36
Oracle Database Security Paul Needham, Senior Director, Product Management, Database Security

Oracle Database Security - · PDF fileOracle Maximum Security Architecture Oracle Audit Vault Oracle Database Firewall Applications Procurement HR Rebates Auditing Authorization Authentication

  • Upload
    trannhu

  • View
    254

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Oracle Database Security - · PDF fileOracle Maximum Security Architecture Oracle Audit Vault Oracle Database Firewall Applications Procurement HR Rebates Auditing Authorization Authentication

<Insert Picture Here>

Oracle Database Security

Paul Needham, Senior Director, Product Management, Database Security

Page 2: Oracle Database Security - · PDF fileOracle Maximum Security Architecture Oracle Audit Vault Oracle Database Firewall Applications Procurement HR Rebates Auditing Authorization Authentication

Target of Data Breaches2010 Data Breach

Investigations Report

Type Category % Breaches % Records

Database Server Servers & Applications 25% 92%Desktop Computer End-User Devices 21% 1%

2

Page 3: Oracle Database Security - · PDF fileOracle Maximum Security Architecture Oracle Audit Vault Oracle Database Firewall Applications Procurement HR Rebates Auditing Authorization Authentication

How do Database Breaches Occur?2010 Data Breach

Investigations Report

48% involved privilege misuse

40% resulted from hacking

38% utilized malware

28% employed social tactics

15% comprised physical attacks

3

Page 4: Oracle Database Security - · PDF fileOracle Maximum Security Architecture Oracle Audit Vault Oracle Database Firewall Applications Procurement HR Rebates Auditing Authorization Authentication

Oracle Maximum Security Architecture

Oracle Audit Vault

Oracle Database Firewall

Applications

Procurement

HR

Rebates

HR

Rebates

Auditing

Authorization

Authentication

Sensitive

Confidential

Public

Multi-factor Authorization

DB Consolidation Security

Unauthorized DBA Activity

Oracle Database Vault

Encrypted Database Encrypted Traffic

Oracle Advanced Security Oracle Data MaskingMask For Test and Dev

Enterprise Manager Grid Control

Secure Configuration

Scanning

Patch Management

4

Page 5: Oracle Database Security - · PDF fileOracle Maximum Security Architecture Oracle Audit Vault Oracle Database Firewall Applications Procurement HR Rebates Auditing Authorization Authentication

Database Defense-in-Depth

• Oracle Advanced Security

• Oracle Secure Backup

• Oracle Data Masking

Encryption and Masking

5

Access Control

• Oracle Database Vault

• Oracle Label Security

Auditing and Tracking

• Oracle Audit Vault

• Oracle Configuration Management

• Oracle Total Recall

• Oracle Database Firewall

Monitoring and Blocking

Page 6: Oracle Database Security - · PDF fileOracle Maximum Security Architecture Oracle Audit Vault Oracle Database Firewall Applications Procurement HR Rebates Auditing Authorization Authentication

Database Defense-in-Depth

• Oracle Database Firewall

Blocking and Monitoring

6

Page 7: Oracle Database Security - · PDF fileOracle Maximum Security Architecture Oracle Audit Vault Oracle Database Firewall Applications Procurement HR Rebates Auditing Authorization Authentication

• Monitor database activity to help prevent unauthorized activity, application bypass and SQL injections

• Highly accurate SQL grammar based analysis

• White-list, black-list, and exception-list based security policies

• Built-in and custom compliance reports for regulations

PoliciesBuilt-in

ReportsAlerts

Custom

Reports

ApplicationsBlock

Log

Allow

Alert

Substitute

Oracle Database FirewallFirst Line of Defense

7

Page 8: Oracle Database Security - · PDF fileOracle Maximum Security Architecture Oracle Audit Vault Oracle Database Firewall Applications Procurement HR Rebates Auditing Authorization Authentication

Oracle Database FirewallPositive Security Model Based Enforcement

• White-list based policies enforce normal or expected behavior

• Policies evaluate factors such as time, day, network, and application

• Easily generate white-lists for any application

• Out of policy SQL statements can be logged, alerted, blocked or substituted with a harmless SQL statement

• SQL substitution foils attackers without disrupting applications

White List

ApplicationsBlock

Allow

8

Page 9: Oracle Database Security - · PDF fileOracle Maximum Security Architecture Oracle Audit Vault Oracle Database Firewall Applications Procurement HR Rebates Auditing Authorization Authentication

Oracle Database FirewallNegative Security Model Based Enforcement

• Stop specific unwanted SQL commands, user, or schema access

• Prevent privilege or role escalation and unauthorized access to sensitive data

• Black list policies can evaluate factors such as day, time, network, and application

Block

Allow

Black List

Applications

9

Page 10: Oracle Database Security - · PDF fileOracle Maximum Security Architecture Oracle Audit Vault Oracle Database Firewall Applications Procurement HR Rebates Auditing Authorization Authentication

Block

Log

Allow

Alert

Substitute

• Innovative SQL grammar technology reduces millions of SQL statements into a small number of SQL characteristics or ―clusters‖

• Flexible enforcement at SQL level: block, substitute, alert and pass, log only

• SQL substitution foils attackers without disrupting applications

• Centralized policy management and reporting

• Superior performance and policy scalability

SELECT * FROM accounts

Becomes

SELECT * FROM dual where 1=0

Oracle Database FirewallScalable and Safe Policy Enforcement

Applications

10

Page 11: Oracle Database Security - · PDF fileOracle Maximum Security Architecture Oracle Audit Vault Oracle Database Firewall Applications Procurement HR Rebates Auditing Authorization Authentication

11

Page 12: Oracle Database Security - · PDF fileOracle Maximum Security Architecture Oracle Audit Vault Oracle Database Firewall Applications Procurement HR Rebates Auditing Authorization Authentication

12

Page 13: Oracle Database Security - · PDF fileOracle Maximum Security Architecture Oracle Audit Vault Oracle Database Firewall Applications Procurement HR Rebates Auditing Authorization Authentication

13

Page 14: Oracle Database Security - · PDF fileOracle Maximum Security Architecture Oracle Audit Vault Oracle Database Firewall Applications Procurement HR Rebates Auditing Authorization Authentication

14

Page 15: Oracle Database Security - · PDF fileOracle Maximum Security Architecture Oracle Audit Vault Oracle Database Firewall Applications Procurement HR Rebates Auditing Authorization Authentication

15

Page 16: Oracle Database Security - · PDF fileOracle Maximum Security Architecture Oracle Audit Vault Oracle Database Firewall Applications Procurement HR Rebates Auditing Authorization Authentication

Database Defense-in-Depth

Auditing and Tracking

• Oracle Audit Vault

• Oracle Configuration Management

• Oracle Total Recall

• Oracle Database Firewall

Monitoring and Blocking

16

Page 17: Oracle Database Security - · PDF fileOracle Maximum Security Architecture Oracle Audit Vault Oracle Database Firewall Applications Procurement HR Rebates Auditing Authorization Authentication

17

Oracle Audit VaultAutomated Activity Monitoring & Audit Reporting

• Consolidate audit data into secure repository

• Detect and alert on suspicious activities

• Out-of-the box compliance reporting

• Centralized audit policy management

CRM Data

ERP Data

Databases

HR Data

Audit Data

Policies

Built-inReports

Alerts

CustomReports

!

Auditor

Page 18: Oracle Database Security - · PDF fileOracle Maximum Security Architecture Oracle Audit Vault Oracle Database Firewall Applications Procurement HR Rebates Auditing Authorization Authentication

18

Page 19: Oracle Database Security - · PDF fileOracle Maximum Security Architecture Oracle Audit Vault Oracle Database Firewall Applications Procurement HR Rebates Auditing Authorization Authentication

19

Page 20: Oracle Database Security - · PDF fileOracle Maximum Security Architecture Oracle Audit Vault Oracle Database Firewall Applications Procurement HR Rebates Auditing Authorization Authentication

20

Page 21: Oracle Database Security - · PDF fileOracle Maximum Security Architecture Oracle Audit Vault Oracle Database Firewall Applications Procurement HR Rebates Auditing Authorization Authentication

Database Defense-in-Depth

Access Control

• Oracle Database Vault

• Oracle Label Security

21

Auditing and Tracking

• Oracle Audit Vault

• Oracle Configuration Management

• Oracle Total Recall

• Oracle Database Firewall

Monitoring and Blocking

Page 22: Oracle Database Security - · PDF fileOracle Maximum Security Architecture Oracle Audit Vault Oracle Database Firewall Applications Procurement HR Rebates Auditing Authorization Authentication

22

Oracle Database VaultPrivileged Account Controls

• Limit access of privileged accounts

• No application changes required

• Works with Oracle Exadata Database Machine

• Protect application data and prevent application

by-pass

Procurement

HR

Finance

Application

select * from finance.customers

DBA

Page 23: Oracle Database Security - · PDF fileOracle Maximum Security Architecture Oracle Audit Vault Oracle Database Firewall Applications Procurement HR Rebates Auditing Authorization Authentication
Page 24: Oracle Database Security - · PDF fileOracle Maximum Security Architecture Oracle Audit Vault Oracle Database Firewall Applications Procurement HR Rebates Auditing Authorization Authentication

Step 2. Adding Protected Schema

24

Page 25: Oracle Database Security - · PDF fileOracle Maximum Security Architecture Oracle Audit Vault Oracle Database Firewall Applications Procurement HR Rebates Auditing Authorization Authentication
Page 26: Oracle Database Security - · PDF fileOracle Maximum Security Architecture Oracle Audit Vault Oracle Database Firewall Applications Procurement HR Rebates Auditing Authorization Authentication
Page 27: Oracle Database Security - · PDF fileOracle Maximum Security Architecture Oracle Audit Vault Oracle Database Firewall Applications Procurement HR Rebates Auditing Authorization Authentication

Database Defense-in-Depth

• Oracle Advanced Security

• Oracle Secure Backup

• Oracle Data Masking

Encryption and Masking

27

Access Control

• Oracle Database Vault

• Oracle Label Security

Auditing and Tracking

• Oracle Audit Vault

• Oracle Configuration Management

• Oracle Total Recall

• Oracle Database Firewall

Monitoring and Blocking

Page 28: Oracle Database Security - · PDF fileOracle Maximum Security Architecture Oracle Audit Vault Oracle Database Firewall Applications Procurement HR Rebates Auditing Authorization Authentication

28

Oracle Advanced SecurityTransparent Data Encryption

Disk

Backups

Exports

Off-Site

Facilities

• No application changes required

• Efficient encryption of all application data

• Built-in key lifecycle management

• Works with Exadata V2 Smart Scans

• Works with Oracle Advanced Compression

Application

Page 29: Oracle Database Security - · PDF fileOracle Maximum Security Architecture Oracle Audit Vault Oracle Database Firewall Applications Procurement HR Rebates Auditing Authorization Authentication
Page 30: Oracle Database Security - · PDF fileOracle Maximum Security Architecture Oracle Audit Vault Oracle Database Firewall Applications Procurement HR Rebates Auditing Authorization Authentication
Page 31: Oracle Database Security - · PDF fileOracle Maximum Security Architecture Oracle Audit Vault Oracle Database Firewall Applications Procurement HR Rebates Auditing Authorization Authentication

31

Oracle Data MaskingIrreversible De-Identification

• Remove sensitive data from non-production databases

• Referential integrity preserved so applications continue to work

• Extensible template library and policies for automation

LAST_NAME SSN SALARY

ANSKEKSL 111—23-1111 40,000

BKJHHEIEDK 222-34-1345 60,000

LAST_NAME SSN SALARY

AGUILAR 203-33-3234 40,000

BENSON 323-22-2943 60,000

Production Non-Production

Page 32: Oracle Database Security - · PDF fileOracle Maximum Security Architecture Oracle Audit Vault Oracle Database Firewall Applications Procurement HR Rebates Auditing Authorization Authentication

Oracle Database Security Products

Heterogeneous Oracle Databases

Oracle Database Firewall

Oracle Audit Vault

Oracle Data Masking

Oracle Advanced Security

Oracle Database Vault

Oracle Label Security

Oracle Configuration Management

32

Page 33: Oracle Database Security - · PDF fileOracle Maximum Security Architecture Oracle Audit Vault Oracle Database Firewall Applications Procurement HR Rebates Auditing Authorization Authentication

• Database Vault

• Label Security

• Identity Management

• Advanced Security

• Secure Backup

• Data Masking

Oracle Database Security SolutionsInside. Outside. Complete.

• Audit Vault

• Total Recall

• Configuration Management

Encryption & Masking

AccessControl

Auditing

& Tracking

• Database Firewall

Monitoring & Blocking

• Preventive and detective controls within the Oracle database

• Database Firewall to prevent threats from reaching databases

• Transparent – no changes to existing applications

• Complete integrated solutions for lower TCO

33

Page 34: Oracle Database Security - · PDF fileOracle Maximum Security Architecture Oracle Audit Vault Oracle Database Firewall Applications Procurement HR Rebates Auditing Authorization Authentication

For More Information

oracle.com/database/security

search.oracle.com

database security

Page 35: Oracle Database Security - · PDF fileOracle Maximum Security Architecture Oracle Audit Vault Oracle Database Firewall Applications Procurement HR Rebates Auditing Authorization Authentication
Page 36: Oracle Database Security - · PDF fileOracle Maximum Security Architecture Oracle Audit Vault Oracle Database Firewall Applications Procurement HR Rebates Auditing Authorization Authentication