SlideShare a Scribd company logo
Oracle Database Security A Monty Python approach
Database secure, system flawed… Web App. – Database – OS – Network/LAN Firewall’s don’t help; don’t rely on… http://www.myserver.com/main.jsp?table=usertable ?user=app_owner
Security is a chain! A single weak link can break the entire system!  http://www.schneier.com/essay-037.html
DBA = The Weakest Link? NO! So security is a  NONE  issue for DBA’s
So, it’s a dead parrot discussion! "I know a dead parrot when I see one,  and I'm lookin' at one right now."
Why is a DBA <> The Weakest Link? Wants to know how it works Is as accurate as possible Takes responsibility Has to clean up the mess Is security aware!
Being  security minded  is a nasty habit ! You can’t be creative anymore Security is just no fun You are doing a lot of extra work, which should have be done by some else at the first place Security makes life complex No one likes you (if you start talking about security measures)
A DBA being aware of the  WLF (the Weakest Link Factor)  realizes: A DBA job  can  be healthy ! No stress  anymore ! Everyone  loves  you ! The CREATE USER example…
CREATE USER ( Old  DBA style) SQL>  CREATE USER  app_owner IDENTIFIED BY  “#D1ff1cultP@ssw0rd”  DEFAULT TABLESPACE  app_data_01 TEMPORARY TABLESPACE  app_temp  QUOTA 10M  ON app_data_01  PROFILE  app_owner  PASSWORD  EXPIRE;  SQL>  GRANT   create session   TO  app_owner; Plus  X  extra measures to ensure that it is difficult to use this account
CREATE USER ( New  DBA style) SQL>  CREATE USER  app_owner IDENTIFIED BY  app_owner; SQL>  GRANT dba   TO  app_owner; This can now be implemented because off the Weakest Link Factor!
CREATE normal USER  (This  is  the weakest link) SQL>  CREATE USER  app_user IDENTIFIED BY  app_user; SQL>  GRANT  dba  TO  app_user; SQL>  GRANT  select any dictionary   TO     app_user;
Oracle Critical Patch Update Doesn’t make any sense anymore So more free weekends, less work No testing requirements Stable database systems No changes  ;-) GREAT and all this, Just because we are Now  Weakest Link Factor  aware !
Try to imagine what WLF can do for you! Passwords on Post-it’s or text files named “passwords.txt” Unlocked keyboard, Unprotected access to PC’s Super user privileges for everyone Etcetera “ Life becomes so easy…”
Is this what we want?    OFF COURSE NOT !    … or at least, I hope you will agree, this isn’t what we want and be-aware that  YOUR  system is also compromised…
First steps to improvement Create a holistic security minded approach Do you best possible (ask college’s | Google!) Invest in knowledge Be realistic, but also be prepared  (paranoia systems, backup and recover) Threat Models (not only “general” architecture design)
Threat Models http://www.schneier.com/essay-037.html A good design starts with a threat model:  what  the system is designed  to protect ,  from whom , and  for how long The threat model must  take the entire system into account  - not just the data to be protected, but the people who will use the system and how they will use it
Questions to be asked… http://www.schneier.com/essay-037.html What motivates the attackers?  Must attacks be prevented, or can they just be detected?  What kind of disaster recovery is possible?  Analyze the real risks!
Threat model measures http://www.schneier.com/essay-037.html Threat models allow both product designers and consumers to determine what security measures they need.
Threat model awareness http://www.schneier.com/essay-037.html Does it makes sense to encrypt your hard drive if you don't put your files in a safe?  Are the audit logs good enough to convince a court of law?  Does all this effort make sense as long people do not lock there keyboards and / or  do not care ?
General consequence off all our efforts?  We are security aware, we have control We have become smarter Less damage,  if security fails… Protected investment
Extra Result? A happy, stress free DBA ! A happy Development Team ! A happy Customer ! Great Team Work !
Brothers at Arms!  So protect our Stuff!
Who buys a dead parrot anyway…?
I Hope You Have Enjoyed It Marco Gralike http://blog.gralike.com

More Related Content

PDF
Mere Paas Teensy Hai (Nikhil Mittal)
PPTX
SQL Injection Attacks - Is Your Data Secure? GroupBy Conference
PDF
Migrating to WP Engine
PDF
AWS Cloud Account Hacked
PPTX
It All Started With a Wager About System Upgrades
PPT
Dark Alleys/Internet Security
PPTX
Derby con 2014
PPTX
Obfuscation Methods And Planning
Mere Paas Teensy Hai (Nikhil Mittal)
SQL Injection Attacks - Is Your Data Secure? GroupBy Conference
Migrating to WP Engine
AWS Cloud Account Hacked
It All Started With a Wager About System Upgrades
Dark Alleys/Internet Security
Derby con 2014
Obfuscation Methods And Planning

Similar to Security - The WLF Principle (20)

PPT
Database Systems Security
PPTX
Unit 2 - Chapter 7 (Database Security).pptx
PDF
oracle
PPTX
Oracle database threats - LAOUC Webinar
PPT
1.Security Overview And Patching
PPT
DB security
PDF
5db-security.pdf
PPT
Survey Presentation About Application Security
PDF
Analysis of Various Attributes to Have a Secure Database
PPT
Protection and Security in Operating Systems
PDF
Oracle ADF Architecture TV - Design - Designing for Security
DOC
SalemPhilip_ResearchReport
PPTX
Database security
DOCX
Database security
PDF
Hijacking a Pizza Delivery Robot (using SQL injection)
PPTX
Lecturesocial media ppt social media ppt social media ppt 5.pptx
PPT
Application Security Part 1 Threat Defense In Client Server Applications ...
PPTX
unit 5 in the database for master of Engineering
DOCX
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
PPTX
download-20171010121559download-20171010121559.pptx
Database Systems Security
Unit 2 - Chapter 7 (Database Security).pptx
oracle
Oracle database threats - LAOUC Webinar
1.Security Overview And Patching
DB security
5db-security.pdf
Survey Presentation About Application Security
Analysis of Various Attributes to Have a Secure Database
Protection and Security in Operating Systems
Oracle ADF Architecture TV - Design - Designing for Security
SalemPhilip_ResearchReport
Database security
Database security
Hijacking a Pizza Delivery Robot (using SQL injection)
Lecturesocial media ppt social media ppt social media ppt 5.pptx
Application Security Part 1 Threat Defense In Client Server Applications ...
unit 5 in the database for master of Engineering
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
download-20171010121559download-20171010121559.pptx
Ad

More from Marco Gralike (20)

PPTX
UKOUG2018 - I Know what you did Last Summer [in my Database].pptx
PPTX
eProseed Oracle Open World 2016 debrief - Oracle Management Cloud
PPTX
eProseed Oracle Open World 2016 debrief - Oracle 12.2.0.1 Database
PPTX
Oracle Database - JSON and the In-Memory Database
PPTX
UKOUG Tech15 - Going Full Circle - Building a native JSON Database API
PPTX
OakTable World 2015 - Using XMLType content with the Oracle In-Memory Column...
PDF
UKOUG Tech14 - Getting Started With JSON in the Database
PDF
UKOUG Tech14 - Using Database In-Memory Column Store with Complex Datatypes
PPTX
Ordina Oracle Open World
PPTX
Starting with JSON Path Expressions in Oracle 12.1.0.2
PDF
An introduction into Oracle VM V3.x
PDF
An introduction into Oracle Enterprise Manager Cloud Control 12c Release 3
PPT
XML Amsterdam - Creating structure in unstructured data
PPTX
An AMIS Overview of Oracle database 12c (12.1)
PPTX
Flexibiliteit & Snel Schakelen
PPTX
Hotsos 2013 - Creating Structure in Unstructured Data
PPTX
Expertezed 2012 Webcast - XML DB Use Cases
PPTX
BGOUG 2012 - Drag & drop and other stuff - Using your database as a file server
PPTX
BGOUG 2012 - XML Index Strategies
PPTX
BGOUG 2012 - Design concepts for xml applications that will perform
UKOUG2018 - I Know what you did Last Summer [in my Database].pptx
eProseed Oracle Open World 2016 debrief - Oracle Management Cloud
eProseed Oracle Open World 2016 debrief - Oracle 12.2.0.1 Database
Oracle Database - JSON and the In-Memory Database
UKOUG Tech15 - Going Full Circle - Building a native JSON Database API
OakTable World 2015 - Using XMLType content with the Oracle In-Memory Column...
UKOUG Tech14 - Getting Started With JSON in the Database
UKOUG Tech14 - Using Database In-Memory Column Store with Complex Datatypes
Ordina Oracle Open World
Starting with JSON Path Expressions in Oracle 12.1.0.2
An introduction into Oracle VM V3.x
An introduction into Oracle Enterprise Manager Cloud Control 12c Release 3
XML Amsterdam - Creating structure in unstructured data
An AMIS Overview of Oracle database 12c (12.1)
Flexibiliteit & Snel Schakelen
Hotsos 2013 - Creating Structure in Unstructured Data
Expertezed 2012 Webcast - XML DB Use Cases
BGOUG 2012 - Drag & drop and other stuff - Using your database as a file server
BGOUG 2012 - XML Index Strategies
BGOUG 2012 - Design concepts for xml applications that will perform
Ad

Recently uploaded (20)

PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
cuic standard and advanced reporting.pdf
PDF
Encapsulation theory and applications.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
sap open course for s4hana steps from ECC to s4
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Machine Learning_overview_presentation.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Network Security Unit 5.pdf for BCA BBA.
PPT
Teaching material agriculture food technology
PDF
Assigned Numbers - 2025 - Bluetooth® Document
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Approach and Philosophy of On baking technology
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Programs and apps: productivity, graphics, security and other tools
cuic standard and advanced reporting.pdf
Encapsulation theory and applications.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Unlocking AI with Model Context Protocol (MCP)
Diabetes mellitus diagnosis method based random forest with bat algorithm
sap open course for s4hana steps from ECC to s4
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Encapsulation_ Review paper, used for researhc scholars
Machine Learning_overview_presentation.pptx
MIND Revenue Release Quarter 2 2025 Press Release
Network Security Unit 5.pdf for BCA BBA.
Teaching material agriculture food technology
Assigned Numbers - 2025 - Bluetooth® Document
The AUB Centre for AI in Media Proposal.docx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Approach and Philosophy of On baking technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...

Security - The WLF Principle

  • 1. Oracle Database Security A Monty Python approach
  • 2. Database secure, system flawed… Web App. – Database – OS – Network/LAN Firewall’s don’t help; don’t rely on… http://www.myserver.com/main.jsp?table=usertable ?user=app_owner
  • 3. Security is a chain! A single weak link can break the entire system! http://www.schneier.com/essay-037.html
  • 4. DBA = The Weakest Link? NO! So security is a NONE issue for DBA’s
  • 5. So, it’s a dead parrot discussion! &quot;I know a dead parrot when I see one, and I'm lookin' at one right now.&quot;
  • 6. Why is a DBA <> The Weakest Link? Wants to know how it works Is as accurate as possible Takes responsibility Has to clean up the mess Is security aware!
  • 7. Being security minded is a nasty habit ! You can’t be creative anymore Security is just no fun You are doing a lot of extra work, which should have be done by some else at the first place Security makes life complex No one likes you (if you start talking about security measures)
  • 8. A DBA being aware of the WLF (the Weakest Link Factor) realizes: A DBA job can be healthy ! No stress anymore ! Everyone loves you ! The CREATE USER example…
  • 9. CREATE USER ( Old DBA style) SQL> CREATE USER app_owner IDENTIFIED BY “#D1ff1cultP@ssw0rd” DEFAULT TABLESPACE app_data_01 TEMPORARY TABLESPACE app_temp QUOTA 10M ON app_data_01 PROFILE app_owner PASSWORD EXPIRE; SQL> GRANT create session TO app_owner; Plus X extra measures to ensure that it is difficult to use this account
  • 10. CREATE USER ( New DBA style) SQL> CREATE USER app_owner IDENTIFIED BY app_owner; SQL> GRANT dba TO app_owner; This can now be implemented because off the Weakest Link Factor!
  • 11. CREATE normal USER (This is the weakest link) SQL> CREATE USER app_user IDENTIFIED BY app_user; SQL> GRANT dba TO app_user; SQL> GRANT select any dictionary TO app_user;
  • 12. Oracle Critical Patch Update Doesn’t make any sense anymore So more free weekends, less work No testing requirements Stable database systems No changes ;-) GREAT and all this, Just because we are Now Weakest Link Factor aware !
  • 13. Try to imagine what WLF can do for you! Passwords on Post-it’s or text files named “passwords.txt” Unlocked keyboard, Unprotected access to PC’s Super user privileges for everyone Etcetera “ Life becomes so easy…”
  • 14. Is this what we want?  OFF COURSE NOT ! … or at least, I hope you will agree, this isn’t what we want and be-aware that YOUR system is also compromised…
  • 15. First steps to improvement Create a holistic security minded approach Do you best possible (ask college’s | Google!) Invest in knowledge Be realistic, but also be prepared (paranoia systems, backup and recover) Threat Models (not only “general” architecture design)
  • 16. Threat Models http://www.schneier.com/essay-037.html A good design starts with a threat model: what the system is designed to protect , from whom , and for how long The threat model must take the entire system into account - not just the data to be protected, but the people who will use the system and how they will use it
  • 17. Questions to be asked… http://www.schneier.com/essay-037.html What motivates the attackers? Must attacks be prevented, or can they just be detected? What kind of disaster recovery is possible? Analyze the real risks!
  • 18. Threat model measures http://www.schneier.com/essay-037.html Threat models allow both product designers and consumers to determine what security measures they need.
  • 19. Threat model awareness http://www.schneier.com/essay-037.html Does it makes sense to encrypt your hard drive if you don't put your files in a safe? Are the audit logs good enough to convince a court of law? Does all this effort make sense as long people do not lock there keyboards and / or do not care ?
  • 20. General consequence off all our efforts? We are security aware, we have control We have become smarter Less damage, if security fails… Protected investment
  • 21. Extra Result? A happy, stress free DBA ! A happy Development Team ! A happy Customer ! Great Team Work !
  • 22. Brothers at Arms! So protect our Stuff!
  • 23. Who buys a dead parrot anyway…?
  • 24. I Hope You Have Enjoyed It Marco Gralike http://blog.gralike.com