SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
Vision for future


                Oracle 11g Database Security
Course Overview:

In this course, students learn how they can use Oracle Database features to meet
the security, privacy and compliance requirements of their organization. The
current regulatory environment of the Sarbanes-Oxley Act, HIPAA, the UK Data
Protection Act, and others requires better security at the database level. Students
learn how to secure their database and how to use the database features that
enhance security. The course provides suggested architectures for common
problems. This course discusses the following security features of the database:
auditing, encryption for Payment Card Industry Data Security Standard (PCI DSS )
including encryption at the column, tablespace and file levels, Virtual Private
Database, Oracle Label Security and Enterprise User Security.

Program Requirements

This hands-on training course is designed for Oracle Database Administrators who
want to enhance their knowledge of security features in Oracle 11g. Participants
must have either completed the Oracle 11g Database Administration certificate
program or have equivalent knowledge.

Curriculum
Introduction to Database Security


• Fundamental Data Security Requirements
• Data Security Concerns
• Compliance Mandates
• Security Risks
• Developing Your Security Policy
• Defining a Security Policy


                     Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom.
                Tel : 048/9102897                 Customer Service : 0102502304
         Email : info@ideal-generation.com        Website: www.ideal-generation.com
Vision for future

• Implementing a Security Policy
• Techniques to Enforce Security
Choosing Security Solutions

• Maintaining Data Integrity
• Protecting Data
• Controlling Data Access
• Oracle Database Vault Overview
• Oracle Audit Vault Overview
• Combining Optional Security Features
• Compliance Scanner
• Enterprise Manager Database Control: Policy Trend

Basic Database Security


• Database Security Checklist
• Reducing Administrative Effort
• Applying Security Patches
• Default Security Settings
• Secure Password Support
• Enforcing Password Management
• Protecting the Data Dictionary
• System and Object Privileges

Auditing Database Users, Privileges, and Objects


• Monitoring for Suspicious Activity
• Standard Database Auditing
• Setting the AUDIT_TRAIL
• Specifying Audit Options
• Viewing Auditing Options
• Auditing the SYSDBA Users


                     Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom.
                Tel : 048/9102897                 Customer Service : 0102502304
         Email : info@ideal-generation.com        Website: www.ideal-generation.com
Vision for future

• Audit to XML Files
• Value-Based Auditing

Auditing DML Statements


• Fine-Grained Auditing (FGA)
• Using the DBMS_FGA Package
• FGA Policy
• Triggering Audit Events
• Data Dictionary Views
• DBA_FGA_AUDIT_TRAIL
• Enabling and Disabling an FGA Policy
• Maintaining the Audit Trail

Using Basic User Authentication


• User Authentication
• Protecting Passwords
• Creating Fixed Database Links
• Encrypting Database Link Passwords
• Using Database Links without Credentials
• Using Database Links and Changing Passwords
• Auditing with Database Links
• Restricting a Database Link with Views

Using Strong Authentication


• Strong Authentication
• Single Sign-On
• Public Key Infrastructure (PKI) Tools
• Configuring SSL on the Server
• Certificates
• Using the orapki Utility


                     Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom.
                Tel : 048/9102897                 Customer Service : 0102502304
         Email : info@ideal-generation.com        Website: www.ideal-generation.com
Vision for future

• Using Kerberos for Authentication
• Configuring the Wallet

Using Enterprise User Security


• Enterprise User Security
• Oracle Identity Management Infrastructure: Default Deployment
• Oracle Database: Enterprise User security Architecture
• Oracle Internet Directory Structure Overview
• Installing Oracle Application Server Infrastructure
• Managing Enterprise User Security
• Creating a Schema Mapping Object in the Directory
• Creating a Schema Mapping Object in the Directory

Using Proxy Authentication


• Security Challenges of Three-Tier Computing
• Common Implementations of Authentication
• Restricting the Privileges of the Middle Tier
• Authenticating Database and Enterprise Users
• Using Proxy authentication for Database Users
• Proxy Access Through SQL*Plus
• Revoking Proxy Authentication
• Data Dictionary Views for Proxy Authentication

Using Privileges and Roles


• Authorization
• Privileges
• Benefits of Roles
• CONNECT Role Privileges
• Using Proxy Authentication with Roles
• Creating an Enterprise Role


                     Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom.
                Tel : 048/9102897                 Customer Service : 0102502304
         Email : info@ideal-generation.com        Website: www.ideal-generation.com
Vision for future

• Securing Objects with Procedures
• Securing the Application Roles

Access Control


• Description of Application Context
• Using the Application Context
• Setting the Application Context
• Application Context Data Sources
• Using the SYS_CONTEXT PL/SQL Function
• PL/SQL Packages and Procedures
• Implementing the Application Context Accessed Globally
• Data Dictionary Views

Implementing Virtual Private Database


• Understanding Fine-Grained Access Control
• Virtual Private Database (VPD)
• How Fine-Grained Access Control Works
• Using DBMS_RLS
• Exceptions to Fine-Grained Access Control Policies
• Implementing a VPD Policy
• Implementing Policy Groups
• VPD Best Practices

Oracle Label Security Concepts


• Access Control: Overview
• Discretionary Access Control
• Oracle Label Security
• How Sensitivity Labels are Used
• Installing Oracle Label Security
• Oracle Label Security Features


                     Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom.
                 Tel : 048/9102897                Customer Service : 0102502304
         Email : info@ideal-generation.com        Website: www.ideal-generation.com
Vision for future

• Comparing Oracle Label Security and VPD
• Analyzing Application Needs

Implementing Oracle Label Security


• Implementing the Oracle Label Security Policy
• Creating Policies
• Defining Labels Overview
• Defining Compartments
• Identifying Data Labels
• Access Mediation
• Adding Labels to Data
• Assigning User Authorization Labels

Using the Data Masking Pack


• Understanding Data Masking
• Data Masking Pack Features
• Identifying Sensitive Data for Masking
• Types of Built-in Masking Primitives and Routines
• Data Masking of the EMPLOYEES Table
• Implementing a Post-Processing Function
• Viewing the Data Masking Impact Report
• Creating an Application Masking Template by Exporting Data Masking
Definitions

Encryption Concepts


• Understanding Encryption
• Problems that Encryption Solves
• Encryption is not Access Control
• What to Encrypt
• Data Encryption Challenges


                     Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom.
                Tel : 048/9102897                 Customer Service : 0102502304
         Email : info@ideal-generation.com        Website: www.ideal-generation.com
Vision for future

• Storing the Key in the Database
• Letting the User Manage the Key
• Storing the Key in the Operating System

Using Application-Based Encryption


• DBMS_CRYPTO Package Overview
• Using the DBMS_CRYPTO Package
• Generating Keys Using RANDOMBYTES
• Using ENCRYPT and DECRYPT
• Enhanced Security Using the Cipher Block           Modes
• Hash and Message Authentication Code

Applying Transparent Data Encryption


• Transparent Data Encryption (TDE)
• Creating the Master Key
• Opening the Wallet
• Using Auto Login Wallet
• Resetting (Rekeying) the Unified Master Encryption Key
• Using Hardware Security Modules
• TDE Column Encryption Support
• Creating an Encrypted Tablespace

Applying File Encryption


• RMAN Encrypted Backups
• Oracle Secure Backup Encryption
• Creating RMAN Encrypted Backups
• Using Password Mode Encryption
• Restoring Encrypted Backups
• Data Pump Encryption



                     Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom.
                Tel : 048/9102897                 Customer Service : 0102502304
         Email : info@ideal-generation.com        Website: www.ideal-generation.com
Vision for future

• Using Dual Mode Encryption
• Encrypting Dump Files

Oracle Net Services: Security Checklists


• Overview of Security Checklists
• Securing the Client Computer
• Configuring the Browser
• Network Security Checklist
• Using a Firewall to Restrict Network Access
• Restricting Network IP Addresses: Guidelines
• Configuring IP Restrictions with Oracle Net Manager
• Configuring Network Encryption

Securing the Listener


• Listener Security Checklist
• Restricting the Privileges of the Listener
• Moving the Listener to a Nondefault Port
• Preventing Online Administration of the Listener
• Using the INBOUND_CONNECT_TIMEOUT Parameter
• Analyzing Listener Log Files
• Administering the Listener Using TCP/IP with SSL
• Setting Listener Logging Parameters




                     Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom.
                 Tel : 048/9102897                Customer Service : 0102502304
         Email : info@ideal-generation.com        Website: www.ideal-generation.com

Weitere ähnliche Inhalte

Was ist angesagt?

Oracle Audit Vault Training | Audit Vault - Oracle Trainings
Oracle Audit Vault Training | Audit Vault - Oracle TrainingsOracle Audit Vault Training | Audit Vault - Oracle Trainings
Oracle Audit Vault Training | Audit Vault - Oracle TrainingsOracleTrainings
 
Ensuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the CloudEnsuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the CloudSuraj Mehta
 
Corous360 Corp profile and Games Cloud Infrastructure 2014 R1.1NEW
Corous360 Corp profile and Games Cloud Infrastructure 2014 R1.1NEWCorous360 Corp profile and Games Cloud Infrastructure 2014 R1.1NEW
Corous360 Corp profile and Games Cloud Infrastructure 2014 R1.1NEWStanley Tjia
 
Integrating security into the application development process
Integrating security into the application development processIntegrating security into the application development process
Integrating security into the application development processJerod Brennen
 
Data Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the CloudData Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the CloudSuraj Mehta
 
Geek Sync | Handling HIPAA Compliance with Your Data Access
Geek Sync | Handling HIPAA Compliance with Your Data AccessGeek Sync | Handling HIPAA Compliance with Your Data Access
Geek Sync | Handling HIPAA Compliance with Your Data AccessIDERA Software
 
Ensuring distributed accountability
Ensuring distributed accountabilityEnsuring distributed accountability
Ensuring distributed accountabilitySunkaraHariNarayana
 
Enterprise-class security with PostgreSQL - 1
Enterprise-class security with PostgreSQL - 1Enterprise-class security with PostgreSQL - 1
Enterprise-class security with PostgreSQL - 1Ashnikbiz
 
Enterprise-class security with PostgreSQL - 2
Enterprise-class security with PostgreSQL - 2Enterprise-class security with PostgreSQL - 2
Enterprise-class security with PostgreSQL - 2Ashnikbiz
 

Was ist angesagt? (11)

Oracle Audit Vault Training | Audit Vault - Oracle Trainings
Oracle Audit Vault Training | Audit Vault - Oracle TrainingsOracle Audit Vault Training | Audit Vault - Oracle Trainings
Oracle Audit Vault Training | Audit Vault - Oracle Trainings
 
Hadoop and Big Data Security
Hadoop and Big Data SecurityHadoop and Big Data Security
Hadoop and Big Data Security
 
Ensuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the CloudEnsuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the Cloud
 
CloudStorage_M.A.Acar
CloudStorage_M.A.AcarCloudStorage_M.A.Acar
CloudStorage_M.A.Acar
 
Corous360 Corp profile and Games Cloud Infrastructure 2014 R1.1NEW
Corous360 Corp profile and Games Cloud Infrastructure 2014 R1.1NEWCorous360 Corp profile and Games Cloud Infrastructure 2014 R1.1NEW
Corous360 Corp profile and Games Cloud Infrastructure 2014 R1.1NEW
 
Integrating security into the application development process
Integrating security into the application development processIntegrating security into the application development process
Integrating security into the application development process
 
Data Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the CloudData Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the Cloud
 
Geek Sync | Handling HIPAA Compliance with Your Data Access
Geek Sync | Handling HIPAA Compliance with Your Data AccessGeek Sync | Handling HIPAA Compliance with Your Data Access
Geek Sync | Handling HIPAA Compliance with Your Data Access
 
Ensuring distributed accountability
Ensuring distributed accountabilityEnsuring distributed accountability
Ensuring distributed accountability
 
Enterprise-class security with PostgreSQL - 1
Enterprise-class security with PostgreSQL - 1Enterprise-class security with PostgreSQL - 1
Enterprise-class security with PostgreSQL - 1
 
Enterprise-class security with PostgreSQL - 2
Enterprise-class security with PostgreSQL - 2Enterprise-class security with PostgreSQL - 2
Enterprise-class security with PostgreSQL - 2
 

Andere mochten auch

Red hat linux system administration
Red hat linux system administrationRed hat linux system administration
Red hat linux system administrationelshiekh1980
 
Web design diploma
Web design diplomaWeb design diploma
Web design diplomaelshiekh1980
 
Red hat linux networking and security administration
Red hat linux networking and security administrationRed hat linux networking and security administration
Red hat linux networking and security administrationelshiekh1980
 
Adavanced maintenance diploma
Adavanced maintenance diplomaAdavanced maintenance diploma
Adavanced maintenance diplomaelshiekh1980
 
Red hat linux essentials
Red hat linux essentialsRed hat linux essentials
Red hat linux essentialselshiekh1980
 
Database Vault / Verinin Güvenliği
Database Vault /  Verinin GüvenliğiDatabase Vault /  Verinin Güvenliği
Database Vault / Verinin GüvenliğiAnar Godjaev
 
how to protect your sensitive data using oracle database vault
how to protect your sensitive data using oracle database vaulthow to protect your sensitive data using oracle database vault
how to protect your sensitive data using oracle database vaultAnar Godjaev
 

Andere mochten auch (10)

Oracle Database Vault
Oracle Database VaultOracle Database Vault
Oracle Database Vault
 
Sql server 2005
Sql server 2005Sql server 2005
Sql server 2005
 
Red hat linux system administration
Red hat linux system administrationRed hat linux system administration
Red hat linux system administration
 
Web design diploma
Web design diplomaWeb design diploma
Web design diploma
 
Red hat linux networking and security administration
Red hat linux networking and security administrationRed hat linux networking and security administration
Red hat linux networking and security administration
 
Adavanced maintenance diploma
Adavanced maintenance diplomaAdavanced maintenance diploma
Adavanced maintenance diploma
 
Security+
Security+Security+
Security+
 
Red hat linux essentials
Red hat linux essentialsRed hat linux essentials
Red hat linux essentials
 
Database Vault / Verinin Güvenliği
Database Vault /  Verinin GüvenliğiDatabase Vault /  Verinin Güvenliği
Database Vault / Verinin Güvenliği
 
how to protect your sensitive data using oracle database vault
how to protect your sensitive data using oracle database vaulthow to protect your sensitive data using oracle database vault
how to protect your sensitive data using oracle database vault
 

Ähnlich wie Oracle 11g database security

MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...MongoDB
 
5. 2010 11-03 bucharest oracle-tech_day_security
5. 2010 11-03 bucharest oracle-tech_day_security5. 2010 11-03 bucharest oracle-tech_day_security
5. 2010 11-03 bucharest oracle-tech_day_securityDoina Draganescu
 
Presentation database security audit vault & database firewall
Presentation   database security audit vault & database firewallPresentation   database security audit vault & database firewall
Presentation database security audit vault & database firewallxKinAnx
 
dtechnClouologyassociatepart2
dtechnClouologyassociatepart2dtechnClouologyassociatepart2
dtechnClouologyassociatepart2Anne Starr
 
RightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the CloudRightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the CloudRightScale
 
Asug84339 how to secure privacy data in a hybrid s4 hana landscape
Asug84339   how to secure privacy data in a hybrid s4 hana landscapeAsug84339   how to secure privacy data in a hybrid s4 hana landscape
Asug84339 how to secure privacy data in a hybrid s4 hana landscapeDharma Atluri
 
gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2Anne Starr
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Mark Williams
 
Modern Data Security with MySQL
Modern Data Security with MySQLModern Data Security with MySQL
Modern Data Security with MySQLVittorio Cioe
 
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Trend Micro
 
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008Denny Lee
 
AWS Security Architecture - Overview
AWS Security Architecture - OverviewAWS Security Architecture - Overview
AWS Security Architecture - OverviewSai Kesavamatham
 
Tänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi TaraTänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi TaraORACLE USER GROUP ESTONIA
 
Database Security – Issues and Best PracticesOutline
Database Security – Issues and Best PracticesOutlineDatabase Security – Issues and Best PracticesOutline
Database Security – Issues and Best PracticesOutlineOllieShoresna
 
Centrify Access Manager Presentation.pptx
Centrify Access Manager Presentation.pptxCentrify Access Manager Presentation.pptx
Centrify Access Manager Presentation.pptxjohncenafls
 
Cloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving itCloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving itHentsū
 
Transforming cloud security into an advantage
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantageMoshe Ferber
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017Micro Focus
 
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Amazon Web Services
 
Block Chain audit-Cloud Data Storagequad merkle-1-1.pptx
Block Chain audit-Cloud Data Storagequad merkle-1-1.pptxBlock Chain audit-Cloud Data Storagequad merkle-1-1.pptx
Block Chain audit-Cloud Data Storagequad merkle-1-1.pptxPadmaNaban32
 

Ähnlich wie Oracle 11g database security (20)

MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
 
5. 2010 11-03 bucharest oracle-tech_day_security
5. 2010 11-03 bucharest oracle-tech_day_security5. 2010 11-03 bucharest oracle-tech_day_security
5. 2010 11-03 bucharest oracle-tech_day_security
 
Presentation database security audit vault & database firewall
Presentation   database security audit vault & database firewallPresentation   database security audit vault & database firewall
Presentation database security audit vault & database firewall
 
dtechnClouologyassociatepart2
dtechnClouologyassociatepart2dtechnClouologyassociatepart2
dtechnClouologyassociatepart2
 
RightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the CloudRightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the Cloud
 
Asug84339 how to secure privacy data in a hybrid s4 hana landscape
Asug84339   how to secure privacy data in a hybrid s4 hana landscapeAsug84339   how to secure privacy data in a hybrid s4 hana landscape
Asug84339 how to secure privacy data in a hybrid s4 hana landscape
 
gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
Modern Data Security with MySQL
Modern Data Security with MySQLModern Data Security with MySQL
Modern Data Security with MySQL
 
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012
 
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
 
AWS Security Architecture - Overview
AWS Security Architecture - OverviewAWS Security Architecture - Overview
AWS Security Architecture - Overview
 
Tänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi TaraTänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi Tara
 
Database Security – Issues and Best PracticesOutline
Database Security – Issues and Best PracticesOutlineDatabase Security – Issues and Best PracticesOutline
Database Security – Issues and Best PracticesOutline
 
Centrify Access Manager Presentation.pptx
Centrify Access Manager Presentation.pptxCentrify Access Manager Presentation.pptx
Centrify Access Manager Presentation.pptx
 
Cloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving itCloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving it
 
Transforming cloud security into an advantage
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantage
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
 
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012
 
Block Chain audit-Cloud Data Storagequad merkle-1-1.pptx
Block Chain audit-Cloud Data Storagequad merkle-1-1.pptxBlock Chain audit-Cloud Data Storagequad merkle-1-1.pptx
Block Chain audit-Cloud Data Storagequad merkle-1-1.pptx
 

Mehr von elshiekh1980

Mehr von elshiekh1980 (20)

Php
PhpPhp
Php
 
Oracle 11g with sql
Oracle 11g with sqlOracle 11g with sql
Oracle 11g with sql
 
Oracle 11g structured query language (sql)
Oracle 11g structured query language (sql)Oracle 11g structured query language (sql)
Oracle 11g structured query language (sql)
 
Oracle 11g rac administration
Oracle 11g rac administrationOracle 11g rac administration
Oracle 11g rac administration
 
Oracle 11g certified professional (ocp)
Oracle 11g certified professional (ocp)Oracle 11g certified professional (ocp)
Oracle 11g certified professional (ocp)
 
Oracle 11g certified associate (oca)
Oracle 11g certified associate (oca)Oracle 11g certified associate (oca)
Oracle 11g certified associate (oca)
 
N+
N+N+
N+
 
Mcse security
Mcse securityMcse security
Mcse security
 
Mcse messaging
Mcse messagingMcse messaging
Mcse messaging
 
Mcsa security
Mcsa securityMcsa security
Mcsa security
 
Mcitp server administrator 2008
Mcitp server administrator 2008Mcitp server administrator 2008
Mcitp server administrator 2008
 
Mcitp enterprise administrator 2008
Mcitp enterprise administrator 2008Mcitp enterprise administrator 2008
Mcitp enterprise administrator 2008
 
Maintenance
MaintenanceMaintenance
Maintenance
 
Jsp
JspJsp
Jsp
 
Java with android
Java with androidJava with android
Java with android
 
J2 se
J2 seJ2 se
J2 se
 
J2 se course outline
J2 se course outlineJ2 se course outline
J2 se course outline
 
Ic3
Ic3Ic3
Ic3
 
Graphic diploma
Graphic diplomaGraphic diploma
Graphic diploma
 
Cvoice
CvoiceCvoice
Cvoice
 

Kürzlich hochgeladen

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Kürzlich hochgeladen (20)

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Oracle 11g database security

  • 1. Vision for future Oracle 11g Database Security Course Overview: In this course, students learn how they can use Oracle Database features to meet the security, privacy and compliance requirements of their organization. The current regulatory environment of the Sarbanes-Oxley Act, HIPAA, the UK Data Protection Act, and others requires better security at the database level. Students learn how to secure their database and how to use the database features that enhance security. The course provides suggested architectures for common problems. This course discusses the following security features of the database: auditing, encryption for Payment Card Industry Data Security Standard (PCI DSS ) including encryption at the column, tablespace and file levels, Virtual Private Database, Oracle Label Security and Enterprise User Security. Program Requirements This hands-on training course is designed for Oracle Database Administrators who want to enhance their knowledge of security features in Oracle 11g. Participants must have either completed the Oracle 11g Database Administration certificate program or have equivalent knowledge. Curriculum Introduction to Database Security • Fundamental Data Security Requirements • Data Security Concerns • Compliance Mandates • Security Risks • Developing Your Security Policy • Defining a Security Policy Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom. Tel : 048/9102897 Customer Service : 0102502304 Email : info@ideal-generation.com Website: www.ideal-generation.com
  • 2. Vision for future • Implementing a Security Policy • Techniques to Enforce Security Choosing Security Solutions • Maintaining Data Integrity • Protecting Data • Controlling Data Access • Oracle Database Vault Overview • Oracle Audit Vault Overview • Combining Optional Security Features • Compliance Scanner • Enterprise Manager Database Control: Policy Trend Basic Database Security • Database Security Checklist • Reducing Administrative Effort • Applying Security Patches • Default Security Settings • Secure Password Support • Enforcing Password Management • Protecting the Data Dictionary • System and Object Privileges Auditing Database Users, Privileges, and Objects • Monitoring for Suspicious Activity • Standard Database Auditing • Setting the AUDIT_TRAIL • Specifying Audit Options • Viewing Auditing Options • Auditing the SYSDBA Users Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom. Tel : 048/9102897 Customer Service : 0102502304 Email : info@ideal-generation.com Website: www.ideal-generation.com
  • 3. Vision for future • Audit to XML Files • Value-Based Auditing Auditing DML Statements • Fine-Grained Auditing (FGA) • Using the DBMS_FGA Package • FGA Policy • Triggering Audit Events • Data Dictionary Views • DBA_FGA_AUDIT_TRAIL • Enabling and Disabling an FGA Policy • Maintaining the Audit Trail Using Basic User Authentication • User Authentication • Protecting Passwords • Creating Fixed Database Links • Encrypting Database Link Passwords • Using Database Links without Credentials • Using Database Links and Changing Passwords • Auditing with Database Links • Restricting a Database Link with Views Using Strong Authentication • Strong Authentication • Single Sign-On • Public Key Infrastructure (PKI) Tools • Configuring SSL on the Server • Certificates • Using the orapki Utility Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom. Tel : 048/9102897 Customer Service : 0102502304 Email : info@ideal-generation.com Website: www.ideal-generation.com
  • 4. Vision for future • Using Kerberos for Authentication • Configuring the Wallet Using Enterprise User Security • Enterprise User Security • Oracle Identity Management Infrastructure: Default Deployment • Oracle Database: Enterprise User security Architecture • Oracle Internet Directory Structure Overview • Installing Oracle Application Server Infrastructure • Managing Enterprise User Security • Creating a Schema Mapping Object in the Directory • Creating a Schema Mapping Object in the Directory Using Proxy Authentication • Security Challenges of Three-Tier Computing • Common Implementations of Authentication • Restricting the Privileges of the Middle Tier • Authenticating Database and Enterprise Users • Using Proxy authentication for Database Users • Proxy Access Through SQL*Plus • Revoking Proxy Authentication • Data Dictionary Views for Proxy Authentication Using Privileges and Roles • Authorization • Privileges • Benefits of Roles • CONNECT Role Privileges • Using Proxy Authentication with Roles • Creating an Enterprise Role Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom. Tel : 048/9102897 Customer Service : 0102502304 Email : info@ideal-generation.com Website: www.ideal-generation.com
  • 5. Vision for future • Securing Objects with Procedures • Securing the Application Roles Access Control • Description of Application Context • Using the Application Context • Setting the Application Context • Application Context Data Sources • Using the SYS_CONTEXT PL/SQL Function • PL/SQL Packages and Procedures • Implementing the Application Context Accessed Globally • Data Dictionary Views Implementing Virtual Private Database • Understanding Fine-Grained Access Control • Virtual Private Database (VPD) • How Fine-Grained Access Control Works • Using DBMS_RLS • Exceptions to Fine-Grained Access Control Policies • Implementing a VPD Policy • Implementing Policy Groups • VPD Best Practices Oracle Label Security Concepts • Access Control: Overview • Discretionary Access Control • Oracle Label Security • How Sensitivity Labels are Used • Installing Oracle Label Security • Oracle Label Security Features Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom. Tel : 048/9102897 Customer Service : 0102502304 Email : info@ideal-generation.com Website: www.ideal-generation.com
  • 6. Vision for future • Comparing Oracle Label Security and VPD • Analyzing Application Needs Implementing Oracle Label Security • Implementing the Oracle Label Security Policy • Creating Policies • Defining Labels Overview • Defining Compartments • Identifying Data Labels • Access Mediation • Adding Labels to Data • Assigning User Authorization Labels Using the Data Masking Pack • Understanding Data Masking • Data Masking Pack Features • Identifying Sensitive Data for Masking • Types of Built-in Masking Primitives and Routines • Data Masking of the EMPLOYEES Table • Implementing a Post-Processing Function • Viewing the Data Masking Impact Report • Creating an Application Masking Template by Exporting Data Masking Definitions Encryption Concepts • Understanding Encryption • Problems that Encryption Solves • Encryption is not Access Control • What to Encrypt • Data Encryption Challenges Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom. Tel : 048/9102897 Customer Service : 0102502304 Email : info@ideal-generation.com Website: www.ideal-generation.com
  • 7. Vision for future • Storing the Key in the Database • Letting the User Manage the Key • Storing the Key in the Operating System Using Application-Based Encryption • DBMS_CRYPTO Package Overview • Using the DBMS_CRYPTO Package • Generating Keys Using RANDOMBYTES • Using ENCRYPT and DECRYPT • Enhanced Security Using the Cipher Block Modes • Hash and Message Authentication Code Applying Transparent Data Encryption • Transparent Data Encryption (TDE) • Creating the Master Key • Opening the Wallet • Using Auto Login Wallet • Resetting (Rekeying) the Unified Master Encryption Key • Using Hardware Security Modules • TDE Column Encryption Support • Creating an Encrypted Tablespace Applying File Encryption • RMAN Encrypted Backups • Oracle Secure Backup Encryption • Creating RMAN Encrypted Backups • Using Password Mode Encryption • Restoring Encrypted Backups • Data Pump Encryption Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom. Tel : 048/9102897 Customer Service : 0102502304 Email : info@ideal-generation.com Website: www.ideal-generation.com
  • 8. Vision for future • Using Dual Mode Encryption • Encrypting Dump Files Oracle Net Services: Security Checklists • Overview of Security Checklists • Securing the Client Computer • Configuring the Browser • Network Security Checklist • Using a Firewall to Restrict Network Access • Restricting Network IP Addresses: Guidelines • Configuring IP Restrictions with Oracle Net Manager • Configuring Network Encryption Securing the Listener • Listener Security Checklist • Restricting the Privileges of the Listener • Moving the Listener to a Nondefault Port • Preventing Online Administration of the Listener • Using the INBOUND_CONNECT_TIMEOUT Parameter • Analyzing Listener Log Files • Administering the Listener Using TCP/IP with SSL • Setting Listener Logging Parameters Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom. Tel : 048/9102897 Customer Service : 0102502304 Email : info@ideal-generation.com Website: www.ideal-generation.com