Secure APEX Development
Secure APEX Development
Secure APEX Development
Development
Scott Spendolini
President & Co-Founder
Welcome
• Consulting
• Anything APEX-related
• Solutions/Products
• sumnevaSERT
• sumnevaFramework
ere
n s w
c t i o 1 0 ?
re a , 2 0
es e l 8 t h
f t h p r i
all o r e A
o r b ef o
o m e o r
i f s o n
ha t n t ed
W em e
p l
im
• No programming knowledge
• No special circumstances
Source: http://xkcd.com/327/
• http://www.unixwiz.net/techtips/sql-injection.html
pe e k e d a t Oc tom om file s
Kaiser fined - worke rs
| By Vi ct oria Colliver, Chronicle Staff Writer
May 16, 2009
http://articles.sfgate.com/2009-05-16/business/17200917_1_state-fines-kaiser-kaiser-
spokesman-jim-anderson-kaiser-permanente-s-bellflower-hospital
http://news.cnet.com/8301-1009_3-10104997-83.html
SHADOW DATA
As SYS: revoke_shadow_privs.sql
As SYS: create_table_foo.sql
As SYS: prevent_shadow_drop.sql
As SYS: create_data_schema.sql
Create APEX Workspace for DATA & Associated APIs for EMP
• Build APEX forms & reports against the view in the shadow schema
• Column Filtering
• Only data in a specific column that are allowed by the policy are
displayed; all other rows in that column appear as NULL
As SYS: set_ctx.sql
EXCEPTION
WHEN no_data_found THEN
-- If no data is found, then clear the context
dbms_session.clear_context('DEMO_CTX', p_app_session) ;
END set_ctx;
/
As SYS: surrogate_schema.sql
As SYS: procedure_example.sql
• Security is a process
• Hackers don’t sleep; neither can we
• Security is hard
72 Copyright © 2010 Sumneva - All Rights Reserved - http://sumneva.com - [email protected]
ADDITIONAL RESOURCES
• Sumneva APEX Security Reviews
• Infrastructure Review & Analysis
• sumnevaASR
• APEX Security Review tool
• Built in APEX