oracle database security - · pdf fileoracle database security paul needham, senior director,...

36
Oracle Database Security Paul Needham, Senior Director, Product Management, Database Security

Upload: vodang

Post on 06-Feb-2018

223 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Oracle Database Security - · PDF fileOracle Database Security Paul Needham, Senior Director, Product Management, Database Security. Target of Data Breaches ... Oracle Database Vault

<Insert Picture Here>

Oracle Database Security

Paul Needham, Senior Director, Product Management, Database Security

Page 2: Oracle Database Security - · PDF fileOracle Database Security Paul Needham, Senior Director, Product Management, Database Security. Target of Data Breaches ... Oracle Database Vault

Target of Data Breaches2010 Data Breach

Investigations Report

Type Category % Breaches % Records

Database Server Servers & Applications 25% 92%Desktop Computer End-User Devices 21% 1%

2

Page 3: Oracle Database Security - · PDF fileOracle Database Security Paul Needham, Senior Director, Product Management, Database Security. Target of Data Breaches ... Oracle Database Vault

How do Database Breaches Occur?2010 Data Breach

Investigations Report

48% involved privilege misuse

40% resulted from hacking

38% utilized malware

28% employed social tactics

15% comprised physical attacks

3

Page 4: Oracle Database Security - · PDF fileOracle Database Security Paul Needham, Senior Director, Product Management, Database Security. Target of Data Breaches ... Oracle Database Vault

Oracle Maximum Security Architecture

Oracle Audit Vault

Oracle Database Firewall

Applications

Procurement

HR

Rebates

HR

Rebates

Auditing

Authorization

Authentication

Sensitive

Confidential

Public

Multi-factor Authorization

DB Consolidation Security

Unauthorized DBA Activity

Oracle Database Vault

Encrypted Database Encrypted Traffic

Oracle Advanced Security Oracle Data MaskingMask For Test and Dev

Enterprise Manager Grid Control

Secure Configuration

Scanning

Patch Management

4

Page 5: Oracle Database Security - · PDF fileOracle Database Security Paul Needham, Senior Director, Product Management, Database Security. Target of Data Breaches ... Oracle Database Vault

Database Defense-in-Depth

• Oracle Advanced Security

• Oracle Secure Backup

• Oracle Data Masking

Encryption and Masking

5

Access Control

• Oracle Database Vault

• Oracle Label Security

Auditing and Tracking

• Oracle Audit Vault

• Oracle Configuration Management

• Oracle Total Recall

• Oracle Database Firewall

Monitoring and Blocking

Page 6: Oracle Database Security - · PDF fileOracle Database Security Paul Needham, Senior Director, Product Management, Database Security. Target of Data Breaches ... Oracle Database Vault

Database Defense-in-Depth

• Oracle Database Firewall

Blocking and Monitoring

6

Page 7: Oracle Database Security - · PDF fileOracle Database Security Paul Needham, Senior Director, Product Management, Database Security. Target of Data Breaches ... Oracle Database Vault

• Monitor database activity to help prevent unauthorized activity, application bypass and SQL injections

• Highly accurate SQL grammar based analysis

• White-list, black-list, and exception-list based security policies

• Built-in and custom compliance reports for regulations

PoliciesBuilt-in

ReportsAlerts

Custom

Reports

ApplicationsBlock

Log

Allow

Alert

Substitute

Oracle Database FirewallFirst Line of Defense

7

Page 8: Oracle Database Security - · PDF fileOracle Database Security Paul Needham, Senior Director, Product Management, Database Security. Target of Data Breaches ... Oracle Database Vault

Oracle Database FirewallPositive Security Model Based Enforcement

• White-list based policies enforce normal or expected behavior

• Policies evaluate factors such as time, day, network, and application

• Easily generate white-lists for any application

• Out of policy SQL statements can be logged, alerted, blocked or substituted with a harmless SQL statement

• SQL substitution foils attackers without disrupting applications

White List

ApplicationsBlock

Allow

8

Page 9: Oracle Database Security - · PDF fileOracle Database Security Paul Needham, Senior Director, Product Management, Database Security. Target of Data Breaches ... Oracle Database Vault

Oracle Database FirewallNegative Security Model Based Enforcement

• Stop specific unwanted SQL commands, user, or schema access

• Prevent privilege or role escalation and unauthorized access to sensitive data

• Black list policies can evaluate factors such as day, time, network, and application

Block

Allow

Black List

Applications

9

Page 10: Oracle Database Security - · PDF fileOracle Database Security Paul Needham, Senior Director, Product Management, Database Security. Target of Data Breaches ... Oracle Database Vault

Block

Log

Allow

Alert

Substitute

• Innovative SQL grammar technology reduces millions of SQL statements into a small number of SQL characteristics or ―clusters‖

• Flexible enforcement at SQL level: block, substitute, alert and pass, log only

• SQL substitution foils attackers without disrupting applications

• Centralized policy management and reporting

• Superior performance and policy scalability

SELECT * FROM accounts

Becomes

SELECT * FROM dual where 1=0

Oracle Database FirewallScalable and Safe Policy Enforcement

Applications

10

Page 11: Oracle Database Security - · PDF fileOracle Database Security Paul Needham, Senior Director, Product Management, Database Security. Target of Data Breaches ... Oracle Database Vault

11

Page 12: Oracle Database Security - · PDF fileOracle Database Security Paul Needham, Senior Director, Product Management, Database Security. Target of Data Breaches ... Oracle Database Vault

12

Page 13: Oracle Database Security - · PDF fileOracle Database Security Paul Needham, Senior Director, Product Management, Database Security. Target of Data Breaches ... Oracle Database Vault

13

Page 14: Oracle Database Security - · PDF fileOracle Database Security Paul Needham, Senior Director, Product Management, Database Security. Target of Data Breaches ... Oracle Database Vault

14

Page 15: Oracle Database Security - · PDF fileOracle Database Security Paul Needham, Senior Director, Product Management, Database Security. Target of Data Breaches ... Oracle Database Vault

15

Page 16: Oracle Database Security - · PDF fileOracle Database Security Paul Needham, Senior Director, Product Management, Database Security. Target of Data Breaches ... Oracle Database Vault

Database Defense-in-Depth

Auditing and Tracking

• Oracle Audit Vault

• Oracle Configuration Management

• Oracle Total Recall

• Oracle Database Firewall

Monitoring and Blocking

16

Page 17: Oracle Database Security - · PDF fileOracle Database Security Paul Needham, Senior Director, Product Management, Database Security. Target of Data Breaches ... Oracle Database Vault

17

Oracle Audit VaultAutomated Activity Monitoring & Audit Reporting

• Consolidate audit data into secure repository

• Detect and alert on suspicious activities

• Out-of-the box compliance reporting

• Centralized audit policy management

CRM Data

ERP Data

Databases

HR Data

Audit Data

Policies

Built-inReports

Alerts

CustomReports

!

Auditor

Page 18: Oracle Database Security - · PDF fileOracle Database Security Paul Needham, Senior Director, Product Management, Database Security. Target of Data Breaches ... Oracle Database Vault

18

Page 19: Oracle Database Security - · PDF fileOracle Database Security Paul Needham, Senior Director, Product Management, Database Security. Target of Data Breaches ... Oracle Database Vault

19

Page 20: Oracle Database Security - · PDF fileOracle Database Security Paul Needham, Senior Director, Product Management, Database Security. Target of Data Breaches ... Oracle Database Vault

20

Page 21: Oracle Database Security - · PDF fileOracle Database Security Paul Needham, Senior Director, Product Management, Database Security. Target of Data Breaches ... Oracle Database Vault

Database Defense-in-Depth

Access Control

• Oracle Database Vault

• Oracle Label Security

21

Auditing and Tracking

• Oracle Audit Vault

• Oracle Configuration Management

• Oracle Total Recall

• Oracle Database Firewall

Monitoring and Blocking

Page 22: Oracle Database Security - · PDF fileOracle Database Security Paul Needham, Senior Director, Product Management, Database Security. Target of Data Breaches ... Oracle Database Vault

22

Oracle Database VaultPrivileged Account Controls

• Limit access of privileged accounts

• No application changes required

• Works with Oracle Exadata Database Machine

• Protect application data and prevent application

by-pass

Procurement

HR

Finance

Application

select * from finance.customers

DBA

Page 23: Oracle Database Security - · PDF fileOracle Database Security Paul Needham, Senior Director, Product Management, Database Security. Target of Data Breaches ... Oracle Database Vault
Page 24: Oracle Database Security - · PDF fileOracle Database Security Paul Needham, Senior Director, Product Management, Database Security. Target of Data Breaches ... Oracle Database Vault

Step 2. Adding Protected Schema

24

Page 25: Oracle Database Security - · PDF fileOracle Database Security Paul Needham, Senior Director, Product Management, Database Security. Target of Data Breaches ... Oracle Database Vault
Page 26: Oracle Database Security - · PDF fileOracle Database Security Paul Needham, Senior Director, Product Management, Database Security. Target of Data Breaches ... Oracle Database Vault
Page 27: Oracle Database Security - · PDF fileOracle Database Security Paul Needham, Senior Director, Product Management, Database Security. Target of Data Breaches ... Oracle Database Vault

Database Defense-in-Depth

• Oracle Advanced Security

• Oracle Secure Backup

• Oracle Data Masking

Encryption and Masking

27

Access Control

• Oracle Database Vault

• Oracle Label Security

Auditing and Tracking

• Oracle Audit Vault

• Oracle Configuration Management

• Oracle Total Recall

• Oracle Database Firewall

Monitoring and Blocking

Page 28: Oracle Database Security - · PDF fileOracle Database Security Paul Needham, Senior Director, Product Management, Database Security. Target of Data Breaches ... Oracle Database Vault

28

Oracle Advanced SecurityTransparent Data Encryption

Disk

Backups

Exports

Off-Site

Facilities

• No application changes required

• Efficient encryption of all application data

• Built-in key lifecycle management

• Works with Exadata V2 Smart Scans

• Works with Oracle Advanced Compression

Application

Page 29: Oracle Database Security - · PDF fileOracle Database Security Paul Needham, Senior Director, Product Management, Database Security. Target of Data Breaches ... Oracle Database Vault
Page 30: Oracle Database Security - · PDF fileOracle Database Security Paul Needham, Senior Director, Product Management, Database Security. Target of Data Breaches ... Oracle Database Vault
Page 31: Oracle Database Security - · PDF fileOracle Database Security Paul Needham, Senior Director, Product Management, Database Security. Target of Data Breaches ... Oracle Database Vault

31

Oracle Data MaskingIrreversible De-Identification

• Remove sensitive data from non-production databases

• Referential integrity preserved so applications continue to work

• Extensible template library and policies for automation

LAST_NAME SSN SALARY

ANSKEKSL 111—23-1111 40,000

BKJHHEIEDK 222-34-1345 60,000

LAST_NAME SSN SALARY

AGUILAR 203-33-3234 40,000

BENSON 323-22-2943 60,000

Production Non-Production

Page 32: Oracle Database Security - · PDF fileOracle Database Security Paul Needham, Senior Director, Product Management, Database Security. Target of Data Breaches ... Oracle Database Vault

Oracle Database Security Products

Heterogeneous Oracle Databases

Oracle Database Firewall

Oracle Audit Vault

Oracle Data Masking

Oracle Advanced Security

Oracle Database Vault

Oracle Label Security

Oracle Configuration Management

32

Page 33: Oracle Database Security - · PDF fileOracle Database Security Paul Needham, Senior Director, Product Management, Database Security. Target of Data Breaches ... Oracle Database Vault

• Database Vault

• Label Security

• Identity Management

• Advanced Security

• Secure Backup

• Data Masking

Oracle Database Security SolutionsInside. Outside. Complete.

• Audit Vault

• Total Recall

• Configuration Management

Encryption & Masking

AccessControl

Auditing

& Tracking

• Database Firewall

Monitoring & Blocking

• Preventive and detective controls within the Oracle database

• Database Firewall to prevent threats from reaching databases

• Transparent – no changes to existing applications

• Complete integrated solutions for lower TCO

33

Page 34: Oracle Database Security - · PDF fileOracle Database Security Paul Needham, Senior Director, Product Management, Database Security. Target of Data Breaches ... Oracle Database Vault

For More Information

oracle.com/database/security

[email protected]

search.oracle.com

database security

Page 35: Oracle Database Security - · PDF fileOracle Database Security Paul Needham, Senior Director, Product Management, Database Security. Target of Data Breaches ... Oracle Database Vault
Page 36: Oracle Database Security - · PDF fileOracle Database Security Paul Needham, Senior Director, Product Management, Database Security. Target of Data Breaches ... Oracle Database Vault