CHAPTER 7Applied Database Vault for Existing Applications

Chapter 6 introduced you to techniques and patterns for designing DBV security controls as part of a custom application development effort. In this chapter, we present several techniques for analyzing existing applications that need additional security controls. This might be the case, for example, for an organization that must comply with regulations and is looking to products such as DBV to help in this effort.

The ability to apply DBV security policy to existing applications is a powerful feature that many customers should consider. It is driven by the fact that DBV enforcement runs within the database kernel and is applied to all SQL commands that are submitted to the database, regardless ...

Get Applied Oracle Security: Developing Secure Database and Middleware Environments now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.