Upload
vineet
View
2
Download
0
Embed Size (px)
DESCRIPTION
ORACLE
Citation preview
Oracle University | Contact Us: Local: 1800 103 4775 Intl: +91 80 4108 4709
Implementing Oracle Database Firewall
Duration: 2 Days
What you will learnIn this course you will learn to configure an Oracle Database Firewall and an Oracle Database Firewall ManagementServer. You will learn to use enforcement points to deploy Database Firewall policies. You will use the Oracle DatabaseFirewall Administration Console, a Web browser-based application for configuring, managing, and monitoring thesystem. You will configure stored procedure auditing and user role auditing. The configuration and use of local andremote monitoring is discussed in this course. Additional topics include reporting, archiving data, and email alerts.You will use the Oracle Database Firewall Analyzer to create policies that the Oracle Database Firewall uses to block,alert, log or permit SQL statements. Learn To:Use Oracle Database Firewall to monitor and block unauthorized SQL traffic before it reaches the databaseCreate a defensive perimeter that helps prevent SQL injection, application bypass, and other malicious activity fromreaching the databaseCreate white-list, black-list, and exception-list based policies to protect databasesGenerate customized reports to comply with regulationsA Live Virtual Class (LVC) is exclusively for registered students; unregistered individuals may not view an LVC at anytime. Registered students must view the class from the country listed in the registration form. Unauthorized recording,copying, or transmission of LVC content may not be made.
AudienceDatabase AdministratorsNetwork AdministratorSecurity AdministratorsSecurity Compliance Professionals
PrerequisitesRequired PrerequisitesGeneral knowledge of SQL
General knowledge of networks
Course ObjectivesUnderstand how to Install Oracle Database Firewalls and Oracle Database Firewall Management ServerConfigure an Oracle Database Firewall and Oracle Database Firewall Management ServerConfigure data policies to protect databasesView predefined and generate customized summary, compliance, and audit reportsArchive dataConfigure stored procedure auditingConfigure user role auditingConfigure local monitoringConfigure remote monitoring
Copyright 2011, Oracle. All rights reserved. Page 1
Course Topics
Introduction to Oracle Database FirewallUnderstanding How Data is CompromisedUnderstanding Oracles Defense in Depth Security ApproachOracle Database Security SolutionsOracle Database Firewall (Overview)Positive Security Model-Based EnforcementNegative Security Model-Based EnforcementOracle Database Firewall ArchitectureProtected Databases
Installing Oracle Database FirewallInstallation Overview Installing Database Firewall and Database Firewall Management Server Logging in to the Administration Console Installing the Firewall AnalyzerDatabase Firewall Sizing
Configuring Oracle Database FirewallConfiguring a Standalone Oracle Database Firewall System Configuring an Oracle Database Firewall Management Server System Creating an Enforcement PointOracle Database Firewall Operational Modes (Database Activity Monitoring, Database Policy Enforcement)Oracle Database Firewall Logging Oracle Database Firewall LogsDetermining the Protection Level for your DatabasesConfiguring System Administrator Users
Configuring PoliciesOracle Database Firewall Policy EnforcementPolicy Engine FlowConfiguring PoliciesOracle Database Firewall Preconfigured Policies Creating Policy FilesCustom Policy Development OverviewEnabling the Firewall Analyzer to Understand Database Usage Creating a Policy
Creating Advanced Configuration PoliciesUsing Profiles Using a Novelty PolicyNovelty Policy ExampleCreating a Novelty Policy
ReportingOracle Database Firewall Reporting SystemUsing the Summary ReportsUsing the Summary Compliance ReportsUsing the Search Log FunctionUsing Search Log ResultsCreating Audit Reports
Copyright 2011, Oracle. All rights reserved. Page 2
Using the Search Log Results in Audit ReportsGenerating the Audit Report
Stored Procedure AuditingStored Procedure Auditing OverviewStored Procedure Auditing ArchitectureCreating Users and Setting Permissions for Stored Procedure AuditingEnabling Stored Procedure AuditingAuditing Changes to Stored Procedures
User Role AuditingUser Role Auditing OverviewUser Role Auditing ArchitectureCreating Users and Setting Permissions for User Role AuditingEnabling user Role AuditingAuditing Changes to User Roles
Configuring and Using Local MonitoringLocal Monitoring OverviewOracle Database Firewall Architecture:Local MonitoringInstalling Oracle Database Firewall Monitoring SoftwareInstalling Local monitoring in an Oracle DatabaseInstalling Local monitoring in a Microsoft SQL Server DatabaseInstalling Local monitoring in a Sybase ASE DatabaseEnabling Local Monitoring
Configuring and Using Remote MonitoringRemote Monitoring OverviewOracle Database Firewall Architecture: Remote MonitoringPrerequisites for Remote MonitoringConfiguring the Remote Monitor in the Administration ConsoleDownload the Configuration FileContents of the remote-agent.conf FIleExecuting the Remote Monitor ScriptVerifying that the Remote Monitor is Active
Additional System Management TasksArchiving DataConfiguring syslog LoggingDeleting Logs and History
Copyright 2011, Oracle. All rights reserved. Page 3