enables you to accelerate security and encryption deployments by centrally managing encryption keys, Oracle wallets, Java keystores, and credential files. Oracle Audit Vault and Database Firewall provides a comprehensive Database Activity Monitoring (DAM) solution that combines database audit logs with SQL traffic capture. 6 Database Assessment Tools Identify database configuration, operation, or implementation introduces risk. Database Vault restrict access to application data by privileged database users. Reducing the risk of insider and outside threats.
  • 8. About Oracle Label Security ◉ controls the display of individual table rows using labels ◉ works by comparing the row label with a user's label authorizations to enable you to easily restrict sensitive information to only authorized users ◉ based on multi-level security (MLS) requirements ◉ installed by default, but not automatically enabled 8
  • 9. Benefits of Oracle Label Security ◉ It enables row level data classification and provides out-of-the box access mediation based on the data classification and the user label authorization or security clearance. ◉ It enables you to assign label authorizations or security clearances to both database users and application users. ◉ It provides both APIs and a graphical user interface for defining and storing data classification labels and user label authorizations. ◉ It integrates with Oracle Database Vault and Oracle Advanced Security Data Redaction, enabling security clearances to be use in both Database Vault command rules and Data Redaction policy definitions. 9
  • 10. Components of Oracle Label Security ◉ Labels: authorizations for users and program units, govern access to specified protected objects • Levels: indicate the type of sensitivity that you want to assign to the row • Compartments: represent the projects in this example that help define more precise access controls • Groups: identify organizations owning or accessing the data ◉ Policy: name associated with these labels, rules, authorizations, and protected tables 10
  • 11. Oracle Label Security Architecture 11
  • 12. Data Masking and Subsetting 4 12
  • 13. The Need to Mask and Subset data ◉ Limit sensitive data proliferation ◉ Share what is necessary ◉ Comply with data privacy laws and standards ◉ Minimize storage costs 13
  • 14. Major Components of Oracle Data Masking and Subsetting ◉ Application Data Modeling ◉ Data Masking Format Library ◉ Data Masking Transformations ◉ Data Subsetting ◉ Application Templates 14
  • 16. Deployment Options ◉ In-Database mode ◉ In-Export mode ◉ Heterogeneous mode 16
  • 19. What is Auditing ◉ the monitoring and recording of selected user database actions, from both database users and nondatabase users ◉ The actions that you audit are recorded in either data dictionary tables or in operating system files 19
  • 20. Why is Auditing Used ◉ Enable accountability for actions ◉ Investigate suspicious activity ◉ Notify an auditor of the actions of an unauthorized user ◉ Monitor and gather data about specific database activities ◉ Detect problems with an authorization or access control implementation 20
  • 21. Auditing Unified and Conditional Auditing ➢ Audit data managed using the built- in audit data management package within the database ➢ The AUDIT_ADMIN and AUDIT_VIEWER roles provides separation of duty ➢ Oracle audit vault and database firewall is integrated with this Traditional Database Auditing ➢ Prevent overhead on the source database system ➢ Be written to the operating system files as this configuration 21
  • 23. Any questions ? You can find us at ◉ zahrataghipoor75@gmail.com ◉ sfmousazadeh99@gmail.com Thanks! 23