Book description
Best Practices for Comprehensive Oracle Database Security
Written by renowned experts from Oracle's National Security Group, Oracle Database 12c Security provides proven techniques for designing, implementing, and certifying secure Oracle Database systems in a multitenant architecture. The strategies are also applicable to standalone databases. This Oracle Press guide addresses everything from infrastructure to audit lifecycle and describes how to apply security measures in a holistic manner. The latest security features of Oracle Database 12c are explored in detail with practical and easy-to-understand examples.
- Connect users to databases in a secure manner
- Manage identity, authentication, and access control
- Implement database application security
- Provide security policies across enterprise applications using Real Application Security
- Control data access with Oracle Virtual Private Database
- Control sensitive data using data redaction and transparent sensitive data protection
- Control data access with Oracle Label Security
- Use Oracle Database Vault and Transparent Data Encryption for compliance, cybersecurity, and insider threats
- Implement auditing technologies, including Unified Audit Trail
- Manage security policies and monitor a secure database environment with Oracle Enterprise Manager Cloud Control
Table of contents
- Cover
- Title Page
- Copyright Page
- Dedication
- About the Author
- Contents
- Foreword
- Acknowledgments
- Introduction
-
Part I: Essential Database Security
- Chapter 1: Security for Today’s World
- Chapter 2: Essential Elements of User Security
- Chapter 3: Connection Pools and Enterprise Users
- Chapter 4: Foundational Elements for a Secure Database
-
Chapter 5: Foundational Elements of Database Application Security
- Application Context
- Default Application Context (USERENV)
- Database Session-Based Application Context
- Global Application Context
- External and Initialized Globally
- Using Views in Security
- Definer’s vs. Invoker’s Privileges/Rights for PL/SQL
- Definer’s vs. Invoker’s Privileges/Rights on Java Stored Procedures
- Code-Based Security
- Entitlement Analytics
- Sharing Application Code
- Managing Common Application Code with Database Links
- Summary
- Chapter 6: Real Application Security
-
Part II: Advanced Database Security
- Chapter 7: Controlled Data Access with Virtual Private Database
-
Chapter 8: Essential Elements of Sensitive Data Control
- Sensitive Data Protection Challenges
-
Oracle Database 12c Transparent Sensitive Data Protection
- Discover Sensitive Information with Enterprise Manager
- Configuring a TSDP Administrator
- Defining Sensitive Information Types
- Mapping Sensitive Information Types to Columns
- Creating Sensitive Information Policies
- Mapping Sensitive Information Policies to Sensitive Types
- Enabling Sensitive Information Redaction
- Redacting Sensitive Information in the Database Audit Trail
- Summary
-
Chapter 9: Access Controls with Oracle Label Security
- About Oracle Label Security
- OLS Installation
- Administering OLS
-
OLS Example
- Create a Policy
- Create Label Components
- Create OLS Labels
- Apply OLS Policy to a Table
- Authorize OLS Access
- Insert Data Using OLS Functions
- Querying Data from an OLS Protected Table
- OLS and the Connection Pool
- Auditing OLS Privileges and Use
- Trusted Stored Procedures
- Integrating OLS and Oracle Internet Directory
- Performance with OLS
- Summary
- Chapter 10: Oracle Database Vault: Securing for the Compliance Regulations, Cybersecurity, and Insider Threats
-
Chapter 11: Oracle Transparent Data Encryption: Securing for the Compliance Regulations, Cybersecurity, and Insider Threats
- Encryption 101
- Encrypting Data Stored in the Database
-
The Transparent Data Encryption Solution
- Key Management Facilities
- Key Management Roles
- Creating Keystores and a Master Key in the Root Container
- Creating Master Keys in Pluggable Databases
- Creating an Encrypted Column in a New Table
- Determining TDE Encrypted Columns
- Encrypting an Existing Column
- Caveats to Column-Level TDE
- Tablespace Encryption
- TDE and Oracle Database Tools Interoperability
- Performance
- Advanced Encryption Protection Support
- Summary
-
Part III: Security and Auditing for the Cloud
- Chapter 12: Audit for Accountability
-
Chapter 13: An Applied Approach to Multitenancy and Cloud Security
- System Baseline and Configuration
- Oracle Database 12c Multitenancy and Cloud Computing
- Oracle 12c Software Installation
- Installing and Securing Your Application
- Data Encryption
- Auditing
- Locking Down Your System
- Monitoring and Alerting
- Availability, Backup and Recovery, and Continuity of Operations
- Summary
- Appendix: Sample Preparation Scripts
- Index
Product information
- Title: Oracle Database 12c Security
- Author(s):
- Release date: January 2015
- Publisher(s): McGraw Hill Computing
- ISBN: 9780071822961
You might also like
book
Oracle Database 12c Security Cookbook
Secure your Oracle Database 12c with this valuable Oracle support resource, featuring more than 100 solutions …
book
Oracle Database 12c The Complete Reference
Master the Cutting-Edge Features of Oracle Database 12c Maintain a scalable, highly available enterprise platform and …
book
Oracle E-Business Suite Security
Implement and Maintain Rock-Solid Security for Oracle E-Business Suite Secure Oracle E-Business Suite within organizations and …
book
Oracle Security
Security in a relational database management system is complex, and too few DBAs, system administrators, managers, …