SlideShare a Scribd company logo
<Insert Picture Here>




Oracle Database Firewall
Pierre Leon
Database Security – Oracle UK
Agenda



        • Evolving Threats to Databases
        • Oracle Database Firewall
              •   Security Models
              •   Policy Enforcement
              •   Reporting
              •   Architecture and Deployment Modes
        • Oracle Database Security Solutions
        • Q&A


© 2011 Oracle Corporation                             2
How is Data Compromised?   2010 Data Breach
                                       Investigations Report




© 2011 Oracle Corporation                                 3
#1 Cause of Data Breaches:
            Web Applications Hacked with SQL Injection and
            Stolen Credentials Obtained Using Malware
    Threat action categories by percent% of breaches and% of records   Types of hacking by% of breaches within Hacking
                                                                       and % of records




    Attack pathways by percent% of breaches and% of records



                        2010 Data Breach
                        Investigations Report



© 2011 Oracle Corporation                                                                                                4
Existing Security Solutions Not Enough

                  Key Loggers            Malware                    SQL Injection       Espionage
                            Spear Phishing     Botware                    Social Engineering




        Web Users




           Database
        Application Users
                                 Application             Database                              Administrators




                             Data Must Be Protected at the Source


© 2011 Oracle Corporation                                                                                       5
Database Security
            Defense In Depth Approach




        •   Monitor and block threats before they reach databases
        •   Track changes and audit database activity
        •   Control access to data within the database
        •   Prevent access by non database users
        •   Implement with
              • Transparency – no changes to existing applications
              • High Performance – no measurable impact on applications
              • Accuracy – minimal false positives and negatives



© 2011 Oracle Corporation                                                 6
Business Drivers
          • Customers need a first line of defence to monitor and
            protect against existing and emerging threats
          • Hackers breach databases from the web exploiting
            vulnerabilities in applications
          • Stolen credentials exploited for unauthorised use




                            Application   Database
                                          Firewall   Database




© 2011 Oracle Corporation                                           7
Oracle Database Firewall
             First Line of Defense

                                                    Allow

                                                    Log

                                                    Alert

                                                    Substitute
          Applications
                                                    Block



                            Alerts   Built-in   Custom       Policies
                                     Reports    Reports




    • Monitor database activity to help prevent unauthorisedactivity, application
      bypass and SQL injections, illegal access to sensitive data etc.
    • Highly accurate SQL grammar based analysis, no false positives
    • White-list, black-list, and exception-list based security policies
    • Built-in and custom compliance reports for regulations


© 2011 Oracle Corporation                                                       8
Oracle Database Firewall
            Positive Security Model Based Enforcement

                                  White List
                                               Allow

                                               Block
          Applications




      • White-list based policies enforce normal or expected behavior
      • Policies evaluate factors such as time, day, network, and application
      • Easily generate white-lists for any application
      • Out of policy SQL statements can be logged, alerted, blocked or
        substituted with a harmless SQL statement
      • SQL substitution foils attackers without disrupting applications

© 2011 Oracle Corporation                                                       9
Oracle Database Firewall
            Negative Security Model Based Enforcement

                                   Black List
                                                Allow

                                                Block
          Applications




       • Stop specific unwanted SQL commands, user or schema access
       • Prevent privilege or role escalation and unauthorisedaccess to
         sensitive data
       • Black list policies can evaluate factors such as day, time, network, and
         application


© 2011 Oracle Corporation                                                           10
Oracle Database Firewall
            Scalable and Safe Policy Enforcement

                                                     Log

                                                     Allow
                                        SELECT * FROM accounts
                                                     Alert
                                        Becomes
                                        SELECT * FROM dual where 1=0
                                                     Substitute
          Applications
                                                     Block




         • Innovative SQL grammar technology reduces millions of SQL statements into
           a small number of SQL characteristics or “clusters”
         • Flexible enforcement at SQL level: block, substitute, alert and pass, log only
                 • SQL substitution foils attackers without disrupting applications
         • Centralisedpolicy management and reporting
         • Superior performance and policy scalability


© 2011 Oracle Corporation                                                                   11
SQL Injection
            Too much trust in applications
                                           SELECT *FROMdvd_stock
                                            WHERE catalog-no = 'PHE8131'
                                              AND location = 1
                                                                          Allow


                                          SELECT   *FROMdvd_stock          Block
                                           WHERE   catalog-no = ''
                            Application    UNION   SELECTcardNo, customerId, 0
                                            FROM   DVD_Orders–-' AND location = 1




    •   Applications are given high levels of privilege
    •   Database trusts the application
    •   “Users” subvert the application to access to the database (and beyond)
    •   Each application is unique
    •   Regular expression black lists are ineffective
    •   Grammar based white list blocks SQL injection attacks


© 2011 Oracle Corporation                                                           12
Oracle Database Firewall
            Semantic Analysis and Policy Creation

        • Train the Analyser on Firewall
          logs
        • Automatically generate White
          Lists
        • Create exceptions
        • Create default actions for
          unrecognised SQL/anomalies
        • Novelty policies
        • Assign threat levels
        • Assign actions
        • Set policies for Logon/Logoff
          and Failed Login




© 2011 Oracle Corporation                           13
Oracle Database Firewall
            Data Masking




       • Prevents creating yet another database with sensitive and regulated data
       • Sensitive and regulated information contained in SQL statements can be
         masked or redacted in real-time prior to being logged
       • Flexible masking policies allow masking all data or just specific columns
       • Critical for organisationswho want to monitor and log all database activity


© 2011 Oracle Corporation                                                              14
Oracle Database Firewall
            Reporting
                             • Database Firewall log data
                               consolidated into reporting database
                             • Dozens of built in reports that can be
                               modified and customised
                                 • Database activity and privileged
                                   user reports
                                 • Entitlements reporting for
                                   database attestation and audit
                                 • Supports demonstrating controls
                                   for PCI, SOX, HIPAA, etc.
                             • Logged SQL statements can be
                               sanitisedof sensitive PII data




© 2011 Oracle Corporation                                               15
Oracle Database Firewall
                                                                Local Monitor
            Architecture
                                                               In-Line Blocking
                                                                and Monitoring

                                                                 Out-of-Band
            Inbound                                               Monitoring
           SQL Traffic

                                                                  HA Mode
                            Policy        Management
                            Analyser      Server(s)



       •   In-line blocking and monitoring, or out-of-band monitoring modes
       •   High availability with parallelFirewalls / Management Servers
       •   Monitoring of remote databases by forwarding network traffic
       •   Application agnostic
       •   Support for Oracle and non-Oracle Databases


© 2011 Oracle Corporation                                                         16
Oracle Database Firewall
            Fast and Flexible Deployments

                                                          Application Servers           Users

         Database           Out-of-Band   Router
          Firewall

                                                           Database Servers

                                                                                Host
                                                                                Based
                                          In-Line                               Agent


       • In-Line: All database traffic goes through the Oracle Database Firewall
       • Out-of-Band/Passive: Database Firewall connected to a SPAN port or TAP
       • Optional Host Based Remote or Local Monitors
               • Can send network traffic from the database host to the Database Firewall
               • Can send non-network database activity to the Database Firewall to
                 identify unauthoriseduse of local console or remote sessions


© 2011 Oracle Corporation                                                                       17
Major US East-Coast Bank
            Active Database Firewall
                                    • Protect business critical databases to prevent
                                      unauthorisedaccess, data loss and PII exposure
              Business Challenges   • Monitor and protect over 600 databases across 7
                                      international data centers.
                                    • Minimal impact to existing database performance

                                    • Oracle Database Firewall for real-time database
                                      protection and monitoring of billions of transactions
              Solution                per day
                                    • Prevent unauthorised data access and malicious
                                      activity

                                    • Passed internal and external audit
                                    • Demonstrate active controls over data access and
              Business Results        database systems
                                    • Standardised security, alerts and reporting across
                                      the complete business



© 2011 Oracle Corporation                                                                     18
Major US Investment Bank
            Auditing Data Changes

                                    • Monitor 60+ databases
                                    • Track every change to customer data
              Business Challenges   • Alert on unauthorisedchanges to stored procedures
                                      or user roles and privileges
                                    • Automated report distribution to internal auditors
                                    • Database Firewall deployed in heterogeneous
                                      environments providing monitoring and reporting on
              Solution                every change to customer data
                                    • Monitor procedure and user role changes with full
                                      separation of duties from existing DBA team

                                    • Passes daily audits
              Business Results      • Audit data ready for sign-off automatically emailed
                                      before the start of business




© 2011 Oracle Corporation                                                                   19
Major European Government
            Protecting Government Data and PII


                                    • Prevent access to highly sensitive citizen data other
                                      than via certified application
              Business Challenges   • Enforce strict application behavior through white-list
                                    • Monitor and audit every transaction 24x365

                                    • Six fully redundant pairs of Database Firewall to
                                      maintain a complete database security perimeter
              Solution
                                    • Critical high-availability architecture to meet strict
                                      service-level requirements
                                    • Complete protection from unauthorisedaccess,
                                      hacking of malicious changes to application code
              Business Results      • Highly sensitive citizen data protected by
                                      continuously available firewall perimeter
                                    • Meets government standards for PII data storage




© 2011 Oracle Corporation                                                                      20
Heterogeneous Database Support

            • Oracle 8i, 9i, 10g, 11g
            • MS-SQL 2000, 2005, 2008
            • Sybase 12.5.4 to 15.0.x
            • SQL Anywhere 10.x
            • DB2 9.x for LUW




© 2011 Oracle Corporation                    21
Oracle Database Security Solutions
            Inside. Outside. Complete.
            • Monitor and block threats before they reach databases
            • Track changes and audit database activity
            • Control access to data within the database
            • Prevent access by non database users
            • Transparency, high performance, accuracy



               Monitoring           Access                  Auditing &          Encryption
               & Blocking           Control                 Tracking            & Masking

  • Database Firewall       • Database Vault        • Audit Vault        • Advanced Security
                            • Label Security        • Configuration      • Secure Backup
                            • Identity Management     Management         • Data Masking
                                                    • Total Recall




© 2011 Oracle Corporation                                                                      22
For More Information



                             search.oracle.com


                               database security




                                                   or

                            oracle.com/database/security




© 2011 Oracle Corporation                                  23
© 2011 Oracle Corporation   24
Remote/Local Monitor

         • Remote Monitor
               • Runs on the server operating system.
               • Sends database transactions to Oracle Database Firewall
               • Supported platforms is by OS -- and then by the RDBMS
                 platforms that DBFW support:
         • Local Monitor
               • Resides inside a database
                  • Monitors local / non-network access.




© 2011 Oracle Corporation                                                  25
User Role Reporting

            • Entitlement Reports
                  • User names
                  • User roles and privileges
                  • Last changed, changed by whom and when
            • Automated and transparent
                  • User role reporting can be run ad-hoc or scheduled
                  • Report on user roles and privileges
                  • Deltas since the last report




© 2011 Oracle Corporation                                                26
Stored Procedure Reporting

            • Stored procedure contents
               • Its not enough to know a procedure was run, it is important to
                 know what SQL was executed when the procedure is called.
            • Stored procedure reports
               • Name
               • Content
               • Threat rating (injection risk, system tables etc).
               • Stored procedure type (DML, DDL, DCL, SELECT etc)
               • Last changed, changed by whom and when
            • Automated and transparent
               • Stored procedure reporting can be run adhoc or scheduled




© 2011 Oracle Corporation                                                         27
The Cost of Inaccuracy
                                                   select * from hr.employees;




                            3,000 transactions
                               per second

                                 260 million
                            transactions per day




© 2011 Oracle Corporation                                                        28
© 2011 Oracle Corporation   29

More Related Content

What's hot (20)

PDF
Oracle database 12c 2 day + security guide
bupbechanhgmail
 
PPTX
Oracle Audit Vault Training | Audit Vault - Oracle Trainings
OracleTrainings
 
PPT
Auditing security of Oracle DB (Karel Miko)
DCIT, a.s.
 
PPT
SQL Server Security - Attack
webhostingguy
 
DOC
Oracle Audit vault
uzzal basak
 
PPS
Security Quick Tour
Active Base
 
PDF
Sustainable Compliance For PCI DSS Standard
Christian Frahm
 
PPTX
SANS Institute Product Review: Oracle Entitlements Server
OracleIDM
 
PPTX
From Cisco ACS to ISE
Mahzad Zahedi
 
PDF
Cisco Study: State of Web Security
Cisco Canada
 
PPTX
Isaca sql server 2008 r2 security & auditing
Antonios Chatzipavlis
 
PDF
CISCO ACS 5.6 Migration Guide
PCCW GLOBAL
 
PDF
Cisco Trustsec & Security Group Tagging
Cisco Canada
 
PDF
Demystifying TrustSec, Identity, NAC and ISE
Cisco Canada
 
PPTX
F5 Networks Application Ready Solution for Oracle Database Technologies
F5 Networks
 
PPTX
Con8823 access management for the internet of things-final
OracleIDM
 
PPTX
Con9024 next generation optimized directory - oracle unified directory - final
OracleIDM
 
PPS
Idm Workshop
Mohamed Atef
 
PDF
8 isecurity database
Anil Pandey
 
PPT
Enterprise Security & SSO
Ambareesh Kulkarni
 
Oracle database 12c 2 day + security guide
bupbechanhgmail
 
Oracle Audit Vault Training | Audit Vault - Oracle Trainings
OracleTrainings
 
Auditing security of Oracle DB (Karel Miko)
DCIT, a.s.
 
SQL Server Security - Attack
webhostingguy
 
Oracle Audit vault
uzzal basak
 
Security Quick Tour
Active Base
 
Sustainable Compliance For PCI DSS Standard
Christian Frahm
 
SANS Institute Product Review: Oracle Entitlements Server
OracleIDM
 
From Cisco ACS to ISE
Mahzad Zahedi
 
Cisco Study: State of Web Security
Cisco Canada
 
Isaca sql server 2008 r2 security & auditing
Antonios Chatzipavlis
 
CISCO ACS 5.6 Migration Guide
PCCW GLOBAL
 
Cisco Trustsec & Security Group Tagging
Cisco Canada
 
Demystifying TrustSec, Identity, NAC and ISE
Cisco Canada
 
F5 Networks Application Ready Solution for Oracle Database Technologies
F5 Networks
 
Con8823 access management for the internet of things-final
OracleIDM
 
Con9024 next generation optimized directory - oracle unified directory - final
OracleIDM
 
Idm Workshop
Mohamed Atef
 
8 isecurity database
Anil Pandey
 
Enterprise Security & SSO
Ambareesh Kulkarni
 

Viewers also liked (6)

PPT
Oracle Database Vault
Marco Alamanni
 
PDF
Presentation database security audit vault & database firewall
xKinAnx
 
PPTX
Oracle Audit Vault and Database Vault のご紹介
オラクルエンジニア通信
 
PDF
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Edgar Alejandro Villegas
 
PPT
Oracle Database Vault
Khalid ALLILI
 
PDF
Enable oracle database vault
Osama Mustafa
 
Oracle Database Vault
Marco Alamanni
 
Presentation database security audit vault & database firewall
xKinAnx
 
Oracle Audit Vault and Database Vault のご紹介
オラクルエンジニア通信
 
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Edgar Alejandro Villegas
 
Oracle Database Vault
Khalid ALLILI
 
Enable oracle database vault
Osama Mustafa
 
Ad

Similar to Oracle Database Firewall - Pierre Leon (20)

PPTX
Varhol oracle database_firewall_oct2011
Peter Varhol
 
PDF
Ppt security-database-overview-11g r2
Oracle BH
 
PPTX
Ved du, hvor dine data er - og hvem, der har adgang til dem? Ron Ben Natan, I...
IBM Danmark
 
PDF
Think Like a Hacker - Database Attack Vectors
Mark Ginnebaugh
 
PDF
Ce hv6 module 42 hacking database servers
Amiga Utomo
 
PDF
Ce Hv6 Module 42 Hacking Database Servers
Kislaychd
 
PDF
Tänased võimalused turvalahendustes - Tarvi Tara
ORACLE USER GROUP ESTONIA
 
PDF
Database & Technology 1 _ Barbara Rabinowicz _ Database Security Methoda and ...
InSync2011
 
PDF
Dr3150012012202 1.getting started
Namgu Jeong
 
PDF
CNIT 129S: 9: Attacking Data Stores (Part 2 of 2)
Sam Bowne
 
PPTX
Oracle database threats - LAOUC Webinar
Osama Mustafa
 
DOCX
SQL Injection - Newsletter
Smitha Padmanabhan
 
PDF
Oracle Database Appliance - Introduction in Cyprus
Andy Panayiotou
 
PDF
CNIT 129S Ch 9: Attacking Data Stores (Part 2 of 2)
Sam Bowne
 
PDF
Thy myth of hacking Oracle
Ermando
 
PPTX
The Spy Who Loathed Me - An Intro to SQL Server Security
Chris Bell
 
PPTX
SQLi for Security Champions
PetraVukmirovic
 
PPT
Web application attacks using Sql injection and countermasures
Cade Zvavanjanja
 
PPTX
SQL Injection Stegnography in Pen Testing
191013607gouthamsric
 
PDF
Ch 9 Attacking Data Stores (Part 2)
Sam Bowne
 
Varhol oracle database_firewall_oct2011
Peter Varhol
 
Ppt security-database-overview-11g r2
Oracle BH
 
Ved du, hvor dine data er - og hvem, der har adgang til dem? Ron Ben Natan, I...
IBM Danmark
 
Think Like a Hacker - Database Attack Vectors
Mark Ginnebaugh
 
Ce hv6 module 42 hacking database servers
Amiga Utomo
 
Ce Hv6 Module 42 Hacking Database Servers
Kislaychd
 
Tänased võimalused turvalahendustes - Tarvi Tara
ORACLE USER GROUP ESTONIA
 
Database & Technology 1 _ Barbara Rabinowicz _ Database Security Methoda and ...
InSync2011
 
Dr3150012012202 1.getting started
Namgu Jeong
 
CNIT 129S: 9: Attacking Data Stores (Part 2 of 2)
Sam Bowne
 
Oracle database threats - LAOUC Webinar
Osama Mustafa
 
SQL Injection - Newsletter
Smitha Padmanabhan
 
Oracle Database Appliance - Introduction in Cyprus
Andy Panayiotou
 
CNIT 129S Ch 9: Attacking Data Stores (Part 2 of 2)
Sam Bowne
 
Thy myth of hacking Oracle
Ermando
 
The Spy Who Loathed Me - An Intro to SQL Server Security
Chris Bell
 
SQLi for Security Champions
PetraVukmirovic
 
Web application attacks using Sql injection and countermasures
Cade Zvavanjanja
 
SQL Injection Stegnography in Pen Testing
191013607gouthamsric
 
Ch 9 Attacking Data Stores (Part 2)
Sam Bowne
 
Ad

Recently uploaded (20)

PDF
LOOPS in C Programming Language - Technology
RishabhDwivedi43
 
PDF
The 2025 InfraRed Report - Redpoint Ventures
Razin Mustafiz
 
PDF
Peak of Data & AI Encore AI-Enhanced Workflows for the Real World
Safe Software
 
PPTX
Agentforce World Tour Toronto '25 - MCP with MuleSoft
Alexandra N. Martinez
 
PDF
POV_ Why Enterprises Need to Find Value in ZERO.pdf
darshakparmar
 
PDF
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PPTX
Seamless Tech Experiences Showcasing Cross-Platform App Design.pptx
presentifyai
 
PDF
Book industry state of the nation 2025 - Tech Forum 2025
BookNet Canada
 
PDF
Kit-Works Team Study_20250627_한달만에만든사내서비스키링(양다윗).pdf
Wonjun Hwang
 
PPTX
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
PPTX
Designing_the_Future_AI_Driven_Product_Experiences_Across_Devices.pptx
presentifyai
 
PDF
NASA A Researcher’s Guide to International Space Station : Physical Sciences ...
Dr. PANKAJ DHUSSA
 
PDF
The Rise of AI and IoT in Mobile App Tech.pdf
IMG Global Infotech
 
PPTX
Future Tech Innovations 2025 – A TechLists Insight
TechLists
 
PDF
“Squinting Vision Pipelines: Detecting and Correcting Errors in Vision Models...
Edge AI and Vision Alliance
 
PPTX
Agentforce World Tour Toronto '25 - Supercharge MuleSoft Development with Mod...
Alexandra N. Martinez
 
PDF
CIFDAQ Market Wrap for the week of 4th July 2025
CIFDAQ
 
PDF
Transcript: Book industry state of the nation 2025 - Tech Forum 2025
BookNet Canada
 
PPTX
Digital Circuits, important subject in CS
contactparinay1
 
LOOPS in C Programming Language - Technology
RishabhDwivedi43
 
The 2025 InfraRed Report - Redpoint Ventures
Razin Mustafiz
 
Peak of Data & AI Encore AI-Enhanced Workflows for the Real World
Safe Software
 
Agentforce World Tour Toronto '25 - MCP with MuleSoft
Alexandra N. Martinez
 
POV_ Why Enterprises Need to Find Value in ZERO.pdf
darshakparmar
 
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
Seamless Tech Experiences Showcasing Cross-Platform App Design.pptx
presentifyai
 
Book industry state of the nation 2025 - Tech Forum 2025
BookNet Canada
 
Kit-Works Team Study_20250627_한달만에만든사내서비스키링(양다윗).pdf
Wonjun Hwang
 
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
Designing_the_Future_AI_Driven_Product_Experiences_Across_Devices.pptx
presentifyai
 
NASA A Researcher’s Guide to International Space Station : Physical Sciences ...
Dr. PANKAJ DHUSSA
 
The Rise of AI and IoT in Mobile App Tech.pdf
IMG Global Infotech
 
Future Tech Innovations 2025 – A TechLists Insight
TechLists
 
“Squinting Vision Pipelines: Detecting and Correcting Errors in Vision Models...
Edge AI and Vision Alliance
 
Agentforce World Tour Toronto '25 - Supercharge MuleSoft Development with Mod...
Alexandra N. Martinez
 
CIFDAQ Market Wrap for the week of 4th July 2025
CIFDAQ
 
Transcript: Book industry state of the nation 2025 - Tech Forum 2025
BookNet Canada
 
Digital Circuits, important subject in CS
contactparinay1
 

Oracle Database Firewall - Pierre Leon

  • 1. <Insert Picture Here> Oracle Database Firewall Pierre Leon Database Security – Oracle UK
  • 2. Agenda • Evolving Threats to Databases • Oracle Database Firewall • Security Models • Policy Enforcement • Reporting • Architecture and Deployment Modes • Oracle Database Security Solutions • Q&A © 2011 Oracle Corporation 2
  • 3. How is Data Compromised? 2010 Data Breach Investigations Report © 2011 Oracle Corporation 3
  • 4. #1 Cause of Data Breaches: Web Applications Hacked with SQL Injection and Stolen Credentials Obtained Using Malware Threat action categories by percent% of breaches and% of records Types of hacking by% of breaches within Hacking and % of records Attack pathways by percent% of breaches and% of records 2010 Data Breach Investigations Report © 2011 Oracle Corporation 4
  • 5. Existing Security Solutions Not Enough Key Loggers Malware SQL Injection Espionage Spear Phishing Botware Social Engineering Web Users Database Application Users Application Database Administrators Data Must Be Protected at the Source © 2011 Oracle Corporation 5
  • 6. Database Security Defense In Depth Approach • Monitor and block threats before they reach databases • Track changes and audit database activity • Control access to data within the database • Prevent access by non database users • Implement with • Transparency – no changes to existing applications • High Performance – no measurable impact on applications • Accuracy – minimal false positives and negatives © 2011 Oracle Corporation 6
  • 7. Business Drivers • Customers need a first line of defence to monitor and protect against existing and emerging threats • Hackers breach databases from the web exploiting vulnerabilities in applications • Stolen credentials exploited for unauthorised use Application Database Firewall Database © 2011 Oracle Corporation 7
  • 8. Oracle Database Firewall First Line of Defense Allow Log Alert Substitute Applications Block Alerts Built-in Custom Policies Reports Reports • Monitor database activity to help prevent unauthorisedactivity, application bypass and SQL injections, illegal access to sensitive data etc. • Highly accurate SQL grammar based analysis, no false positives • White-list, black-list, and exception-list based security policies • Built-in and custom compliance reports for regulations © 2011 Oracle Corporation 8
  • 9. Oracle Database Firewall Positive Security Model Based Enforcement White List Allow Block Applications • White-list based policies enforce normal or expected behavior • Policies evaluate factors such as time, day, network, and application • Easily generate white-lists for any application • Out of policy SQL statements can be logged, alerted, blocked or substituted with a harmless SQL statement • SQL substitution foils attackers without disrupting applications © 2011 Oracle Corporation 9
  • 10. Oracle Database Firewall Negative Security Model Based Enforcement Black List Allow Block Applications • Stop specific unwanted SQL commands, user or schema access • Prevent privilege or role escalation and unauthorisedaccess to sensitive data • Black list policies can evaluate factors such as day, time, network, and application © 2011 Oracle Corporation 10
  • 11. Oracle Database Firewall Scalable and Safe Policy Enforcement Log Allow SELECT * FROM accounts Alert Becomes SELECT * FROM dual where 1=0 Substitute Applications Block • Innovative SQL grammar technology reduces millions of SQL statements into a small number of SQL characteristics or “clusters” • Flexible enforcement at SQL level: block, substitute, alert and pass, log only • SQL substitution foils attackers without disrupting applications • Centralisedpolicy management and reporting • Superior performance and policy scalability © 2011 Oracle Corporation 11
  • 12. SQL Injection Too much trust in applications SELECT *FROMdvd_stock WHERE catalog-no = 'PHE8131' AND location = 1 Allow SELECT *FROMdvd_stock Block WHERE catalog-no = '' Application UNION SELECTcardNo, customerId, 0 FROM DVD_Orders–-' AND location = 1 • Applications are given high levels of privilege • Database trusts the application • “Users” subvert the application to access to the database (and beyond) • Each application is unique • Regular expression black lists are ineffective • Grammar based white list blocks SQL injection attacks © 2011 Oracle Corporation 12
  • 13. Oracle Database Firewall Semantic Analysis and Policy Creation • Train the Analyser on Firewall logs • Automatically generate White Lists • Create exceptions • Create default actions for unrecognised SQL/anomalies • Novelty policies • Assign threat levels • Assign actions • Set policies for Logon/Logoff and Failed Login © 2011 Oracle Corporation 13
  • 14. Oracle Database Firewall Data Masking • Prevents creating yet another database with sensitive and regulated data • Sensitive and regulated information contained in SQL statements can be masked or redacted in real-time prior to being logged • Flexible masking policies allow masking all data or just specific columns • Critical for organisationswho want to monitor and log all database activity © 2011 Oracle Corporation 14
  • 15. Oracle Database Firewall Reporting • Database Firewall log data consolidated into reporting database • Dozens of built in reports that can be modified and customised • Database activity and privileged user reports • Entitlements reporting for database attestation and audit • Supports demonstrating controls for PCI, SOX, HIPAA, etc. • Logged SQL statements can be sanitisedof sensitive PII data © 2011 Oracle Corporation 15
  • 16. Oracle Database Firewall Local Monitor Architecture In-Line Blocking and Monitoring Out-of-Band Inbound Monitoring SQL Traffic HA Mode Policy Management Analyser Server(s) • In-line blocking and monitoring, or out-of-band monitoring modes • High availability with parallelFirewalls / Management Servers • Monitoring of remote databases by forwarding network traffic • Application agnostic • Support for Oracle and non-Oracle Databases © 2011 Oracle Corporation 16
  • 17. Oracle Database Firewall Fast and Flexible Deployments Application Servers Users Database Out-of-Band Router Firewall Database Servers Host Based In-Line Agent • In-Line: All database traffic goes through the Oracle Database Firewall • Out-of-Band/Passive: Database Firewall connected to a SPAN port or TAP • Optional Host Based Remote or Local Monitors • Can send network traffic from the database host to the Database Firewall • Can send non-network database activity to the Database Firewall to identify unauthoriseduse of local console or remote sessions © 2011 Oracle Corporation 17
  • 18. Major US East-Coast Bank Active Database Firewall • Protect business critical databases to prevent unauthorisedaccess, data loss and PII exposure Business Challenges • Monitor and protect over 600 databases across 7 international data centers. • Minimal impact to existing database performance • Oracle Database Firewall for real-time database protection and monitoring of billions of transactions Solution per day • Prevent unauthorised data access and malicious activity • Passed internal and external audit • Demonstrate active controls over data access and Business Results database systems • Standardised security, alerts and reporting across the complete business © 2011 Oracle Corporation 18
  • 19. Major US Investment Bank Auditing Data Changes • Monitor 60+ databases • Track every change to customer data Business Challenges • Alert on unauthorisedchanges to stored procedures or user roles and privileges • Automated report distribution to internal auditors • Database Firewall deployed in heterogeneous environments providing monitoring and reporting on Solution every change to customer data • Monitor procedure and user role changes with full separation of duties from existing DBA team • Passes daily audits Business Results • Audit data ready for sign-off automatically emailed before the start of business © 2011 Oracle Corporation 19
  • 20. Major European Government Protecting Government Data and PII • Prevent access to highly sensitive citizen data other than via certified application Business Challenges • Enforce strict application behavior through white-list • Monitor and audit every transaction 24x365 • Six fully redundant pairs of Database Firewall to maintain a complete database security perimeter Solution • Critical high-availability architecture to meet strict service-level requirements • Complete protection from unauthorisedaccess, hacking of malicious changes to application code Business Results • Highly sensitive citizen data protected by continuously available firewall perimeter • Meets government standards for PII data storage © 2011 Oracle Corporation 20
  • 21. Heterogeneous Database Support • Oracle 8i, 9i, 10g, 11g • MS-SQL 2000, 2005, 2008 • Sybase 12.5.4 to 15.0.x • SQL Anywhere 10.x • DB2 9.x for LUW © 2011 Oracle Corporation 21
  • 22. Oracle Database Security Solutions Inside. Outside. Complete. • Monitor and block threats before they reach databases • Track changes and audit database activity • Control access to data within the database • Prevent access by non database users • Transparency, high performance, accuracy Monitoring Access Auditing & Encryption & Blocking Control Tracking & Masking • Database Firewall • Database Vault • Audit Vault • Advanced Security • Label Security • Configuration • Secure Backup • Identity Management Management • Data Masking • Total Recall © 2011 Oracle Corporation 22
  • 23. For More Information search.oracle.com database security or oracle.com/database/security © 2011 Oracle Corporation 23
  • 24. © 2011 Oracle Corporation 24
  • 25. Remote/Local Monitor • Remote Monitor • Runs on the server operating system. • Sends database transactions to Oracle Database Firewall • Supported platforms is by OS -- and then by the RDBMS platforms that DBFW support: • Local Monitor • Resides inside a database • Monitors local / non-network access. © 2011 Oracle Corporation 25
  • 26. User Role Reporting • Entitlement Reports • User names • User roles and privileges • Last changed, changed by whom and when • Automated and transparent • User role reporting can be run ad-hoc or scheduled • Report on user roles and privileges • Deltas since the last report © 2011 Oracle Corporation 26
  • 27. Stored Procedure Reporting • Stored procedure contents • Its not enough to know a procedure was run, it is important to know what SQL was executed when the procedure is called. • Stored procedure reports • Name • Content • Threat rating (injection risk, system tables etc). • Stored procedure type (DML, DDL, DCL, SELECT etc) • Last changed, changed by whom and when • Automated and transparent • Stored procedure reporting can be run adhoc or scheduled © 2011 Oracle Corporation 27
  • 28. The Cost of Inaccuracy select * from hr.employees; 3,000 transactions per second 260 million transactions per day © 2011 Oracle Corporation 28
  • 29. © 2011 Oracle Corporation 29

Editor's Notes

  • #6: Add one slide after on database firewall category