2
Most read
4
Most read
7
Most read
Oracle Database Security
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.2
Billions of Database Records Breached Globally
97% of Breaches Were Avoidable with Basic Controls
98% records stolen
from databases
84% records breached
using stolen credentials
92% discovered
by third party
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.3
Oracle Database Security Solutions
Defense-in-Depth for Maximum Security
Activity Monitoring
Database Firewall
Auditing and Reporting
DETECTIVE
Redaction and Masking
Privileged User Controls
Encryption
PREVENTIVE ADMINISTRATIVE
Sensitive Data Discovery
Configuration Management
Privilege Analysis
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.4
 Transparent data encryption
 Prevents access to stored data
 Built-in two-tier key management
 Support for HSM/KMS
 Integration with critical Oracle
Database technologies
Oracle Advanced Security
Encryption is the Foundation
Preventive Control for Oracle Databases
Disk
Backups
Exports
Off-Site
Facilities
Applications
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.5
 Replace sensitive app data
 Referential integrity preserved
 Extensible template library
 Automated masking policies
 Support for non-Oracle databases
Oracle Data Masking
Masking Data for Non-Production Use
Preventive Control for Oracle Databases
LAST_NAME SSN SALARY
ANSKEKSL 323—23-1111 60,000
BKJHHEIEDK 252-34-1345 40,000
LAST_NAME SSN SALARY
AGUILAR 203-33-3234 40,000
BENSON 323-22-2943 60,000
Production
Non-Production
Dev
Test
Production
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.6
 Limit DBA access to app data
 Multi-factor authorization
 Enforce enterprise data
governance, least privilege
 Realms create protective zones
 Out-of-the-box application policies
Database Vault
Privileged User Controls
Preventive Control for Oracle Databases
Procurement
HR
Finance
select * from finance.customers
Application
DBA
Applications
Security
DBA
DBA
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.7
Oracle Label Security
Label Based Access Control
Preventive Control for Oracle Databases
Transactions
Report Data
Reports
Confidential Sensitive
Sensitive
Confidential
Public
 Virtual information partitioning
 Apply labels to users and data
 Flexible classification labels
 Automatically enforced row level
access control
 Transparent to applications
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.8
 Monitor database traffic
 Detect, block unauthorized activity
including SQL injection attacks
 Unique SQL grammar analysis
 Whitelists, blacklists enforce activity
 Scalable software appliance
Oracle Audit Vault and
Database Firewall
Database Activity Monitoring and Firewall
Detective Control for Oracle and non-Oracle Databases
Block
Log
Allow
Alert
SubstituteApps
Whitelist Blacklist
SQL
Analysis Policy
Factors
Users
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.9
Audit, Report, and Alert in Real-Time
Detective Control for Oracle and non-Oracle Databases
Policies
Built-in
Reports
Alerts
Custom
Reports
!
Security
Analyst
OS &
Storage
Directories
Databases
Oracle
Database
Firewall
Custom
Audit Data &
Event Logs
SOC
DBA
 Secure centralized repository
 Detect, alert suspicious activities
 Out-of-the box custom and
compliance reporting
 Streamline database audits
 Built-in separation of duties
Oracle Audit Vault and
Database Firewall
Auditor
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.10
 Scan Oracle for sensitive data
 Built-in, extensible definitions
 Create and maintain application
data models
 Protect data appropriately:
encrypt, redact, mask, audit…
Oracle Enterprise Manager
Discover Sensitive Data and Databases
Administrative Control for Oracle Databases
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.11
 Discover and classify databases
 Scan for best practices, standards
 Detect unauthorized changes
 Automated remediation
 Patching and provisioning
Oracle Database Lifecycle Management
Configuration Management
Administrative Control for Oracle Databases
Discover
Scan & Monitor
Patch
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.12
 Enterprise ready
 Security and compliance
 Simple and flexible
 Speed and scale
oracle.com/goto/database/security-customers
Oracle Database Security Customers
Customer Benefits
Customers Worldwide Rely on Oracle
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.13
For More Information
www.oracle.com/database/security

More Related Content

PDF
autonomous-database-100.pdf
PDF
Autonomous Database Explained
PDF
DOAG Oracle Database Vault
PPT
Oracle Transparent Data Encryption (TDE) 12c
PDF
[❤PDF❤] Oracle 19c Database Administration Oracle Simplified
PPTX
Data Guard Architecture & Setup
PPTX
What’s New in Oracle Database 19c - Part 1
PDF
Oracle Database Appliance Workshop
autonomous-database-100.pdf
Autonomous Database Explained
DOAG Oracle Database Vault
Oracle Transparent Data Encryption (TDE) 12c
[❤PDF❤] Oracle 19c Database Administration Oracle Simplified
Data Guard Architecture & Setup
What’s New in Oracle Database 19c - Part 1
Oracle Database Appliance Workshop

What's hot (20)

PDF
Oracle Security Presentation
PDF
Presentation database security audit vault & database firewall
PDF
MAA Best Practices for Oracle Database 19c
PPTX
Implement SQL Server on an Azure VM
PDF
ORACLE ARCHITECTURE
PPTX
SQL Server High Availability and Disaster Recovery
PPTX
Breakdown of Microsoft Purview Solutions
PPTX
Identity and Access Management Introduction
PPTX
Introducing Oracle Audit Vault and Database Firewall
PPT
Oracle GoldenGate
PDF
AV/DF Advanced Security Option
PPTX
Azure Fundamentals Part 2
 
PPTX
Azure Synapse Analytics Overview (r2)
PDF
Oracle RAC 19c: Best Practices and Secret Internals
PPTX
Introduction to snowflake
PDF
Oracle Performance Tuning Fundamentals
PDF
Oracle User Management
PPTX
Sun Oracle Exadata Technical Overview V1
PPTX
Oracle DBA
PDF
Microsoft Azure Overview
Oracle Security Presentation
Presentation database security audit vault & database firewall
MAA Best Practices for Oracle Database 19c
Implement SQL Server on an Azure VM
ORACLE ARCHITECTURE
SQL Server High Availability and Disaster Recovery
Breakdown of Microsoft Purview Solutions
Identity and Access Management Introduction
Introducing Oracle Audit Vault and Database Firewall
Oracle GoldenGate
AV/DF Advanced Security Option
Azure Fundamentals Part 2
 
Azure Synapse Analytics Overview (r2)
Oracle RAC 19c: Best Practices and Secret Internals
Introduction to snowflake
Oracle Performance Tuning Fundamentals
Oracle User Management
Sun Oracle Exadata Technical Overview V1
Oracle DBA
Microsoft Azure Overview
Ad

Similar to Oracle Database Security (20)

PPTX
Security Inside Out: Latest Innovations in Oracle Database 12c
PPTX
Oracle 11g security - 2014
PDF
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
PPTX
Introduction to Oracle Database Security.pptx
PPTX
Securing data in Oracle Database 12c - 2015
PDF
ppt-security-dbsat-222-overview-nodemo.pdf
PDF
Security in oracle
PDF
security in oracle database
PDF
Best Practices for implementing Database Security Comprehensive Database Secu...
PDF
Database Private Security Jurisprudence: A Case Study using Oracle
PDF
DATABASE PRIVATE SECURITY JURISPRUDENCE: A CASE STUDY USING ORACLE
PPTX
Oracle database threats - LAOUC Webinar
PDF
Database security issues
PPTX
Autonomous Database Security Features
PDF
Database & Technology 1 _ Barbara Rabinowicz _ Database Security Methoda and ...
PPTX
Innovations dbsec-12c-pub
DOCX
Database Security – Issues and Best PracticesOutline
PDF
MySQL Security
PDF
Oracle database 12c security and compliance
PDF
Database security best_practices
Security Inside Out: Latest Innovations in Oracle Database 12c
Oracle 11g security - 2014
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Introduction to Oracle Database Security.pptx
Securing data in Oracle Database 12c - 2015
ppt-security-dbsat-222-overview-nodemo.pdf
Security in oracle
security in oracle database
Best Practices for implementing Database Security Comprehensive Database Secu...
Database Private Security Jurisprudence: A Case Study using Oracle
DATABASE PRIVATE SECURITY JURISPRUDENCE: A CASE STUDY USING ORACLE
Oracle database threats - LAOUC Webinar
Database security issues
Autonomous Database Security Features
Database & Technology 1 _ Barbara Rabinowicz _ Database Security Methoda and ...
Innovations dbsec-12c-pub
Database Security – Issues and Best PracticesOutline
MySQL Security
Oracle database 12c security and compliance
Database security best_practices
Ad

Recently uploaded (20)

PDF
“Introduction to Designing with AI Agents,” a Presentation from Amazon Web Se...
PDF
The Digital Engine Room: Unlocking APAC’s Economic and Digital Potential thro...
PDF
ELLIE29.pdfWETWETAWTAWETAETAETERTRTERTER
PDF
Decision Optimization - From Theory to Practice
PDF
Uncertainty-aware contextual multi-armed bandits for recommendations in e-com...
PPTX
How to use fields_get method in Odoo 18
PDF
Intravenous drug administration application for pediatric patients via augmen...
PDF
Domain-specific knowledge and context in large language models: challenges, c...
PDF
Altius execution marketplace concept.pdf
PDF
GDG Cloud Southlake #45: Patrick Debois: The Impact of GenAI on Development a...
PDF
Human Computer Interaction Miterm Lesson
PPT
Overviiew on Intellectual property right
PPTX
Slides World Game (s) Great Redesign Eco Economic Epochs.pptx
PDF
Slides World Game (s) Great Redesign Eco Economic Epochs.pdf
PDF
Optimizing bioinformatics applications: a novel approach with human protein d...
PPTX
Blending method and technology for hydrogen.pptx
PDF
CEH Module 2 Footprinting CEH V13, concepts
PDF
Secure Java Applications against Quantum Threats
PDF
Examining Bias in AI Generated News Content.pdf
PDF
substrate PowerPoint Presentation basic one
“Introduction to Designing with AI Agents,” a Presentation from Amazon Web Se...
The Digital Engine Room: Unlocking APAC’s Economic and Digital Potential thro...
ELLIE29.pdfWETWETAWTAWETAETAETERTRTERTER
Decision Optimization - From Theory to Practice
Uncertainty-aware contextual multi-armed bandits for recommendations in e-com...
How to use fields_get method in Odoo 18
Intravenous drug administration application for pediatric patients via augmen...
Domain-specific knowledge and context in large language models: challenges, c...
Altius execution marketplace concept.pdf
GDG Cloud Southlake #45: Patrick Debois: The Impact of GenAI on Development a...
Human Computer Interaction Miterm Lesson
Overviiew on Intellectual property right
Slides World Game (s) Great Redesign Eco Economic Epochs.pptx
Slides World Game (s) Great Redesign Eco Economic Epochs.pdf
Optimizing bioinformatics applications: a novel approach with human protein d...
Blending method and technology for hydrogen.pptx
CEH Module 2 Footprinting CEH V13, concepts
Secure Java Applications against Quantum Threats
Examining Bias in AI Generated News Content.pdf
substrate PowerPoint Presentation basic one

Oracle Database Security

  • 2. Copyright © 2013, Oracle and/or its affiliates. All rights reserved.2 Billions of Database Records Breached Globally 97% of Breaches Were Avoidable with Basic Controls 98% records stolen from databases 84% records breached using stolen credentials 92% discovered by third party
  • 3. Copyright © 2013, Oracle and/or its affiliates. All rights reserved.3 Oracle Database Security Solutions Defense-in-Depth for Maximum Security Activity Monitoring Database Firewall Auditing and Reporting DETECTIVE Redaction and Masking Privileged User Controls Encryption PREVENTIVE ADMINISTRATIVE Sensitive Data Discovery Configuration Management Privilege Analysis
  • 4. Copyright © 2013, Oracle and/or its affiliates. All rights reserved.4  Transparent data encryption  Prevents access to stored data  Built-in two-tier key management  Support for HSM/KMS  Integration with critical Oracle Database technologies Oracle Advanced Security Encryption is the Foundation Preventive Control for Oracle Databases Disk Backups Exports Off-Site Facilities Applications
  • 5. Copyright © 2013, Oracle and/or its affiliates. All rights reserved.5  Replace sensitive app data  Referential integrity preserved  Extensible template library  Automated masking policies  Support for non-Oracle databases Oracle Data Masking Masking Data for Non-Production Use Preventive Control for Oracle Databases LAST_NAME SSN SALARY ANSKEKSL 323—23-1111 60,000 BKJHHEIEDK 252-34-1345 40,000 LAST_NAME SSN SALARY AGUILAR 203-33-3234 40,000 BENSON 323-22-2943 60,000 Production Non-Production Dev Test Production
  • 6. Copyright © 2013, Oracle and/or its affiliates. All rights reserved.6  Limit DBA access to app data  Multi-factor authorization  Enforce enterprise data governance, least privilege  Realms create protective zones  Out-of-the-box application policies Database Vault Privileged User Controls Preventive Control for Oracle Databases Procurement HR Finance select * from finance.customers Application DBA Applications Security DBA DBA
  • 7. Copyright © 2013, Oracle and/or its affiliates. All rights reserved.7 Oracle Label Security Label Based Access Control Preventive Control for Oracle Databases Transactions Report Data Reports Confidential Sensitive Sensitive Confidential Public  Virtual information partitioning  Apply labels to users and data  Flexible classification labels  Automatically enforced row level access control  Transparent to applications
  • 8. Copyright © 2013, Oracle and/or its affiliates. All rights reserved.8  Monitor database traffic  Detect, block unauthorized activity including SQL injection attacks  Unique SQL grammar analysis  Whitelists, blacklists enforce activity  Scalable software appliance Oracle Audit Vault and Database Firewall Database Activity Monitoring and Firewall Detective Control for Oracle and non-Oracle Databases Block Log Allow Alert SubstituteApps Whitelist Blacklist SQL Analysis Policy Factors Users
  • 9. Copyright © 2013, Oracle and/or its affiliates. All rights reserved.9 Audit, Report, and Alert in Real-Time Detective Control for Oracle and non-Oracle Databases Policies Built-in Reports Alerts Custom Reports ! Security Analyst OS & Storage Directories Databases Oracle Database Firewall Custom Audit Data & Event Logs SOC DBA  Secure centralized repository  Detect, alert suspicious activities  Out-of-the box custom and compliance reporting  Streamline database audits  Built-in separation of duties Oracle Audit Vault and Database Firewall Auditor
  • 10. Copyright © 2013, Oracle and/or its affiliates. All rights reserved.10  Scan Oracle for sensitive data  Built-in, extensible definitions  Create and maintain application data models  Protect data appropriately: encrypt, redact, mask, audit… Oracle Enterprise Manager Discover Sensitive Data and Databases Administrative Control for Oracle Databases
  • 11. Copyright © 2013, Oracle and/or its affiliates. All rights reserved.11  Discover and classify databases  Scan for best practices, standards  Detect unauthorized changes  Automated remediation  Patching and provisioning Oracle Database Lifecycle Management Configuration Management Administrative Control for Oracle Databases Discover Scan & Monitor Patch
  • 12. Copyright © 2013, Oracle and/or its affiliates. All rights reserved.12  Enterprise ready  Security and compliance  Simple and flexible  Speed and scale oracle.com/goto/database/security-customers Oracle Database Security Customers Customer Benefits Customers Worldwide Rely on Oracle
  • 13. Copyright © 2013, Oracle and/or its affiliates. All rights reserved.13 For More Information www.oracle.com/database/security