SlideShare a Scribd company logo
1
How to protect your sensitive data using Oracle Database Vault / Creating and Testing Realms
Part II
Any measures that should be taken for data security purposes should also beconsidered atthe databaselevel,
similar to hardware,network and operation system levels. Generally,companies buy a firewall productand think
that they have already solved the problems related to security. Researches show that despite it is possibleto take
measures againstexternal attacks by the firewall products,no sufficientmeasures may be taken againstinternal
attacks.In particular,no action related to protection of the data is executed on the server where the database
operates. Taking into account that a user havingDBA authority will haveall typeauthority atthe databaseand may
perform the same operations even when s/he gets connected from other computers, possiblesecurity gaps should
be considered.Access of a databaseadmin to every data is as disadvantageous as him/her to connect from other
computers and perform the same operations,and is even a security gap. OracleDatabaseVault,which is one of
the security solutions of OracleDatabase,may be recommended as an application which may assistin solvingof
the abovementioned problems.
With the increased sophistication of attacks on data, the need to put more operational controls on the databaseis
greater than ever. Given the fact that most customers have a small number of DBAs to manage their databases,it
is very importantto keep databasesecurity related tasks separatein their own dedicated databaseaccounts.
Creating dedicated databaseaccounts to manage databasesecurity helps customers prevent privileged DBA
accounts from accessingapplication data,restricts ad hoc databasechanges,and enforces controls over how,
when and where application data can beaccessed.OracleDatabaseVaultprovides security benefits to customers
even when they have a singleDBA by:
 Preventing hackers from usingprivileged users’accounts to steal application data
 Protecting databasestructures from unauthorized and/or harmful changes
 Enforcingcontrols over how, when and where application data can beaccessed
 Securingexistingdatabaseenvironments transparently and without any application changes
Among the more common auditfindings areunauthorized changes to databaseentitlements, includinggrants of
the DBA role, as well as new accounts and databaseobjects.Preventing unauthorized changes to production
environments is importantnot only for security,but also for complianceas such changes can weaken security and
open doors to hackers,violatingprivacy and complianceregulations.OracleDatabaseVaultSQL Command
Controls allow customers to control operations insidethedatabase,includingcommands such as createtable,
truncate table, and create user. Various out-of-the-box factors such as IP address,authentication method, and
program name help implement multi-factor authorization to deter attacks leveragingstolen passwords.These
controls prevent accidental configuration changes and also preventhackers and malicious insiders fromtampering
with applications.TheDuty Separation feature of OracleDatabaseVaultwill createthree different responsibilities
such as the security administration on the database,the accountmanagement and the databaseadministration.
The Security Administrator (Security Administration),the responsibleperson for Security is also themanager of the
OracleDatabaseVault.S/he is responsiblefor all security operations atthe database.S/he may manage Realms,
command rules and factors and may operate DatabaseVault report, while s/he may not get access to the
application data.
The Account Manager (Account Management) may create, delete and change user accounts.
And the DatabaseAdministrator (DatabaseAdministration) hasdba functions such as backup/restoration,patch
application and performancemanagement.
2
Oraclecustomers today still havehundreds and even thousands of databases distributed throughout the
enterprise and around the world.However, databaseconsolidation will continueas a cost-savingstrategy in the
coming years.The physical security provided by the distributed databasearchitecturemust be availablein the
consolidated environment. OracleDatabaseVaultaddresses the primary security concerns of database
consolidation.
First,it's importantto understand the basic architectureof the application you wish to protect. For example, are
the objects associated with the application spread acrossmultipledatabaseschemas or arethey contained in a
singledatabaseschema? This analysisshould includeall objects related to application data includingtables,views,
materialized views,and stored procedures.Identify the programs,processes,middle tier connections,database
users,and application administratorsthatinteractwith the application objects.Oncethis information is obtained,
the OracleDatabaseRealmdefinitions can becreated and you can authorize who should be ableto access
application data.Application end users typically accessapplication data through the middle tier. Some legacy
applicationsmay still usethe clientserver architecturewhere end users havetheir own accountin the database.
More sophisticated applicationsmay have application specific processes thatrun on the server hostingthe Oracle
Database.
Along this review document, we used the databaseVault Administrator (DVA) consoleto administrateOracle
DatabaseVault. UsingDVA, we created an HR Data Realm to protect human resources data. In order to set up this
realmwith DVA we should firstly click Realms,then click Create, and then namingand defining the realmHR Data
Realm.
3
Duringthe setup procedure, one of the main objective was to ensure that the users with the high privileges was
not ableto access HR data but could still administer the databasecontainingthe HR Data Realm. . Once the realm
was named and enabled, we selected Audit on failurein order to send a notification if rules areviolated.These are
referred to as Realm Secured Objects. For each object in realmowner, object type and name need to be specified.
In this case,we used the wildcard (%) option to identify all objects owned by the HR user.
In this point of setup procedure, the next step was to determine controls of privileged user,such as System, when
the user accesses objects in the realm.In this case, the goal is whenever System user or other privileged user
attempt to query HR object resultin message should be likeSystem had insufficientprivileges or this object.
Similarly,SYSTEM could not be ableto create objects in the HR Data Realm, and Oracle DatabaseVaultreturned a
violation notification.
We also run queries as the HR user to define what owner of the object could do when a Secured Realm existed for
the object they owned. And also we ensure that no specific privileges had been granted within OracleDatabase
4
Vault to HR atthis point. By default, the owner of the object could only be apply Data Manipulation language
(DML) queries. Data Definition Language (DDL) could not be issued atthis point.
Some employees will need authorization to modify the databaseas businessneeds dictate. After runningthe test
above, the user,HR, was added to HR Data Realm usingrealmauthorizations.
Once authorized, this user could issueany statement chosen, includingDDL and DML statements.
Thus privileged databaseaccounts areone of the most commonly used pathways for gainingaccess to sensitive
applicationsdata in the database.Whiletheir broad and unrestricted access facilitates databasemaintenance,the
same access also creates a pointof attack for gainingaccess to largeamounts of data.OracleDatabaseVault
Realms around application schemas,sensitivetables and stored procedures providecontrols to prevent privileged
accounts from being exploited by hackers and insiders to access sensiti veapplication data.
Source : Oracle® Database Vault Administrator's Guide 11gRelease 2 (11.2)
https://docs.oracle.com/cd/B28359_01/server.111/b31222/dvintro.htm#DVADM001

More Related Content

What's hot (20)

PDF
Nabil Nawaz Oracle Oracle 12c Data Guard Deep Dive Presentation
Nabil Nawaz
 
DOCX
Data guard architecture
Vimlendu Kumar
 
PPT
Oracle Data Guard
Martin Meyer
 
PPT
Cloug Troubleshooting Oracle 11g Rac 101 Tips And Tricks
Scott Jenner
 
PPT
Dataguard presentation
Vimlendu Kumar
 
PDF
153 Oracle dba interview questions
Sandeep Sharma IIMK Smart City,IoT,Bigdata,Cloud,BI,DW
 
PDF
Oracle Data Guard Broker Webinar
Zohar Elkayam
 
PDF
Data Guard Deep Dive UKOUG 2012
Emre Baransel
 
PPT
Active / Active configurations with Oracle Active Data Guard
Aris Prassinos
 
DOCX
Rac questions
parvezsigan
 
PDF
Exadata Smart Scan - What is so smart about it?
Uwe Hesse
 
PPTX
Oracle12c data guard farsync and whats new
Nassyam Basha
 
PDF
Database security best_practices
Tarik Essawi
 
PDF
Oracle Active Data Guard 12c: Far Sync Instance, Real-Time Cascade and Other ...
Ludovico Caldara
 
PPTX
Postgre sql best_practices
Emiliano Fusaglia
 
DOC
Analyzing awr report
satish Gaddipati
 
PPTX
Oracle Active Data Guard 12cR2. Is it the best option?
Ludovico Caldara
 
PPSX
RAC - The Savior of DBA
Nikhil Kumar
 
DOCX
Dba 3+ exp qus
krreddy21
 
PPTX
Doag data replication with oracle golden gate: Looking behind the scenes
Trivadis
 
Nabil Nawaz Oracle Oracle 12c Data Guard Deep Dive Presentation
Nabil Nawaz
 
Data guard architecture
Vimlendu Kumar
 
Oracle Data Guard
Martin Meyer
 
Cloug Troubleshooting Oracle 11g Rac 101 Tips And Tricks
Scott Jenner
 
Dataguard presentation
Vimlendu Kumar
 
153 Oracle dba interview questions
Sandeep Sharma IIMK Smart City,IoT,Bigdata,Cloud,BI,DW
 
Oracle Data Guard Broker Webinar
Zohar Elkayam
 
Data Guard Deep Dive UKOUG 2012
Emre Baransel
 
Active / Active configurations with Oracle Active Data Guard
Aris Prassinos
 
Rac questions
parvezsigan
 
Exadata Smart Scan - What is so smart about it?
Uwe Hesse
 
Oracle12c data guard farsync and whats new
Nassyam Basha
 
Database security best_practices
Tarik Essawi
 
Oracle Active Data Guard 12c: Far Sync Instance, Real-Time Cascade and Other ...
Ludovico Caldara
 
Postgre sql best_practices
Emiliano Fusaglia
 
Analyzing awr report
satish Gaddipati
 
Oracle Active Data Guard 12cR2. Is it the best option?
Ludovico Caldara
 
RAC - The Savior of DBA
Nikhil Kumar
 
Dba 3+ exp qus
krreddy21
 
Doag data replication with oracle golden gate: Looking behind the scenes
Trivadis
 

Viewers also liked (10)

DOCX
Wait Interface
Anar Godjaev
 
DOCX
Tuning SGA
Anar Godjaev
 
DOCX
Oracle Golden Gate
Anar Godjaev
 
DOCX
Table Partitions
Anar Godjaev
 
DOCX
Asm disk group migration from
Anar Godjaev
 
DOCX
Conditional Control
Anar Godjaev
 
DOCX
Backup and Recovery
Anar Godjaev
 
DOCX
Database Vault / Verinin Güvenliği
Anar Godjaev
 
DOCX
Audit Mekani̇zmasi
Anar Godjaev
 
DOC
Backup and Recovery Procedure
Anar Godjaev
 
Wait Interface
Anar Godjaev
 
Tuning SGA
Anar Godjaev
 
Oracle Golden Gate
Anar Godjaev
 
Table Partitions
Anar Godjaev
 
Asm disk group migration from
Anar Godjaev
 
Conditional Control
Anar Godjaev
 
Backup and Recovery
Anar Godjaev
 
Database Vault / Verinin Güvenliği
Anar Godjaev
 
Audit Mekani̇zmasi
Anar Godjaev
 
Backup and Recovery Procedure
Anar Godjaev
 
Ad

Similar to How to protect your sensitive data using oracle database vault / Creating and Testing realms part 2 (20)

PDF
Data base Access Control a look at Fine grain Access method
International Journal of Engineering Inventions www.ijeijournal.com
 
PDF
oracle
tarunamoria
 
PDF
Data Base
Susan Tullis
 
PDF
A robust and verifiable threshold multi authority access control system in pu...
IJARIIT
 
PDF
Achieving Secure, sclable and finegrained Cloud computing report
Kiran Girase
 
PDF
Wp security-data-safe
ALI ANWAR, OCP®
 
DOCX
Database security
Mehrdad Jingoism
 
PDF
Application Of A New Database Management System
Pamela Wright
 
PDF
Ijarcet vol-2-issue-3-942-946
Editor IJARCET
 
PPTX
Database Security - IK
Ilgın Kavaklıoğulları
 
PDF
Securing Oracle Database 12c
Inprise Group
 
PDF
Extending Information Security to Non-Production Environments
LindaWatson19
 
PPTX
Implementation of dbms
Prashant Ranka
 
PDF
Locking Down Your Data: Best Practices for Database Security
FredReynolds2
 
PDF
Bolster your data protection plan with a fast-acting, more robust cyber recov...
Principled Technologies
 
PDF
SECURING THE CLOUD DATA LAKES
Happiest Minds Technologies
 
PDF
Blockchain based Data Security as a Service in Cloud Platform Security
ijccsa
 
PDF
BLOCKCHAIN BASED DATA SECURITY AS A SERVICE IN CLOUD PLATFORM SECURITY
ijccsa
 
PDF
CRITICISMS OF THE FUTURE AVAILABILITY IN SUSTAINABLE GENDER GOAL, ACCESS TO L...
csijjournal
 
PDF
BLOCKCHAIN BASED DATA SECURITY AS A SERVICE IN CLOUD PLATFORM SECURITY
ijccsa
 
Data base Access Control a look at Fine grain Access method
International Journal of Engineering Inventions www.ijeijournal.com
 
oracle
tarunamoria
 
Data Base
Susan Tullis
 
A robust and verifiable threshold multi authority access control system in pu...
IJARIIT
 
Achieving Secure, sclable and finegrained Cloud computing report
Kiran Girase
 
Wp security-data-safe
ALI ANWAR, OCP®
 
Database security
Mehrdad Jingoism
 
Application Of A New Database Management System
Pamela Wright
 
Ijarcet vol-2-issue-3-942-946
Editor IJARCET
 
Database Security - IK
Ilgın Kavaklıoğulları
 
Securing Oracle Database 12c
Inprise Group
 
Extending Information Security to Non-Production Environments
LindaWatson19
 
Implementation of dbms
Prashant Ranka
 
Locking Down Your Data: Best Practices for Database Security
FredReynolds2
 
Bolster your data protection plan with a fast-acting, more robust cyber recov...
Principled Technologies
 
SECURING THE CLOUD DATA LAKES
Happiest Minds Technologies
 
Blockchain based Data Security as a Service in Cloud Platform Security
ijccsa
 
BLOCKCHAIN BASED DATA SECURITY AS A SERVICE IN CLOUD PLATFORM SECURITY
ijccsa
 
CRITICISMS OF THE FUTURE AVAILABILITY IN SUSTAINABLE GENDER GOAL, ACCESS TO L...
csijjournal
 
BLOCKCHAIN BASED DATA SECURITY AS A SERVICE IN CLOUD PLATFORM SECURITY
ijccsa
 
Ad

More from Anar Godjaev (19)

PDF
Oracle 10g Database Server Kurulum
Anar Godjaev
 
DOCX
DataPump ile Single Parititon Export
Anar Godjaev
 
DOCX
Redologlar ve Yöneti̇mi̇
Anar Godjaev
 
DOCX
Contraints
Anar Godjaev
 
DOCX
Oracle SQL
Anar Godjaev
 
DOCX
Veri̇tabani ve Kullanici Yöneti̇mi̇
Anar Godjaev
 
DOCX
Instance ve Media Bozukluklarını Inceleme
Anar Godjaev
 
DOCX
PL/SQL Blocks
Anar Godjaev
 
DOCX
Parallel Server
Anar Godjaev
 
DOCX
Memory Management
Anar Godjaev
 
DOCX
LogMiner
Anar Godjaev
 
DOCX
Undo Management
Anar Godjaev
 
DOCX
ASM
Anar Godjaev
 
DOCX
Oracle Managed Files
Anar Godjaev
 
DOC
Recovery Manager (RMAN)
Anar Godjaev
 
DOCX
Oracle Enterprise Linux 5
Anar Godjaev
 
DOCX
Oracle Database 11g R2 Installation
Anar Godjaev
 
DOCX
Change DB Name
Anar Godjaev
 
DOC
Oracle Tablespace Yonetimi
Anar Godjaev
 
Oracle 10g Database Server Kurulum
Anar Godjaev
 
DataPump ile Single Parititon Export
Anar Godjaev
 
Redologlar ve Yöneti̇mi̇
Anar Godjaev
 
Contraints
Anar Godjaev
 
Oracle SQL
Anar Godjaev
 
Veri̇tabani ve Kullanici Yöneti̇mi̇
Anar Godjaev
 
Instance ve Media Bozukluklarını Inceleme
Anar Godjaev
 
PL/SQL Blocks
Anar Godjaev
 
Parallel Server
Anar Godjaev
 
Memory Management
Anar Godjaev
 
LogMiner
Anar Godjaev
 
Undo Management
Anar Godjaev
 
Oracle Managed Files
Anar Godjaev
 
Recovery Manager (RMAN)
Anar Godjaev
 
Oracle Enterprise Linux 5
Anar Godjaev
 
Oracle Database 11g R2 Installation
Anar Godjaev
 
Change DB Name
Anar Godjaev
 
Oracle Tablespace Yonetimi
Anar Godjaev
 

Recently uploaded (20)

PPT
Talk on Critical Theory, Part One, Philosophy of Social Sciences
Soraj Hongladarom
 
PPTX
QUARTER 1 WEEK 2 PLOT, POV AND CONFLICTS
KynaParas
 
PPTX
How to Configure Re-Ordering From Portal in Odoo 18 Website
Celine George
 
PDF
Isharyanti-2025-Cross Language Communication in Indonesian Language
Neny Isharyanti
 
PPTX
How to Convert an Opportunity into a Quotation in Odoo 18 CRM
Celine George
 
PDF
Chapter-V-DED-Entrepreneurship: Institutions Facilitating Entrepreneurship
Dayanand Huded
 
PPTX
PATIENT ASSIGNMENTS AND NURSING CARE RESPONSIBILITIES.pptx
PRADEEP ABOTHU
 
PPTX
I AM MALALA The Girl Who Stood Up for Education and was Shot by the Taliban...
Beena E S
 
PDF
Biological Bilingual Glossary Hindi and English Medium
World of Wisdom
 
PPTX
Quarter 1_PPT_PE & HEALTH 8_WEEK 3-4.pptx
ronajadolpnhs
 
PPTX
care of patient with elimination needs.pptx
Rekhanjali Gupta
 
PDF
Exploring the Different Types of Experimental Research
Thelma Villaflores
 
PPTX
PPT-Q1-WEEK-3-SCIENCE-ERevised Matatag Grade 3.pptx
reijhongidayawan02
 
PPTX
PPT-Q1-WK-3-ENGLISH Revised Matatag Grade 3.pptx
reijhongidayawan02
 
PPTX
How to Create a PDF Report in Odoo 18 - Odoo Slides
Celine George
 
PPTX
EDUCATIONAL MEDIA/ TEACHING AUDIO VISUAL AIDS
Sonali Gupta
 
PPTX
Neurodivergent Friendly Schools - Slides from training session
Pooky Knightsmith
 
PDF
Mahidol_Change_Agent_Note_2025-06-27-29_MUSEF
Tassanee Lerksuthirat
 
PPTX
CATEGORIES OF NURSING PERSONNEL: HOSPITAL & COLLEGE
PRADEEP ABOTHU
 
PPT
Talk on Critical Theory, Part II, Philosophy of Social Sciences
Soraj Hongladarom
 
Talk on Critical Theory, Part One, Philosophy of Social Sciences
Soraj Hongladarom
 
QUARTER 1 WEEK 2 PLOT, POV AND CONFLICTS
KynaParas
 
How to Configure Re-Ordering From Portal in Odoo 18 Website
Celine George
 
Isharyanti-2025-Cross Language Communication in Indonesian Language
Neny Isharyanti
 
How to Convert an Opportunity into a Quotation in Odoo 18 CRM
Celine George
 
Chapter-V-DED-Entrepreneurship: Institutions Facilitating Entrepreneurship
Dayanand Huded
 
PATIENT ASSIGNMENTS AND NURSING CARE RESPONSIBILITIES.pptx
PRADEEP ABOTHU
 
I AM MALALA The Girl Who Stood Up for Education and was Shot by the Taliban...
Beena E S
 
Biological Bilingual Glossary Hindi and English Medium
World of Wisdom
 
Quarter 1_PPT_PE & HEALTH 8_WEEK 3-4.pptx
ronajadolpnhs
 
care of patient with elimination needs.pptx
Rekhanjali Gupta
 
Exploring the Different Types of Experimental Research
Thelma Villaflores
 
PPT-Q1-WEEK-3-SCIENCE-ERevised Matatag Grade 3.pptx
reijhongidayawan02
 
PPT-Q1-WK-3-ENGLISH Revised Matatag Grade 3.pptx
reijhongidayawan02
 
How to Create a PDF Report in Odoo 18 - Odoo Slides
Celine George
 
EDUCATIONAL MEDIA/ TEACHING AUDIO VISUAL AIDS
Sonali Gupta
 
Neurodivergent Friendly Schools - Slides from training session
Pooky Knightsmith
 
Mahidol_Change_Agent_Note_2025-06-27-29_MUSEF
Tassanee Lerksuthirat
 
CATEGORIES OF NURSING PERSONNEL: HOSPITAL & COLLEGE
PRADEEP ABOTHU
 
Talk on Critical Theory, Part II, Philosophy of Social Sciences
Soraj Hongladarom
 

How to protect your sensitive data using oracle database vault / Creating and Testing realms part 2

  • 1. 1 How to protect your sensitive data using Oracle Database Vault / Creating and Testing Realms Part II Any measures that should be taken for data security purposes should also beconsidered atthe databaselevel, similar to hardware,network and operation system levels. Generally,companies buy a firewall productand think that they have already solved the problems related to security. Researches show that despite it is possibleto take measures againstexternal attacks by the firewall products,no sufficientmeasures may be taken againstinternal attacks.In particular,no action related to protection of the data is executed on the server where the database operates. Taking into account that a user havingDBA authority will haveall typeauthority atthe databaseand may perform the same operations even when s/he gets connected from other computers, possiblesecurity gaps should be considered.Access of a databaseadmin to every data is as disadvantageous as him/her to connect from other computers and perform the same operations,and is even a security gap. OracleDatabaseVault,which is one of the security solutions of OracleDatabase,may be recommended as an application which may assistin solvingof the abovementioned problems. With the increased sophistication of attacks on data, the need to put more operational controls on the databaseis greater than ever. Given the fact that most customers have a small number of DBAs to manage their databases,it is very importantto keep databasesecurity related tasks separatein their own dedicated databaseaccounts. Creating dedicated databaseaccounts to manage databasesecurity helps customers prevent privileged DBA accounts from accessingapplication data,restricts ad hoc databasechanges,and enforces controls over how, when and where application data can beaccessed.OracleDatabaseVaultprovides security benefits to customers even when they have a singleDBA by:  Preventing hackers from usingprivileged users’accounts to steal application data  Protecting databasestructures from unauthorized and/or harmful changes  Enforcingcontrols over how, when and where application data can beaccessed  Securingexistingdatabaseenvironments transparently and without any application changes Among the more common auditfindings areunauthorized changes to databaseentitlements, includinggrants of the DBA role, as well as new accounts and databaseobjects.Preventing unauthorized changes to production environments is importantnot only for security,but also for complianceas such changes can weaken security and open doors to hackers,violatingprivacy and complianceregulations.OracleDatabaseVaultSQL Command Controls allow customers to control operations insidethedatabase,includingcommands such as createtable, truncate table, and create user. Various out-of-the-box factors such as IP address,authentication method, and program name help implement multi-factor authorization to deter attacks leveragingstolen passwords.These controls prevent accidental configuration changes and also preventhackers and malicious insiders fromtampering with applications.TheDuty Separation feature of OracleDatabaseVaultwill createthree different responsibilities such as the security administration on the database,the accountmanagement and the databaseadministration. The Security Administrator (Security Administration),the responsibleperson for Security is also themanager of the OracleDatabaseVault.S/he is responsiblefor all security operations atthe database.S/he may manage Realms, command rules and factors and may operate DatabaseVault report, while s/he may not get access to the application data. The Account Manager (Account Management) may create, delete and change user accounts. And the DatabaseAdministrator (DatabaseAdministration) hasdba functions such as backup/restoration,patch application and performancemanagement.
  • 2. 2 Oraclecustomers today still havehundreds and even thousands of databases distributed throughout the enterprise and around the world.However, databaseconsolidation will continueas a cost-savingstrategy in the coming years.The physical security provided by the distributed databasearchitecturemust be availablein the consolidated environment. OracleDatabaseVaultaddresses the primary security concerns of database consolidation. First,it's importantto understand the basic architectureof the application you wish to protect. For example, are the objects associated with the application spread acrossmultipledatabaseschemas or arethey contained in a singledatabaseschema? This analysisshould includeall objects related to application data includingtables,views, materialized views,and stored procedures.Identify the programs,processes,middle tier connections,database users,and application administratorsthatinteractwith the application objects.Oncethis information is obtained, the OracleDatabaseRealmdefinitions can becreated and you can authorize who should be ableto access application data.Application end users typically accessapplication data through the middle tier. Some legacy applicationsmay still usethe clientserver architecturewhere end users havetheir own accountin the database. More sophisticated applicationsmay have application specific processes thatrun on the server hostingthe Oracle Database. Along this review document, we used the databaseVault Administrator (DVA) consoleto administrateOracle DatabaseVault. UsingDVA, we created an HR Data Realm to protect human resources data. In order to set up this realmwith DVA we should firstly click Realms,then click Create, and then namingand defining the realmHR Data Realm.
  • 3. 3 Duringthe setup procedure, one of the main objective was to ensure that the users with the high privileges was not ableto access HR data but could still administer the databasecontainingthe HR Data Realm. . Once the realm was named and enabled, we selected Audit on failurein order to send a notification if rules areviolated.These are referred to as Realm Secured Objects. For each object in realmowner, object type and name need to be specified. In this case,we used the wildcard (%) option to identify all objects owned by the HR user. In this point of setup procedure, the next step was to determine controls of privileged user,such as System, when the user accesses objects in the realm.In this case, the goal is whenever System user or other privileged user attempt to query HR object resultin message should be likeSystem had insufficientprivileges or this object. Similarly,SYSTEM could not be ableto create objects in the HR Data Realm, and Oracle DatabaseVaultreturned a violation notification. We also run queries as the HR user to define what owner of the object could do when a Secured Realm existed for the object they owned. And also we ensure that no specific privileges had been granted within OracleDatabase
  • 4. 4 Vault to HR atthis point. By default, the owner of the object could only be apply Data Manipulation language (DML) queries. Data Definition Language (DDL) could not be issued atthis point. Some employees will need authorization to modify the databaseas businessneeds dictate. After runningthe test above, the user,HR, was added to HR Data Realm usingrealmauthorizations. Once authorized, this user could issueany statement chosen, includingDDL and DML statements. Thus privileged databaseaccounts areone of the most commonly used pathways for gainingaccess to sensitive applicationsdata in the database.Whiletheir broad and unrestricted access facilitates databasemaintenance,the same access also creates a pointof attack for gainingaccess to largeamounts of data.OracleDatabaseVault Realms around application schemas,sensitivetables and stored procedures providecontrols to prevent privileged accounts from being exploited by hackers and insiders to access sensiti veapplication data. Source : Oracle® Database Vault Administrator's Guide 11gRelease 2 (11.2) https://docs.oracle.com/cd/B28359_01/server.111/b31222/dvintro.htm#DVADM001