SlideShare a Scribd company logo
1 of 6
1
How to protect your sensitive data using Oracle Database Vault
Any measures that should be taken for data security purposes should also beconsidered atthe databaselevel,
similar to hardware,network and operation system levels. Generally,companies buy a firewall productand think
that they have already solved the problems related to security. Researches show that despite it is possibleto take
measures againstexternal attacks by the firewall products,no sufficientmeasures may be taken againstinternal
attacks.In particular,no action related to protection of the data is executed on the server where the database
operates. Taking into account that a user havingDBA authority will haveall typeauthority atthe databaseand may
perform the same operations even when s/he gets connected from other computers, possiblesecurity gaps should
be considered.Access of a databaseadmin to every data is as disadvantageous as him/her to connect from other
computers and perform the same operations,and is even a security gap. OracleDatabaseVault,which is one of
the security solutions of OracleDatabase,may be recommended as an application which may assistin solvingof
the abovementioned problems.
What is Oracle Database Vault?
OracleDatabaseVaultprovides powerful security controls to help protect application data fromunauthorized
access,and comply with privacy and regulatory requirements. Controls can be deployed to block privileged
accountaccess to application data and control sensitiveoperations insidethe databaseusingmulti -factor
authorization.Security of existingapplicationscan beincreased through anal ysisof privileges and roles.Oracle
DatabaseVaultsecures existingdatabaseenvironments transparently,eliminatingcostly and time consuming
application changes.OracleDatabaseVaultis a productenablingyou to conduct dynamic and flexible
communication controls aboutthe security of your database’s security and to make reports, which comes together
with OracleDatabaseand take an optional placein the databaseconfiguration.This property which operates at
the database’s kernel level is much more effective than the security applications applied by usingPLSQL. The
DatabaseVault, which is also used where the required security level per databaseis different,may be applied to
your single-instanceOracledatabaseand similarly,may be successfully used in the buildings of RAC architecture.
It may prevent even an access of a databasemanager to your critical data (such as creditcard,clientpersonal
information,accountdetails,personnel salary information,calculations,expenses and conversation details).
 It keeps your databasefrom any changes not authorized by you.
 It enables you to add a temporary controller or alter or trace itreal timely.
 DatabaseVault, which is a productof Oraclefamily,is configured,created and managed very easily,and
may be used by influencingthe performance of the system very inconsiderably.
 DatabaseVaultis a product which exists insidethe OracleDatabase,which may be configured by an easy
setup. It serves by sections of realm, command rule,factor, rulesets and reporting.
 OracleDatabaseVaultensures a very strongand safesetting to protect the applicationsand the data.
 OracleDatabasemay restrictauthorized users (SELECT ANY TABLE). It may even restrictthe rights of even
DBA users who have the most competent role.
 Any changes to be made on the objects at the database(alter,drop, truncate, and etc.) or in the data
content (insert, delete, update, and etc.) may be restricted, by determining how, when and by what
means they may be made.
 OracleDatabaseVaultprotects the existingdatabaseenvironment. Shutdown of any unwanted software
may be prevented. It may protect the databasefrom unwanted attacks.
 It may take the principleof DatabaseDuty separation.
2
 Controls for Privileged Accounts
Privileged databaseaccounts areone of the most commonly used pathways for gainingaccess to sensitive
applicationsdata in the database.Whiletheir broad and unrestricted access facilitates database
maintenance, the same access also creates a pointof attack for gainingaccess to largeamounts of data.
OracleDatabaseVaultRealms around application schemas,sensitivetables and stored procedures
providecontrols to prevent privileged accounts from being exploited by hackers and insiders to access
sensitiveapplication data.
Controls for Database Configuration
Among the more common auditfindings areunauthorized changes to databaseentitlements, includinggrants of
the DBA role, as well as new accounts and database objects.Preventing unauthorized changes to production
environments is importantnot only for security,but also for complianceas such changes can weaken security and
open doors to hackers,violatingprivacy and complianceregulations.OracleDatabaseVaultSQL Command
Controls allowcustomers to control operations insidethedatabase,includingcommands such as createtable,
truncate table, and create user. Various out-of-the-box factors such as IP address,authentication method, and
program name help implement multi-factor authorization to deter attacks leveragingstolen passwords.These
controls prevent accidental configuration changes and also preventhackers and malicious insiders fromtampering
with applications.
DB Vault Configuration Advices
Advice 1 : The relevant lineunder /var/opt/oracle/oratab mustbe smooth $ORACLE_HOME. Otherwise, Configure
Option button will be passivewhen dbca is operated.
Advice 2 : PASSWORD_VERIFY_FUNCTION in the default profilemust be NULL. Otherwise, ORA-29504 error will
appear.Solution Doc ID 1509963.1
Advice 3 : ORA-29504 error may appear in about 85 percent of configuration with DBCA. This error may be ignored
in 11g. It seems as edited in 12c. For solution: Doc ID 1509963.1)
Control of DB Vault Option
We enter sqlplus by sysdba,to control it.
Connected to: OracleDatabase11gEnterpriseEdition Release 11.2.0.3.0 - 64bit Production
We will seeno incomingtext related to Vault. If itwere configured,we would also see With the OracleLabel
Security, OracleDatabaseVaultoptions text.
3
We may benefit from the below described view for additional control.
SELECT * FROM V$OPTION WHERE PARAMETER = 'OracleDatabaseVault';
OracleDatabaseVault----- FALSE (that is,disabled )
Example:
Enabling of DB Vault Option for Oracle
STEP 1- Relevant Databaseis shutdown
SQL> shutdown immediate
STEP 2-Dbconsole (Enterprise Manager) is shutdown, if any
$ emctl stop dbconsole
STEP 3- Shutdown listener
lsnrctl stop listener
STEP 4- DB Vault Option is enabled for Oracle
cd $ORACLE_HOME/rdbms/lib
make -f ins_rdbms.mk dv_on lbac_on ioracle
COMMON NOTICE : When an option is enabled in Oraclebinary,choptcommand may also beused instead of
Make –f. Its configuration is described in the following Link
Example :
chopt enable lbac
Writingto /u01/app/oracle/product/11.2.0/dbhome_2/install/enable_lbac.log...
/usr/bin/make-f /u01/app/oracle/product/11.2.0/dbhome_2/rdbms/lib/ins_rdbms.mk lbac_on
ORACLE_HOME=/u01/app/oracle/product/11.2.0/dbhome_2
/usr/bin/make-f /u01/app/oracle/product/11.2.0/dbhome_2/rdbms/lib/ins_rdbms.mk ioracle
ORACLE_HOME=/u01/app/oracle/product/11.2.0/dbhome_2
chopt enable dv
4
Writingto /u01/app/oracle/product/11.2.0/dbhome_2/install/enable_dv.log...
/usr/bin/make-f /u01/app/oracle/product/11.2.0/dbhome_2/rdbms/lib/ins_rdbms.mk dv_on
ORACLE_HOME=/u01/app/oracle/product/11.2.0/dbhome_2
/usr/bin/make-f /u01/app/oracle/product/11.2.0/dbhome_2/rdbms/lib/ins_rdbms.mk ioracle
ORACLE_HOME=/u01/app/oracle/product/11.2.0/dbhome_2
STEP 5-Database and Listener must be opened and it must be checked whether DB Vault is enabled or not.
Sqlplus>startup;
SELECT * FROM V$OPTION WHERE PARAMETER = 'OracleDatabaseVault';OracleDatabase
Vault -- TRUE (that is,enabled)
When sqlplusisentered again, With the Oracle Label Security, Oracle Database Vault options will appear.
Example
It comes as selected in the configuration of OracleDatabaseVaultdatabase.DatabaseVaultmay either be selected
whileOracleis configured or activated after the configuration of Oracleinstance.In order to activateit after the
configuration of the Oracleinstance,DatabaseConfiguration Assistantmustbe operated by dbca command.
User/ password description isused for DatabaseVaultOwner and optionally for Account Manager (Entry is
recommended).
5
After the configuration ends,a browser is written in https://hostname(or host ip):port number/ and the Oracle
DatabaseVaultscreen is entered.
Datatabase Vault Duty Separation
The Duty Separation feature of OracleDatabaseVaultwill createthree different responsibilities such asthe
security administration on the database,the account management and the databaseadministration.
The Security Administrator (Security Administration),the responsibleperson for Security is also themanager of the
OracleDatabaseVault.S/he is responsiblefor all security operations atthe database.S/he may manage Realms,
command rules and factors and may operate DatabaseVault report, while s/he may not get access to the
application data.
The Account Manager (Account Management) may create, delete and change user accounts.
And the DatabaseAdministrator (DatabaseAdministration) hasdba functions such as backup/restoration,patch
application and performancemanagement.
6
Source : Oracle® Database Vault Administrator's Guide 11gRelease 2 (11.2)
http://docs.oracle.com/cd/E11882_01/server.112/e23090/dvdisabl.htm#BAJJCDGD

More Related Content

What's hot

Oracle Database 11g Product Family
Oracle Database 11g Product FamilyOracle Database 11g Product Family
Oracle Database 11g Product Family
N/A
 
Upgrade 11.2.0.1 gi crs to 11.2.0.2 in linux
Upgrade 11.2.0.1 gi crs to 11.2.0.2 in linuxUpgrade 11.2.0.1 gi crs to 11.2.0.2 in linux
Upgrade 11.2.0.1 gi crs to 11.2.0.2 in linux
maclean liu
 
Oracle12c Pluggable Database Hands On - TROUG 2014
Oracle12c Pluggable Database Hands On - TROUG 2014Oracle12c Pluggable Database Hands On - TROUG 2014
Oracle12c Pluggable Database Hands On - TROUG 2014
Özgür Umut Vurgun
 
Direct SGA access without SQL
Direct SGA access without SQLDirect SGA access without SQL
Direct SGA access without SQL
Kyle Hailey
 
Oracle 12c RAC On your laptop Step by Step Implementation Guide 1.0
Oracle 12c RAC On your laptop Step by Step Implementation Guide 1.0Oracle 12c RAC On your laptop Step by Step Implementation Guide 1.0
Oracle 12c RAC On your laptop Step by Step Implementation Guide 1.0
Yury Velikanov
 
Asm disk group migration from
Asm disk group migration from Asm disk group migration from
Asm disk group migration from
Anar Godjaev
 

What's hot (20)

12c (12.1) Database installation on Solaris 11(11.2)
12c (12.1) Database  installation on Solaris 11(11.2)12c (12.1) Database  installation on Solaris 11(11.2)
12c (12.1) Database installation on Solaris 11(11.2)
 
Oracle Database Management Basic 1
Oracle Database Management Basic 1Oracle Database Management Basic 1
Oracle Database Management Basic 1
 
Pluggable database 3
Pluggable database 3Pluggable database 3
Pluggable database 3
 
Oracle Database 11g Product Family
Oracle Database 11g Product FamilyOracle Database 11g Product Family
Oracle Database 11g Product Family
 
Upgrade 11.2.0.1 gi crs to 11.2.0.2 in linux
Upgrade 11.2.0.1 gi crs to 11.2.0.2 in linuxUpgrade 11.2.0.1 gi crs to 11.2.0.2 in linux
Upgrade 11.2.0.1 gi crs to 11.2.0.2 in linux
 
Oracle data guard configuration in 12c
Oracle data guard configuration in 12cOracle data guard configuration in 12c
Oracle data guard configuration in 12c
 
MySQL Monitoring 101
MySQL Monitoring 101MySQL Monitoring 101
MySQL Monitoring 101
 
آموزش مدیریت بانک اطلاعاتی اوراکل - بخش پانزدهم
آموزش مدیریت بانک اطلاعاتی اوراکل - بخش پانزدهمآموزش مدیریت بانک اطلاعاتی اوراکل - بخش پانزدهم
آموزش مدیریت بانک اطلاعاتی اوراکل - بخش پانزدهم
 
Oracle12c Pluggable Database Hands On - TROUG 2014
Oracle12c Pluggable Database Hands On - TROUG 2014Oracle12c Pluggable Database Hands On - TROUG 2014
Oracle12c Pluggable Database Hands On - TROUG 2014
 
Direct SGA access without SQL
Direct SGA access without SQLDirect SGA access without SQL
Direct SGA access without SQL
 
Webinar slides: The Holy Grail Webinar: Become a MySQL DBA - Database Perform...
Webinar slides: The Holy Grail Webinar: Become a MySQL DBA - Database Perform...Webinar slides: The Holy Grail Webinar: Become a MySQL DBA - Database Perform...
Webinar slides: The Holy Grail Webinar: Become a MySQL DBA - Database Perform...
 
Pluggable database tutorial 2
Pluggable database tutorial 2Pluggable database tutorial 2
Pluggable database tutorial 2
 
Install and upgrade Oracle grid infrastructure 12.1.0.2
Install and upgrade Oracle grid infrastructure 12.1.0.2Install and upgrade Oracle grid infrastructure 12.1.0.2
Install and upgrade Oracle grid infrastructure 12.1.0.2
 
Physical_Standby_Database_R12.2.4
Physical_Standby_Database_R12.2.4Physical_Standby_Database_R12.2.4
Physical_Standby_Database_R12.2.4
 
Oracle 12c RAC On your laptop Step by Step Implementation Guide 1.0
Oracle 12c RAC On your laptop Step by Step Implementation Guide 1.0Oracle 12c RAC On your laptop Step by Step Implementation Guide 1.0
Oracle 12c RAC On your laptop Step by Step Implementation Guide 1.0
 
Pluggable database tutorial
Pluggable database tutorialPluggable database tutorial
Pluggable database tutorial
 
MySQL for Oracle DBAs
MySQL for Oracle DBAsMySQL for Oracle DBAs
MySQL for Oracle DBAs
 
Asm disk group migration from
Asm disk group migration from Asm disk group migration from
Asm disk group migration from
 
Backup and Restore of database on 2-Node RAC
Backup and Restore of database on 2-Node RACBackup and Restore of database on 2-Node RAC
Backup and Restore of database on 2-Node RAC
 
Developing Information Schema Plugins
Developing Information Schema PluginsDeveloping Information Schema Plugins
Developing Information Schema Plugins
 

Similar to how to protect your sensitive data using oracle database vault

Security Multitenant
Security MultitenantSecurity Multitenant
Security Multitenant
Arush Jain
 
Dr3150012012202 1.getting started
Dr3150012012202 1.getting startedDr3150012012202 1.getting started
Dr3150012012202 1.getting started
Namgu Jeong
 
Data guard architecture
Data guard architectureData guard architecture
Data guard architecture
Vimlendu Kumar
 
1 ISACA JOURNAL VOLUME 1, 2012FeatureThe ability to r.docx
1 ISACA JOURNAL  VOLUME 1, 2012FeatureThe ability to r.docx1 ISACA JOURNAL  VOLUME 1, 2012FeatureThe ability to r.docx
1 ISACA JOURNAL VOLUME 1, 2012FeatureThe ability to r.docx
honey725342
 
Security Quick Tour
Security Quick TourSecurity Quick Tour
Security Quick Tour
Active Base
 

Similar to how to protect your sensitive data using oracle database vault (20)

Security Multitenant
Security MultitenantSecurity Multitenant
Security Multitenant
 
Database Performance Management in Cloud
Database Performance Management in CloudDatabase Performance Management in Cloud
Database Performance Management in Cloud
 
Dr3150012012202 1.getting started
Dr3150012012202 1.getting startedDr3150012012202 1.getting started
Dr3150012012202 1.getting started
 
Data guard architecture
Data guard architectureData guard architecture
Data guard architecture
 
oracle
oracleoracle
oracle
 
Migration to Oracle 12c Made Easy Using Replication Technology
Migration to Oracle 12c Made Easy Using Replication TechnologyMigration to Oracle 12c Made Easy Using Replication Technology
Migration to Oracle 12c Made Easy Using Replication Technology
 
High Availability And Oracle Data Guard 11g R2
High Availability And Oracle Data Guard 11g R2High Availability And Oracle Data Guard 11g R2
High Availability And Oracle Data Guard 11g R2
 
Oracle oracle database 11g product family
Oracle oracle database 11g product familyOracle oracle database 11g product family
Oracle oracle database 11g product family
 
Getting Most Out of Your Disaster Recovery Infrastructure Using Active Data G...
Getting Most Out of Your Disaster Recovery Infrastructure Using Active Data G...Getting Most Out of Your Disaster Recovery Infrastructure Using Active Data G...
Getting Most Out of Your Disaster Recovery Infrastructure Using Active Data G...
 
Disaster Recovery Infrastructure Whitepaper 2012
Disaster Recovery Infrastructure Whitepaper 2012Disaster Recovery Infrastructure Whitepaper 2012
Disaster Recovery Infrastructure Whitepaper 2012
 
Oracle plsql code refactoring - from anonymous block to stored procedure
Oracle plsql code refactoring - from anonymous block to stored procedureOracle plsql code refactoring - from anonymous block to stored procedure
Oracle plsql code refactoring - from anonymous block to stored procedure
 
Power point oracle db 12c
Power point oracle db 12cPower point oracle db 12c
Power point oracle db 12c
 
Data guard oracle
Data guard oracleData guard oracle
Data guard oracle
 
Introduction to Database Log Analysis
Introduction to Database Log AnalysisIntroduction to Database Log Analysis
Introduction to Database Log Analysis
 
8.1.6 newsecurity features
8.1.6 newsecurity features8.1.6 newsecurity features
8.1.6 newsecurity features
 
Využijte svou Oracle databázi naplno
Využijte svou Oracle databázi naplnoVyužijte svou Oracle databázi naplno
Využijte svou Oracle databázi naplno
 
Vault_KT.pptx
Vault_KT.pptxVault_KT.pptx
Vault_KT.pptx
 
1 ISACA JOURNAL VOLUME 1, 2012FeatureThe ability to r.docx
1 ISACA JOURNAL  VOLUME 1, 2012FeatureThe ability to r.docx1 ISACA JOURNAL  VOLUME 1, 2012FeatureThe ability to r.docx
1 ISACA JOURNAL VOLUME 1, 2012FeatureThe ability to r.docx
 
Security Quick Tour
Security Quick TourSecurity Quick Tour
Security Quick Tour
 
Data base Access Control a look at Fine grain Access method
Data base Access Control a look at Fine grain Access methodData base Access Control a look at Fine grain Access method
Data base Access Control a look at Fine grain Access method
 

More from Anar Godjaev

Database Vault / Verinin Güvenliği
Database Vault /  Verinin GüvenliğiDatabase Vault /  Verinin Güvenliği
Database Vault / Verinin Güvenliği
Anar Godjaev
 
Oracle Golden Gate
Oracle Golden GateOracle Golden Gate
Oracle Golden Gate
Anar Godjaev
 
Oracle 10g Database Server Kurulum
Oracle 10g Database Server KurulumOracle 10g Database Server Kurulum
Oracle 10g Database Server Kurulum
Anar Godjaev
 
DataPump ile Single Parititon Export
DataPump ile Single Parititon ExportDataPump ile Single Parititon Export
DataPump ile Single Parititon Export
Anar Godjaev
 
Redologlar ve Yöneti̇mi̇
Redologlar ve Yöneti̇mi̇Redologlar ve Yöneti̇mi̇
Redologlar ve Yöneti̇mi̇
Anar Godjaev
 
Veri̇tabani ve Kullanici Yöneti̇mi̇
Veri̇tabani ve Kullanici Yöneti̇mi̇Veri̇tabani ve Kullanici Yöneti̇mi̇
Veri̇tabani ve Kullanici Yöneti̇mi̇
Anar Godjaev
 
Instance ve Media Bozukluklarını Inceleme
Instance ve Media Bozukluklarını IncelemeInstance ve Media Bozukluklarını Inceleme
Instance ve Media Bozukluklarını Inceleme
Anar Godjaev
 
Conditional Control
Conditional ControlConditional Control
Conditional Control
Anar Godjaev
 
Audit Mekani̇zmasi
Audit Mekani̇zmasiAudit Mekani̇zmasi
Audit Mekani̇zmasi
Anar Godjaev
 
Backup and Recovery
Backup and RecoveryBackup and Recovery
Backup and Recovery
Anar Godjaev
 

More from Anar Godjaev (20)

Database Vault / Verinin Güvenliği
Database Vault /  Verinin GüvenliğiDatabase Vault /  Verinin Güvenliği
Database Vault / Verinin Güvenliği
 
Oracle Golden Gate
Oracle Golden GateOracle Golden Gate
Oracle Golden Gate
 
Oracle 10g Database Server Kurulum
Oracle 10g Database Server KurulumOracle 10g Database Server Kurulum
Oracle 10g Database Server Kurulum
 
DataPump ile Single Parititon Export
DataPump ile Single Parititon ExportDataPump ile Single Parititon Export
DataPump ile Single Parititon Export
 
Redologlar ve Yöneti̇mi̇
Redologlar ve Yöneti̇mi̇Redologlar ve Yöneti̇mi̇
Redologlar ve Yöneti̇mi̇
 
Contraints
ContraintsContraints
Contraints
 
Oracle SQL
Oracle SQLOracle SQL
Oracle SQL
 
Veri̇tabani ve Kullanici Yöneti̇mi̇
Veri̇tabani ve Kullanici Yöneti̇mi̇Veri̇tabani ve Kullanici Yöneti̇mi̇
Veri̇tabani ve Kullanici Yöneti̇mi̇
 
Instance ve Media Bozukluklarını Inceleme
Instance ve Media Bozukluklarını IncelemeInstance ve Media Bozukluklarını Inceleme
Instance ve Media Bozukluklarını Inceleme
 
Conditional Control
Conditional ControlConditional Control
Conditional Control
 
PL/SQL Blocks
PL/SQL BlocksPL/SQL Blocks
PL/SQL Blocks
 
Wait Interface
Wait InterfaceWait Interface
Wait Interface
 
Audit Mekani̇zmasi
Audit Mekani̇zmasiAudit Mekani̇zmasi
Audit Mekani̇zmasi
 
Tuning SGA
Tuning SGATuning SGA
Tuning SGA
 
Parallel Server
Parallel ServerParallel Server
Parallel Server
 
Table Partitions
Table PartitionsTable Partitions
Table Partitions
 
Backup and Recovery
Backup and RecoveryBackup and Recovery
Backup and Recovery
 
Memory Management
Memory ManagementMemory Management
Memory Management
 
LogMiner
LogMinerLogMiner
LogMiner
 
Undo Management
Undo ManagementUndo Management
Undo Management
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 

how to protect your sensitive data using oracle database vault

  • 1. 1 How to protect your sensitive data using Oracle Database Vault Any measures that should be taken for data security purposes should also beconsidered atthe databaselevel, similar to hardware,network and operation system levels. Generally,companies buy a firewall productand think that they have already solved the problems related to security. Researches show that despite it is possibleto take measures againstexternal attacks by the firewall products,no sufficientmeasures may be taken againstinternal attacks.In particular,no action related to protection of the data is executed on the server where the database operates. Taking into account that a user havingDBA authority will haveall typeauthority atthe databaseand may perform the same operations even when s/he gets connected from other computers, possiblesecurity gaps should be considered.Access of a databaseadmin to every data is as disadvantageous as him/her to connect from other computers and perform the same operations,and is even a security gap. OracleDatabaseVault,which is one of the security solutions of OracleDatabase,may be recommended as an application which may assistin solvingof the abovementioned problems. What is Oracle Database Vault? OracleDatabaseVaultprovides powerful security controls to help protect application data fromunauthorized access,and comply with privacy and regulatory requirements. Controls can be deployed to block privileged accountaccess to application data and control sensitiveoperations insidethe databaseusingmulti -factor authorization.Security of existingapplicationscan beincreased through anal ysisof privileges and roles.Oracle DatabaseVaultsecures existingdatabaseenvironments transparently,eliminatingcostly and time consuming application changes.OracleDatabaseVaultis a productenablingyou to conduct dynamic and flexible communication controls aboutthe security of your database’s security and to make reports, which comes together with OracleDatabaseand take an optional placein the databaseconfiguration.This property which operates at the database’s kernel level is much more effective than the security applications applied by usingPLSQL. The DatabaseVault, which is also used where the required security level per databaseis different,may be applied to your single-instanceOracledatabaseand similarly,may be successfully used in the buildings of RAC architecture. It may prevent even an access of a databasemanager to your critical data (such as creditcard,clientpersonal information,accountdetails,personnel salary information,calculations,expenses and conversation details).  It keeps your databasefrom any changes not authorized by you.  It enables you to add a temporary controller or alter or trace itreal timely.  DatabaseVault, which is a productof Oraclefamily,is configured,created and managed very easily,and may be used by influencingthe performance of the system very inconsiderably.  DatabaseVaultis a product which exists insidethe OracleDatabase,which may be configured by an easy setup. It serves by sections of realm, command rule,factor, rulesets and reporting.  OracleDatabaseVaultensures a very strongand safesetting to protect the applicationsand the data.  OracleDatabasemay restrictauthorized users (SELECT ANY TABLE). It may even restrictthe rights of even DBA users who have the most competent role.  Any changes to be made on the objects at the database(alter,drop, truncate, and etc.) or in the data content (insert, delete, update, and etc.) may be restricted, by determining how, when and by what means they may be made.  OracleDatabaseVaultprotects the existingdatabaseenvironment. Shutdown of any unwanted software may be prevented. It may protect the databasefrom unwanted attacks.  It may take the principleof DatabaseDuty separation.
  • 2. 2  Controls for Privileged Accounts Privileged databaseaccounts areone of the most commonly used pathways for gainingaccess to sensitive applicationsdata in the database.Whiletheir broad and unrestricted access facilitates database maintenance, the same access also creates a pointof attack for gainingaccess to largeamounts of data. OracleDatabaseVaultRealms around application schemas,sensitivetables and stored procedures providecontrols to prevent privileged accounts from being exploited by hackers and insiders to access sensitiveapplication data. Controls for Database Configuration Among the more common auditfindings areunauthorized changes to databaseentitlements, includinggrants of the DBA role, as well as new accounts and database objects.Preventing unauthorized changes to production environments is importantnot only for security,but also for complianceas such changes can weaken security and open doors to hackers,violatingprivacy and complianceregulations.OracleDatabaseVaultSQL Command Controls allowcustomers to control operations insidethedatabase,includingcommands such as createtable, truncate table, and create user. Various out-of-the-box factors such as IP address,authentication method, and program name help implement multi-factor authorization to deter attacks leveragingstolen passwords.These controls prevent accidental configuration changes and also preventhackers and malicious insiders fromtampering with applications. DB Vault Configuration Advices Advice 1 : The relevant lineunder /var/opt/oracle/oratab mustbe smooth $ORACLE_HOME. Otherwise, Configure Option button will be passivewhen dbca is operated. Advice 2 : PASSWORD_VERIFY_FUNCTION in the default profilemust be NULL. Otherwise, ORA-29504 error will appear.Solution Doc ID 1509963.1 Advice 3 : ORA-29504 error may appear in about 85 percent of configuration with DBCA. This error may be ignored in 11g. It seems as edited in 12c. For solution: Doc ID 1509963.1) Control of DB Vault Option We enter sqlplus by sysdba,to control it. Connected to: OracleDatabase11gEnterpriseEdition Release 11.2.0.3.0 - 64bit Production We will seeno incomingtext related to Vault. If itwere configured,we would also see With the OracleLabel Security, OracleDatabaseVaultoptions text.
  • 3. 3 We may benefit from the below described view for additional control. SELECT * FROM V$OPTION WHERE PARAMETER = 'OracleDatabaseVault'; OracleDatabaseVault----- FALSE (that is,disabled ) Example: Enabling of DB Vault Option for Oracle STEP 1- Relevant Databaseis shutdown SQL> shutdown immediate STEP 2-Dbconsole (Enterprise Manager) is shutdown, if any $ emctl stop dbconsole STEP 3- Shutdown listener lsnrctl stop listener STEP 4- DB Vault Option is enabled for Oracle cd $ORACLE_HOME/rdbms/lib make -f ins_rdbms.mk dv_on lbac_on ioracle COMMON NOTICE : When an option is enabled in Oraclebinary,choptcommand may also beused instead of Make –f. Its configuration is described in the following Link Example : chopt enable lbac Writingto /u01/app/oracle/product/11.2.0/dbhome_2/install/enable_lbac.log... /usr/bin/make-f /u01/app/oracle/product/11.2.0/dbhome_2/rdbms/lib/ins_rdbms.mk lbac_on ORACLE_HOME=/u01/app/oracle/product/11.2.0/dbhome_2 /usr/bin/make-f /u01/app/oracle/product/11.2.0/dbhome_2/rdbms/lib/ins_rdbms.mk ioracle ORACLE_HOME=/u01/app/oracle/product/11.2.0/dbhome_2 chopt enable dv
  • 4. 4 Writingto /u01/app/oracle/product/11.2.0/dbhome_2/install/enable_dv.log... /usr/bin/make-f /u01/app/oracle/product/11.2.0/dbhome_2/rdbms/lib/ins_rdbms.mk dv_on ORACLE_HOME=/u01/app/oracle/product/11.2.0/dbhome_2 /usr/bin/make-f /u01/app/oracle/product/11.2.0/dbhome_2/rdbms/lib/ins_rdbms.mk ioracle ORACLE_HOME=/u01/app/oracle/product/11.2.0/dbhome_2 STEP 5-Database and Listener must be opened and it must be checked whether DB Vault is enabled or not. Sqlplus>startup; SELECT * FROM V$OPTION WHERE PARAMETER = 'OracleDatabaseVault';OracleDatabase Vault -- TRUE (that is,enabled) When sqlplusisentered again, With the Oracle Label Security, Oracle Database Vault options will appear. Example It comes as selected in the configuration of OracleDatabaseVaultdatabase.DatabaseVaultmay either be selected whileOracleis configured or activated after the configuration of Oracleinstance.In order to activateit after the configuration of the Oracleinstance,DatabaseConfiguration Assistantmustbe operated by dbca command. User/ password description isused for DatabaseVaultOwner and optionally for Account Manager (Entry is recommended).
  • 5. 5 After the configuration ends,a browser is written in https://hostname(or host ip):port number/ and the Oracle DatabaseVaultscreen is entered. Datatabase Vault Duty Separation The Duty Separation feature of OracleDatabaseVaultwill createthree different responsibilities such asthe security administration on the database,the account management and the databaseadministration. The Security Administrator (Security Administration),the responsibleperson for Security is also themanager of the OracleDatabaseVault.S/he is responsiblefor all security operations atthe database.S/he may manage Realms, command rules and factors and may operate DatabaseVault report, while s/he may not get access to the application data. The Account Manager (Account Management) may create, delete and change user accounts. And the DatabaseAdministrator (DatabaseAdministration) hasdba functions such as backup/restoration,patch application and performancemanagement.
  • 6. 6 Source : Oracle® Database Vault Administrator's Guide 11gRelease 2 (11.2) http://docs.oracle.com/cd/E11882_01/server.112/e23090/dvdisabl.htm#BAJJCDGD