Book description
Secure your Oracle Database 12c with this valuable Oracle support resource, featuring more than 100 solutions to the challenges of protecting your data
About This Book
- Explore and learn the new security features introduced in Oracle Database 12c, to successfully secure your sensitive data
- Learn how to identify which security strategy is right for your needs ? and how to apply it
- Each 'recipe' provides you with a single step-by-step solution, making this book a vital resource, delivering Oracle support in one accessible place
Who This Book Is For
This book is for DBAs, developers, and architects who are keen to know more about security in Oracle Database 12c. This book is best suited for beginners and intermediate-level database security practitioners. Basic knowledge of Oracle Database is expected, but no prior experience of securing a database is required.
What You Will Learn
- Analyze application privileges and reduce the attack surface
- Reduce the risk of data exposure by using Oracle Data Redaction and Virtual Private Database
- Control data access and integrity in your organization using the appropriate database feature or option
- Learn how to protect your databases against application bypasses
- Audit user activity using the new auditing architecture
- Restrict highly privileged users from accessing data
- Encrypt data in Oracle Database
- Work in a real-world environment where a multi-layer security strategy is applied
In Detail
Businesses around the world are paying much greater attention toward database security than they ever have before. Not only does the current regulatory environment require tight security, particularly when dealing with sensitive and personal data, data is also arguably a company's most valuable asset - why wouldn't you want to protect it in a secure and reliable database? Oracle Database lets you do exactly that. It's why it is one of the world's leading databases ? with a rich portfolio of features to protect data from contemporary vulnerabilities, it's the go-to database for many organizations.
Oracle Database 12c Security Cookbook helps DBAs, developers, and architects to better understand database security challenges. Let it guide you through the process of implementing appropriate security mechanisms, helping you to ensure you are taking proactive steps to keep your data safe. Featuring solutions for common security problems in the new Oracle Database 12c, with this book you can be confident about securing your database from a range of different threats and problems.
Style and approach
Each chapter explains the different aspects of security through a series of recipes. Each recipe presents instructions in a step-by-step manner, supported by explanations of the topic.
Table of contents
-
Oracle Database 12c Security Cookbook
- Oracle Database 12c Security Cookbook
- Credits
- About the Authors
- About the Reviewers
- www.PacktPub.com
- Preface
-
1. Basic Database Security
- Introduction
- Creating a password profile
- Creating password-authenticated users
- Changing a user's password
- Creating a user with the same credentials on another database
- Locking a user account
- Expiring a user's password
- Creating and using OS-authenticated users
- Creating and using proxy users
- Creating and using database roles
- The sysbackup privilege – how, when, and why should you use it?
- The syskm privilege – how, when, and why should you use it?
- The sysdg privilege – how, when, and why should you use it?
- 2. Security Considerations in Multitenant Environment
- 3. PL/SQL Security
- 4. Virtual Private Database
-
5. Data Redaction
- Introduction
- Creating a redaction policy when using full redaction
- Creating a redaction policy when using partial redaction
- Creating a redaction policy when using random redaction
- Creating a redaction policy when using regular expression redaction
- Using Oracle Enterprise Manager Cloud Control 12c to manage redaction policies
- Changing the function parameters for a specified column
- Add a column to the redaction policy
- Enabling, disabling, and dropping redaction policy
- Exempting users from data redaction policies
- 6. Transparent Sensitive Data Protection
-
7. Privilege Analysis
- Introduction
- Creating database analysis policy
- Creating role analysis policy
- Creating context analysis policy
- Creating combined analysis policy
- Starting and stopping privilege analysis
- Reporting on used system privileges
- Reporting on used object privileges
- Reporting on unused system privileges
- Reporting on unused object privileges
- How to revoke unused privileges
- Dropping the analysis
-
8. Transparent Data Encryption
- Introduction
- Configuring keystore location in sqlnet.ora
- Creating and opening the keystore
- Setting master encryption key in software keystore
- Column encryption - adding new encrypted column to table
- Column encryption - creating new table that has encrypted column(s)
- Using salt and MAC
- Column encryption - encrypting existing column
- Auto-login keystore
- Encrypting tablespace
- Rekeying
- Backup and Recovery
-
9. Database Vault
- Introduction
- Registering Database Vault
- Preventing users from exercising system privileges on schema objects
- Securing roles
- Preventing users from executing specific command on specific object
- Creating a rule set
- Creating a secure application role
- Using Database Vault to implement that administrators cannot view data
- Running Oracle Database Vault reports
- Disabling Database Vault
- Re-enabling Database Vault
-
10. Unified Auditing
- Introduction
- Enabling Unified Auditing mode
- Configuring whether loss of audit data is acceptable
- Which roles do you need to have to be able to create audit policies and to view audit data?
- Auditing RMAN operations
- Auditing Data Pump operations
- Auditing Database Vault operations
- Creating audit policies to audit privileges, actions and roles under specified conditions
- Enabling audit policy
- Finding information about audit policies and audited data
- Auditing application contexts
- Purging audit trail
- Disabling and dropping audit policies
- 11. Additional Topics
- 12. Appendix – Application Contexts
Product information
- Title: Oracle Database 12c Security Cookbook
- Author(s):
- Release date: June 2016
- Publisher(s): Packt Publishing
- ISBN: 9781782172123
You might also like
book
Oracle Database 12c Security
Best Practices for Comprehensive Oracle Database Security Written by renowned experts from Oracle's National Security Group, …
book
Oracle Database 12c Release 2 Multitenant
Master the Powerful Multitenant Features of Oracle Database 12c Govern a scalable, extensible, and highly available …
book
Oracle GoldenGate 11g Complete Cookbook
Dig deep into administering Oracle Goldengate 11g using this comprehensive cookbook. From the very basics of …
book
Oracle Database 12c DBA Handbook
The definitive reference for every Oracle DBA—completely updated for Oracle Database 12 c Oracle Database 12c …