Lab4 Oracle Database Security
Lab4 Oracle Database Security
Contents
1. Introducing Database Security. ........................................................................1
2. Database controls: .............................................................................................2
3. Oracle Database Security Solutions .................................................................3
3.1 Assess the database to find and remove unnecessary risk ..........................3
3.2 Encrypt data at rest .....................................................................................6
3.3 Control access to the data .........................................................................11
3.4 Audit database activity .............................................................................15
Source: https://www.prnewswire.com/news-releases/top-cyber-
security-experts-report-4-000-cyber-attacks-a-day-since-covid-19-pandemic-
301110157.html
Data security best practices include data protection techniques such as data
encryption, key management, data redaction, data Subsetting, and data masking.),
as well as controlling and auditing and monitoring of privileged user access
(privileged user access controls and auditing and monitoring).
They all create risks to the security of personal data, financial data, trade secrets
and regulated data.
2. Database controls:
- Assessment controls: help evaluate the security status of the database and
will also provide the ability to identify configuration changes.
- Detect: monitors user and application access to data, identifies anomalous
behavior, and detects and blocks threats
- Prevent: blocks unauthorized access to data by encrypting, redacting,
masking, and substituting data, based on the intended use case. The ultimate
goal is to prevent unauthorized access to data.
- Data: enforces application-level access policies within the database,
providing a consistent authorization model across multiple applications,
reporting tools, and database clients.
- Users: enforce appropriate user authentication and authorization policies,
ensuring that only authenticated and authorized users have access to data.
The above command will collect the database and save it to the dbsat directory
with the name db04. When completed, the line DBSAT Collector completed
successfully will appear
Check the db04 file after displaying collect:
Once created, check to see if there is a db04_report file in the dbsat directory:
We use the admin key management set key with backup container command
above to update the key_id for pdb. We have successfully configured TDE.
3.3 Control access to the data
3.3.1 User administration
Scenario: User data analyst needs access to the sales user's
Customers database containing information about customers.
Create users:
Check:
Check:
In addition to select, we can also grant other permissions such as delete, insert,
update...
After the command is executed, we need one more step to restart the
database so that the database vault is activated. To check whether the
database vault is enabled or not:
select * from v$option where parameter = 'Oracle Database Vault';
FALSE → not enabled.
Restart the database:
shutdown immediate;
startup;
After rebooting, we check the database vault again
Check: Log in with the DBA to test access to the sales.customers table
Log in with the sales user to check access to the sales.customers table
3.4 Audit database activity
Use the show audit parameter command to check what the audit
policy is set up for