Chapter 5. Beyond Privileges: Oracle Virtual Private Database

In this chapter we will cover:

  • Using session-based application contexts
  • Implementing row-level access policies
  • Using Oracle Enterprise Manager for managing VPD
  • Implementing column-level access policies
  • Implementing VPD-grouped policies
  • Granting exemptions from VPD policies

Introduction

Up until now we talked about physical data security concepts and various measures that can be taken to guard against physical data theft or the interception of data in transit over a network.

For example, we used different methods, such as encrypting data in transit using network encryption, the data at rest using DBMS_CRYPTO, and Transparent Data Encryption features.

Many threats can unexpectedly originate from ...

Get Oracle 11g Anti-hacker's Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.