Oracle - DAM Applicability As Per RBI-guidelines
Oracle - DAM Applicability As Per RBI-guidelines
INTENDED AUDIENCE
Intended audience would include key stakeholders like CIOs, CISOs, Executive Directors, business unit heads, heads of
internal audit, operational risk, compliance and fraud management from all of the financial institutions regulated by RBI in
Indian sub-continent. If you are responsible for designing, implementing, maintaining, or operating security controls for
database systems, this paper is intended for you to help accelerate compliance with RBI guidelines on Database Activity
Monitoring requirements.
DISCLAIMER
This document in any form, software or printed matter, contains proprietary information that is the exclusive property of
Oracle. Your access to and use of this confidential material is subject to the terms and conditions of your Oracle software
license and service agreement, which has been executed and with which you agree to comply. This document is not part of
your license agreement nor can it be incorporated into any contractual agreement with Oracle or its subsidiaries or affiliates.
This document is for informational purposes only and is intended solely to assist you in planning for the implementation
and upgrade of the product features described. It is not a commitment to deliver any material, code, or functionality, and
should not be relied upon in making purchasing decisions. The development, release, and timing of any features or
functionality described in this document remains at the sole discretion of Oracle.
The information in this document may not be construed or used as legal advice about the content, interpretation or
application of any law, regulation or regulatory guideline. Customers and prospective customers must seek their own legal
counsel to understand the applicability of any law or regulation on their processing of personal data, including through the
use of any vendor’s products or services.
LEGAL DISCLAIMER
The purpose of this document is to help organizations understand how Oracle Database Security technology can be utilized
to help comply with certain Reserve Bank of India requirements. Some of the Oracle Database Security technologies may or
may not be relevant based upon an organization’s specific environment. Oracle always recommends testing security
solutions within your specific environment to ensure that performance, availability and integrity are maintained.
The information in this document may not be construed or used as legal advice about the content, interpretation or
application of any law, regulation or regulatory guideline. Customers and prospective customers must seek their own legal
counsel to understand the applicability of any law or regulation on their processing of personal data, including through the
use of any vendor’s products or services.
Legal Disclaimer 1
Table of Contents 2
Introduction 3
RBI CIRCULARS 3
EXECUTIVE SUMMARY 4
1. RBI Guidelines for Database Auditing 7
1.1. Sensitive Data Access 7
1.2. Access Control 10
1.3. Privileged User Access 12
1.4. Application Activity 13
1.5. Inactive User Accounts 16
1.6. Specific Components 17
Conclusion 45
Appendix 45
Application Activity Auditing Sample 45
The Reserve Bank of India issued guidance in April 2011 for banks to mitigate the risks of use of information technology in
banking operations. RBI Guidelines are the result of the Working Group's recommendations on information security,
electronic banking, technology risk management and cyber fraud. The Working Group was formed under the chairmanship
of G. Gopalakrishna, the executive director of RBI in April 2010.
RBI’s initial guidance on cyber security was issued in 2011, and additional circulars have been issued over the years, as listed
below. Database Activity Monitoring is one of the key requirements for RBI compliance. This paper examines Oracle
Database security capabilities that can be used to help comply with RBI Guidelines for Database Activity Monitoring.
RBI CIRCULARS
RBI Circular dated April 29, 2011 on “RBI Circular: Working Group on Information Security, Electronic Banking, Technology
Risk Management and Cyber Frauds- Implementation of recommendations”
https://www.rbi.org.in/Scripts/NotificationUser.aspx?Id=6366&Mode=0
RBI developed new norms to scale up the cyber-security and resilience framework at the urban cooperative banks (UCBs)
with its circular dated October 19, 2018.
RBI Circular dated October 19, 2018 on “Basic Cyber Security Framework for Primary (Urban) Cooperative Banks (UCBs)”
https://www.rbi.org.in/Scripts/NotificationUser.aspx?Id=11397&Mode=0
RBI recommended a basic cyber security framework to be implemented by all the UCBs (Ref 3):
http://rbidocs.rbi.org.in/rdocs/content/pdfs/63NT19102018_A1.pdf
On December 31, 2019, RBI released the below circular on a comprehensive Cyber Security Framework for UCBs:
RBI Circular dated December 31, 2019 on “Comprehensive Cyber Security Framework for Primary (Urban) Cooperative Banks
(UCBs) – A Graded Approach”
https://www.rbi.org.in/Scripts/NotificationUser.aspx?Id=11772&Mode=0
Database Activity Monitoring is crucial for compliance with the RBI Guidelines on Cyber Security. Some of the key references
in RBI Guidelines that highlights the DAM requirements are mentioned.
The fundamental attributes supporting data quality should include Ref 1, Page 10 Auditability of data for
accuracy, integrity, consistency, completeness, validity, timeliness, ensuring data quality.
accessibility, usability and auditability.
Accountability and auditability: An organization’s security policy Ref 1, Page 11 Auditability of user
can be properly enforced only if accountability is maintained, i.e., activities to ensure
security can be maintained only if subjects are held accountable accountability.
for their actions. Effective accountability relies upon the capability
to prove a subject’s identity and track their activities. Accountability
is established by linking a human to the activities of an online identity
through the security services and mechanisms of auditing,
authorization, authentication, and identification.
Banks need to define and implement procedures to ensure the Ref 1, Page Ensuring data integrity
integrity and consistency of all data stored in electronic form, such as 29, Item 15.i and consistency.
databases, data warehouses and data archives.
Digital evidence is similar to any other form of legal proof - it needs Ref 1, Page Audit data as a form of
to withstand challenges to its integrity, its handling must be carefully 16, Item 1.5 digital evidence.
tracked and documented, and it must be suitably authenticated by
concerned personnel as per legal requirements
Achieving robust security (security assurance) is not a onetime Ref 1, Page Monitoring of user
activity. .. It is a continuous process that requires regular assessment 136, Item behavior for suspicious
of the security health of the organization and proactive steps to 8.2.(d) activities and forensics.
detect and fix any vulnerability. Every bank should have in place
quick and reliable access to expertise for tracking suspicious
behavior, monitoring users and performing forensics.
Hence, it is mandated that a SOC (Security Operations Centre) be Ref 2, Page 2, Ability to provide
set up at the earliest, if not yet been done. It is also essential that this Item 6 continuous surveillance.
Centre ensures continuous surveillance
Comprehensively address network and database security: Recent Ref 2, Page 3, Comprehensive need for
incidents have highlighted the need to thoroughly review network Item 9 database auditing and
security in every bank. … It is essential that unauthorized access to network monitoring.
networks and databases is not allowed and wherever permitted,
these are through well-defined processes which are invariably
followed.
Cyber Crisis Management Plan: CCMP should address the following Ref 2, Page 4, Prompt detection of
four aspects: (i) Detection (ii) Response (iii) Recovery and (iv) Item 12 intrusions and response is
Containment. Banks need to take effective measures to prevent needed.
cyber-attacks and to promptly detect any cyber-intrusions so as
to respond / recover / contain the fall out. Banks are expected to be
Constant and Continuous monitoring of the environment using Ref 2, Page Enable constant and
appropriate and cost effective technology tools, clearly defined 18, Item continuous proactive
policies and procedures based on best practices and monitored by 3,Item 4.2, monitoring.
technically competent and capable manpower is the urgent need for
Item 4.4
the Industry.
Audit Logs: Capture the audit logs pertaining to user actions in a Ref 4, Page 6 Comprehensive audit logs
system. Such arrangements should facilitate forensic auditing, if , Item to support forensic
need be. An alert mechanism should be set to monitor any change in 10.1,Item10.2 investigation.
the log settings.
An alert mechanism to
detect changes to audit
settings.
Technology framework designed and implemented to ensure Ref 2, Page To processes audit logs
proactive monitoring capabilities 20, Item 5 from a variety of database
and operating system
Identification of the location for the sensors to collect the logs that
platforms, normalizing
are required to carry out the analysis and investigation
the data elements and
Security analytics engine which can process the logs within making them ready for
reasonable time frame and come out with possible recommendations timely analysis and
reporting.
Deep packet inspection approaches
For accountability purposes, a bank should ensure that users and IT Ref 1, Page To be able to audit
assets are uniquely identified and their actions are auditable. 20, Item database users and their
5.(viii) actions.
Cyber Security Operations Centre should have the capacity to Ref 2, Page 7, Need real time/ near real
monitor various logs / incidents in real time / near real time. Item c time monitoring of logs
for analysis and
detection.
Establish and implement a Security Operations Centre for centralised Ref 2, Page Centralized and
and coordinated monitoring and management of security related 16, Item coordinated monitoring
incidents. 19.6.b required.
Have support/ arrangement for network forensics/forensic Ref 2, Page Network forensics
investigation/DDOS mitigation services on stand-by 17, Item 22.1 capability.
Oracle Database security recommendations for activity monitoring and auditing include the use of database auditing (a core
feature of the Oracle Database), along with Oracle Audit Vault and Database Firewall (a separately licensed product).
Together, these provide a comprehensive DAM solution that help address the RBI activity monitoring requirements. Oracle
Audit Vault and Database Firewall (AVDF) collects audit data from many different types of systems, monitors and analyzes
network SQL traffic to databases, and takes appropriate action before the SQL reaches the database. AVDF combines native
database audit logs with captured network SQL traffic and stores it in a centralized, secure warehouse for analysis and
reporting. AVDF includes host-based agents for collecting audit data from multiple targets, data retention options, reporting
and analysis tools, alert generation and integration with SIEM tools, an audit dashboard, and a comprehensive set of
customizable reports for security and compliance. Delivered as a soft appliance, a single Audit Vault Server consolidates
database audit logs and network-based database activity events from multiple databases.
AVDF Architecture diagram:
AVDF combines two complementary data streams to deliver a complete DAM solution.
a) Native database auditing that provides a complete view of database activity along with full execution context
irrespective of whether the statement was executed directly, through dynamic SQL, or through stored procedures.
b) Network-based monitoring that is independent of the database type and requires no modification to the databases.
Network-based monitoring uses the Database Firewall component of AVDF, compatible with multiple
heterogeneous database systems simultaneously.
RBI Guidelines on cyber security recommend a Database Activity Monitoring solution that combines native database
auditing with network-based monitoring. The rest of the paper details requirements in each of the RBI Guidelines categories,
followed by recommendations involving Oracle Database auditing feature and AVDF.
Database auditing is an important component of Database Activity Monitoring. Database auditing involves creating and
enabling database policies to track the use of database objects and users. When auditing is enabled, database activities on
specified objects and users produce an audit trail of these operations. Each generates an audit record that includes what
database operation was performed, the database objects involved, who performed the operation, time of execution, and the
SQL statement itself.
RBI guidelines recommend tracking who did what to which piece of data, capturing when and how it was changed, and
preserving the evidence for forensic investigation. Database auditing is important because there are many threats to the
security of your data, including external agents trying to compromise your security and access your company data, and
internal agents within your organization. The most typical security threat comes from a disgruntled or malevolent current or
ex-employee who has access to the database. Auditing is crucial to find an unauthorized access emanating from an
authorized user.
As auditing occurs post-activity, it does not do anything to prohibit access. Auditing helps ensure data integrity by
facilitating the timely detection of security breaches, thereby mitigating risks quickly. An audited system is a deterrent
against users tampering with data because it helps to identify infiltrators.
Oracle Database provides the industry’s most comprehensive auditing capability, enabling the capture of detailed
information. Oracle Database provides predefined audit policies that cover commonly used security-relevant audit
requirements such as logon failures, database configuration parameter changes, user account and privilege management,
etc. Additionally, one can create custom audit policies specific to the user, database object, privilege, role or action that
needs to be audited. Build selective and effective audit policies by adding various conditions including SYS_CONTEXT and
Application Context values, enabling the capture of audit information from applications.
The requirements from RBI for database auditing fall into the following categories. Subsequent sections highlight the
requirements and recommendations:
RBI Guidelines recommend implementing Information Security Management System (ISMS) best practices for their critical
functions/processes. Adherence to ISMS Standards like ISO 27001 and ISO 27002 emphasizes the need to classify
information assets (applicable to data in the database) as sensitive /critical, and establish security measures commensurate
with the sensitivity and criticality of the data.
Banks need to establish a classification scheme that applies throughout the Ref 1, Page 8, Sensitive data
enterprise, based on the criticality and sensitivity (e.g. public, confidential, or item 1.j classification.
top secret) of enterprise data. This scheme should include details of data
ownership; definition of appropriate security levels and protection controls;
and a brief description of data retention and destruction requirements
(criticality and sensitivity).
Standards like ISO27001 and ISO 27002 are explicit in requiring a risk Ref 1, Page 16, Auditing and
assessment to be carried out before any controls are selected and item 2.2, item monitoring of
implemented and are equally explicit that the selection of every control must 2.3 data to be
be justified by a risk assessment. commensurate
with its
Data Leak Prevention Strategy: Develop and implement a comprehensive Ref 4, Page 6,
sensitivity /risk.
data loss/leakage prevention strategy to safeguard sensitive (including item 9.1
confidential) business and customer data/information.
Information assets have varying degrees of sensitivity and criticality in Ref 1, Page 17, Auditing of user
meeting business objectives. By assigning classes or levels of sensitivity and item 3 access to
criticality to information resources and establishing specific security sensitive data.
rules/requirements for each class, it is possible to define the level of access
controls that should be applied to each information asset.
There should be controls on updating key ‘static’ business information like Ref 1, Page 25, Track customer
customer master files, parameter changes, etc. item 11.11 data changes in
applications.
More sensitive information such as system documentation, application source Ref 1, Page 30, Tracking
code, and production transaction data should have more extensive controls item 15.v production data
to guard against alteration changes.
Highly sensitive and/or critical IT assets would need to have logging enabled Ref 1, Page 32, Security
to record events and monitored at a level proportional to the level of risk. item 17.v monitoring in
proportion to
the risk.
Banks should be proactive to identify and specify the minimum security Ref 1, Page 83, Monitoring PII
baselines to be adhered to by the service providers to ensure confidentiality item 2.v data/critical
and security of data. This is particularly applicable where third party service customer data
providers have access to personally identifiable information and critical access when
customer data. outsourced.
Discuss and agree on the instances where customer data shall be accessed
and the user groups who will have access to the same. Access to a Bank’s data
should be strictly on a need to know basis
Recommendations:
Databases frequently contain sensitive data – data whose access should be controlled and monitored. Examples of sensitive
data might include financial results, credit card numbers, email addresses, and personal data that describes an employee or
customer.
There are a few ways to identify and categorize sensitive data in the Oracle Database. One of them is with Oracle Database
Security Assessment Tool (DBSAT). DBSAT provides various reports of sensitive data summary from the scan of database
metadata. A sample screenshot from DBSAT report showing sensitive columns is given below.
Application service accounts: These are database users used by an application to perform a defined set of standardized
business functions
Human actors: These are database users granted access to the database to generate reports, perform ad-hoc queries or
otherwise interact with data.
For application service accounts, focus on trusted path when designing your audit policy. By trusted application path, we
mean the collection of session attributes that help define access to sensitive data that is expected and within policy. For
example, activity that originates from a known set of IP addresses, using a pre-approved program running as a designated
operating system user. Sensitive data access through the trusted path presents a lower level of risk, and therefore needs a
lower level of auditing, or may not need to be audited at all. Sensitive data access by an application service account outside
of the trusted path indicates the account is being used for something other than application access, and therefore presents a
higher level of risk and therefore a higher level of audit is required. Consider auditing all activity on the sensitive data by the
accounts that is not within the trusted path. Consider adding the conditions for excluding the trusted path in the audit policy
configuration to audit only the abnormal access by application service accounts. Using the Oracle Database conditional
auditing features, construct the audit policies to capture object access that is outside of the trusted path of the application.
For human actors authorized to interact directly with sensitive data, a higher level of auditing is almost always appropriate.
RBI Guidelines mandate direct access to the database must be restricted only to the database administrator and emphasizes
that direct back-end updates to database should not be allowed except during exigencies, with a clear business need and
after due authorization. If the version of your Oracle Database supports the ability to audit only the top-level SQL activities,
consider auditing all top-level statements by these users, including accounts with administrative privileges, and accounts
that have been granted the DBA roles.
RBI Guidelines mandate tracking access to personally identifiable information and critical customer data. Consider creating
Fine-Grained Auditing (FGA) policies in the Oracle Database to audit sensitive personally identifiable information (PII) data
stored in specific columns. Using FGA parameters like audit_condition and audit_column, audit behavior can be fine -tuned
to target specific sensitive columns in the table and for specific conditions (for example, auditing SQL statements against the
salary column only in cases where the salary amount is greater than 100,000 INR). Consider enforcing audit policies for
specific users with audit_condition based on factors like session user from SYS_CONTEXT to ensure that only specific users
will be audited. This will be effective for enforcing the policy for third party service providers as emphasized in RBI
Guidelines. Consider configuring alerts that take effect when a user (or an intruder) violates the policy by extending the FGA
1. Monitor activity on sensitive data access using ‘Activity on Sensitive Data’ data privacy report, as detailed in the
section Establish Proactive Security Monitoring Practices, including Sensitive Data Access.
2. Define alerts on DML activity on sensitive data access events. Use alert conditions with appropriate data access
audit events (INSERT, UPDATE, and DELETE) and TARGET_OBJECT to reflect the sensitive tables in the schema.
Refer to Define Alerts that are Actionable and Granular.
3. Monitor activity on sensitive data by privileged users by using the report ‘Activity on Sensitive Data by
Privileged Users’ data privacy report.
Identification of any unauthorised changes Ref 1, Page 16, Security control for
item 1.4 unauthorized changes.
Internal sabotage, clandestine espionage or furtive attacks by Ref 1, Page 19, Ability to track internal
trusted employees, contractors and vendors are among the most item 5.(i) , item and external user
serious potential risks that a bank faces. Current and past 5.(ii), item 5.(v) activities, including
employees, contractors, vendors and those who have an intimate privileged access to
knowledge of the inner workings of the bank’s systems, sensitive assets.
operations and internal controls have a significant advantage over
external attackers….
Conducting a risk assessment and granting access rights based on Ref 1, Page 20, Ability to track changes
the same. For example, contractors and temporary staff would have item 5. to user accounts and
higher inherent risks. Implementation of role-based access control (vi).b,c,e,f,g,h,k , privilege grants to spot
policies designed to ensure effective segregation of item 5. (viii) changes and identify
duties…..Modification of access rights whenever there is a change candidate accounts for
in role or responsibility and removal of access rights on cessation of removal.
employment .. Processes to notify in a timely manner the
information security function regarding user additions, deletions
and role changes ..Periodic reconciliation of user ids in a system and
actual users required to have access and deletion of unnecessary ids,
Personnel with elevated system access entitlements should be Ref 1, Page 20, Capture activity
closely supervised with all their systems activities logged… item 5.(xiii) information of
privileged users.
Granting privileged access on a “need-to-have” or “need-to-do”
basis
Instituting strong controls over remote access by privileged users
Access should be based on the principle of least privilege and Ref 1, Page 25, Application access
“need to know” commensurate with the job responsibilities. item 11.c.10 control.
Adequate segregation of duties needs to be enforced.
Banks use third-party service providers in a variety of different Ref 1, Page 38, Unauthorized access by
capacities. It can be an Internet service provider (ISP), application or item 23.i third-party service
managed service provider (ASP/MSP) or business service provider providers.
(BSP). These providers may often perform important functions for
the bank and usually may require access to confidential
information, applications and systems.
Network access by system engineers should be monitored and Ref 1, Page 46, Unauthorized access
reviewed closely to detect unauthorized access to the network. item 24.viii.r,s over network.
Disallow administrative rights on end-user Ref 2, Page 11, User access control.
workstations/PCs/laptops and provide access rights on a need to item 8.3 ,item
know basis and for specific duration when it is required following an 8.4
established process.
Recommendations:
Consider creating an audit policy to track all top-level activities by users who are granted roles that contain used /unused
system privileges, which can be obtained from Privilege Analysis. Audit policies are enforced for users who have been
granted the specified role directly or indirectly.
RBI Guidelines recommend monitoring administrator or other privileged access to sensitive or critical IT assets. Consider
auditing object actions, instead of auditing the privilege use, of administrative users such as SYS. Refer to Sensitive Data
Access, where it is detailed.
Ensure the predefined Oracle audit configuration policy – “ORA_ACCOUNT_MGMT” is enabled in the environment to track
database accounts and access modifications attempts. RBI Guidelines recommend monitoring of any modification of
database access rights whenever there is a change in role or responsibility, and removal of access rights upon cessation of
employment, and other account modifications like user additions and deletions.
RBI Guidelines place special emphasis on monitoring unauthorized access and changes to systems, applications or data, by
third-party service providers like an Internet service provider (ISP), application or managed service provider (ASP/MSP) or
business service provider (BSP). Consider using role-based access control for these user accounts to make it easy to create
policies for such users. For example, one can audit all top-level activities for users granted the role “service_provider” using
the ‘by users with granted roles’ clause in audit policy configuration. The role “service_provider” can be used to assign the
appropriate privileges for users who are providing the managed services.
1. Track changes to user accounts and their roles/privileges using the entitlement reporting functionality contained
within AVDF. Consider using the baseline comparative features within this reporting to highlight only privileges that
have changed since the last report was reviewed. Refer to Establish Proactive Security Monitoring Practices,
including Sensitive Data Access for details.
2. Define alerts on account modification audit events (CREATE/ DROP/ ALTER USER, CREATE/ DROP/ ALTER
PROFILE). Use alert conditions with TARGET_TYPE (USER, PROFILE).
3. Create a custom report to monitor activity on sensitive data access by users who need to be closely tracked like
third-party service providers. Use the ‘Activity on Sensitive Data’ data privacy report as detailed in the section
Establish Proactive Security Monitoring Practices, including Sensitive Data Access.
RBI Guidelines requires closely monitoring users with elevated access privileges, including system administrators, database
administrators, and security officers, as mentioned below.
System administrators, security officers, programmers and Ref 1, Page 20, Audit usage of system
staff performing critical operations invariably possess the Item 5.(xiii) access entitlements by
capability to inflict severe damage on the banking systems privileged users.
they maintain or operate by virtue of their job functions and
privileged access. Personnel with elevated system access
entitlements should be closely supervised with all their
systems activities logged, as they have inside knowledge and
the resources to circumvent systems controls and security
procedures
Users, like system administrators, with elevated access Ref 1, Page 32, Monitoring of users with
privileges should be subjected to a greater level of monitoring Item 17.(vi) elevated privileges.
in light of the heightened risks involved.
Implement appropriate (e.g. centralised) systems and controls Ref 2, Page 11, Monitor and log
to allow, manage, log and monitor Item 8.5 administrative access.
privileged/superuser/administrative access to critical systems
(Servers/OS/DB, applications, network devices etc.).
Recommendations:
All the database administrator activities happening through direct back-end updates to database (which are typically
provided only to privileged users) are audited using the audit policy configuration described in the section Sensitive Data
Access.
Consider monitoring the activities of privileged users with the ‘Activity on Sensitive Data by Privileged Users’ data privacy
report to track any suspicious activity.
RBI Guidelines recommend application access to data be monitored closely and be flexible enough to accommodate any
client session attributes for forensics, as mentioned in the following references.
Application owner: Establishing user access criteria, Ref 1, Page 18, Item 4 Audit trail
availability requirements and audit trails for their configuration
applications needed for
applications.
Application owners grant legitimate users access to Ref 1, Page 21, Item 7.(i) Internal user threat
systems that are necessary to perform their duties and needs to be
security personnel enforce the access rights in accordance considered and
with institution standards. Because of their internal access actions of internal
levels and intimate knowledge of financial institution
Ensuring that logs or audit trails, as required, are enabled Ref 1, Page 24,25, Item Flexible auditing
and monitored for the applications 11.c.2,3,5,6,15 framework that
allows for detailed
Before the system is live, there should be clarity on the audit
audit logging of
trails and the specific fields that are required to be
database activity,
captured as part of audit trails and an audit trail or log
including failed
monitoring process including personnel responsible for the
login attempts,
same.
grants of access
All application systems need to have audit trails along with rights, and changes
policy/procedure of log monitoring for such systems in system
including the clear allocation of responsibility in this regard. configuration.
Every application affecting critical/sensitive
information, for example, impacting financial, customer,
control, regulatory and legal aspects, must provide for Detailed
detailed audit trails/ logging capability with details like information in the
transaction id, date, time, originator id, authorizer id, audit trail including
actions undertaken by a given user id, etc. Other details IP address, host
like logging the IP address of the client machine, terminal name, and
identity or location may also be considered. application specific
auditable attributes
Applications must also provide for, inter-alia, logging
to be captured.
unsuccessful logon attempts, access to sensitive options
in the application, e.g., master record changes, granting
of access rights, use of system utilities, changes in
system configuration, etc.
Applications must not allow unauthorized entries to be
updated in the database.
With the advances in information technology, most banks in Ref 1, Page 113, Ability to monitor
India have migrated to core banking platforms and have and audit database
Page 115, Item 2.e
moved transactions to payment cards (debit and credit object changes.
cards) and to electronic channels like ATMs, Internet
Banking and Mobile Banking.
System triggers that throw up exceptional transactions, Ref 1, Page 116, Item Cyber fraud
….. to report suspicious transactions/behaviours are 2.(iii).a.b detection and alerts
some of the techniques that are used for detection of frauds. on suspicious
The exceptional/suspicious transactions/activities reported transactions.
through these mechanisms should be investigated in detail. Integration of alerts
with SIEM products
Recommendations:
The Unified Audit trail captures many of the required attributes from the client sessions like CLIENT_PROGRAM_NAME and
CLIENT_IDENTIFIER. For a complete list of attributes captured in Unified Audit trail, refer to the UNIFIED_AUDIT_TRAIL
view definition in the Oracle Database Reference.
For additional application attributes like transaction id, originator id, authorizer id, location that the RBI Guidelines
require in the audit trail, the Oracle unified_audit_trail allows customization by capturing the additional attributes in the
APPLICATION_CONTEXTS column. Auditing Application context values, as referred in ‘Auditing Application Context
Values’ in the Oracle Database Security Guide, enables the capture of application context values set by the database
applications, while executing the audited statement. For example, the HR module in an application can set the appropriate
application context values so that any SQL operation that is audited while executing within the HR module can now contain
additional information relevant to the execution context.
To set the values for an application context, create a PL/SQL package procedure that uses the
DBMS_SESSION.SET_CONTEXT procedure. This is the only way that one can set application context values if the context is
not marked INITIALIZED EXTERNALLY or INITIALIZED GLOBALLY. One can assign the values to the application context
attributes at run time. Because the trusted procedure, and not the user, assigns the values, it is a secured application
context. A sample procedure, which populates application context with attributes from gv$session and userenv, and the
audit configuration capturing the attributes in audit trail, is shown in Application activity auditing sample.
In this way, one can extend the unified audit trail to capture any additional application attributes. Consider enforcing it for
application service accounts.
RBI also recommends capturing unsuccessful logon attempts from application service accounts. Ensure that the Oracle pre-
defined audit policy ORA_LOGON_FAILURES is enabled in the database to track unsuccessful login attempts.
RBI recommends that for the core Internet banking systems, finer controls like upper limit on transaction value and SMS
alerts to customers be configured. Consider using Fine-grained auditing (FGA) policies as explained in Sensitive Data Access,
which allows configuring audit policies based on values in the database table, in-addition to configuring alerts using event
handler. Additionally, alerting in Audit Vault and Database Firewall product could be leveraged, which allows alerts to be
created and emailed and/or integrated with a SIEM product.
1. Track failed logins from the application using the ‘Failed Login Events’ activity reports as shown in the sample
below. The report shows the USER_LOGIN events where the Event Status is ‘Failure’.
2. Create alerts with appropriate threshold and alert conditions such as EVENT_STATUS=FAILURE and
EVENT_NAME=LOGIN. Consider configuring alerts based on time-period and frequency. For example, trigger an
alert when there are three failed login attempts on Oracle Database target within a five-minute period.
3. Create a custom report to monitor activity on sensitive data access by application service accounts. Use ‘Activity on
Sensitive Data’ data privacy report as detailed in the section Establish Proactive Security Monitoring Practices,
including Sensitive Data Access.
4. Consider tracking transaction updates in critical systems such as Internet banking systems using ‘Data Modification
Before-After Values Report’ to understand the before and after values of the update, as shown in the sample below.
Banks should frequently review all system accounts and Ref 1, Page 32, item Monitor activity on
disable any account that cannot be associated with a 17.(viii),(ix),(xi),(xii),(xiii) dormant account as
business process and business owner. Reports that may be part of security
generated from systems and reviewed frequently may monitoring.
include, among others, a list of locked out accounts,
disabled accounts, accounts with passwords that exceed the
maximum password age, and accounts with passwords that
never expire.
Implement controls to minimize invalid logon counts, Ref 2, Page 11, item 8.6 Track dormant
deactivate dormant accounts. accounts.
Recommendations:
Ensure pre-defined audit policy ORA_SECURECONFIG is enabled in the system. This captures executions of ‘ALTER
PROFILE’ audit events if there is any un-authorized attempts to modify the user profile settings.
Data transfer from one process to another or from one application Ref 1, Page 26, Audit of data transfer
to another, particularly for critical systems…. The process needs to item 11.27 process in
be automated and properly integrated with due authentication applications.
mechanism and audit trails…
Audit trails need to be available to document the conversion, Ref 1, Page 27, Audit of data
including data mappings and transformations…Integrity of data.. item 12.(i)(ii) migration activity.
Completeness.. Confidentiality of data.. Consistency of data..
Logging the auditing of key management-related activities Ref 1, Page 29, Audit of key
item 14.(iii).g management tasks.
Data transfers/ transformations involving RMAN backup/ restore operations gets audited by default in the Oracle Database
using mandatory auditing capabilities.
For auditing key management-related activities, ensure the Oracle pre-defined audit policy ORA_SECURECONFIG is enabled
in the database. This policy monitors usage of ADMINISTER KEY MANAGEMENT privilege, which is used to manage
keystores, encryption keys and secrets. Consider auditing for 'ACTIONS ADMINISTER KEY MANAGEMENT' to capture the
audit record for every key management related activity (irrespective of usage ADMINISTER KEY MANAGEMENT privilege).
RBI guidelines recommend audit trails be secure to ensure the integrity of the information, since that is the authoritative
source of information for forensic analysis. Here are some key references.
The audit trails need to be stored as per a defined period as per any Ref 1, Page 25, Application audit
internal/regulatory/statutory requirements and it should be ensured item 11.c.7 data integrity.
that they are not tampered with.
The integrity of the monitoring logs and processes should be Ref 1, Page 32, Maintaining integrity
safeguarded through appropriate access controls and segregation of item 17.vii of logs.
duties.
Digital evidence is similar to any other form of legal proof - it needs Ref 1, Page 16, Digital evidence as
to withstand challenges to its integrity,.. item 1.5 legal proof.
Banks needs to ensure that audit trails exist for IT assets satisfying Ref 1, Page 36, Audit trails need to
the banks business requirements including regulatory and legal item 21.i,ii be secure to protect
requirements, facilitating audit, serving as forensic evidence when the integrity of the
required and assisting in dispute resolution. This could include, as audit data.
applicable, various areas like transaction with financial
consequences, …., modifications in sensitive master data, accessing
or copying of sensitive data/information; and granting, modification Ability to define
or revocation of systems access rights or privileges for accessing policy for retention of
sensitive IT assets. audit data.
Audit trails should be secured to ensure the integrity of the
information captured, including the preservation of evidence.
Retention of audit trails should be in line with business, regulatory
and legal requirements.
E-banking systems should be designed and installed to capture and Ref 1, Page 36, Audit records must
maintain forensic evidence in a manner that maintains control item 21.vii be secure from
over the evidence, and prevents tampering and the collection of alteration or
false evidence. destruction.
Ensuring that privileged users do not have access to systems logs in Ref 1, Page 21, Block privileged user
which their activities are being captured item 5.(xiii).f access to audit logs
to ensure they do not
tamper it.
Recommendations:
Oracle Database auditing stores audit records in a secure schema within the audited database. Oracle Audit Vault and
Database Firewall extends this protection by moving the audit data into a separate secure repository that is protected from
access by database administrators.
Unified Auditing in Oracle Database is inherently secure at source. Unified Audit records are written to
AUDSYS.AUD$UNIFIED, which is a read-only table. Hence, DMLs are not permitted on the unified audit trail views. Even DML
and DDL operations on the underlying dictionary tables from AUDSYS schema are not permitted. Any attempt to directly
delete or update contents of AUD$UNIFIED fails as shown in the below figure, and generates an audit record.
Attempts to modify the data or metadata of the unified audit internal table are mandatorily audited. Because these attempts
should be considered inherently suspicious, consider creating alerts for them in AVDF.
Audit data can only be managed using the built-in audit data management package “DBMS_AUDIT_MGMT”. Audit data
cannot be directly updated or removed using UPDATE or DELETE SQL commands. Oracle Database mandatorily audits all
executions of the DBMS_AUDIT_MGMT PL/SQL package procedures.
Oracle Database facilitates separation of duties by providing two separate audit-related roles: AUDIT_ADMIN and
AUDIT_VIEWER.
AUDIT_ADMIN can configure auditing both unified audit policies and fine-grained audit policies and do administrative tasks
pertaining to auditing, such as purging the audit trail. This role also contains the ability to view and analyze audit data.
Typically, this role is granted to security administrators.
AUDIT_VIEWER can view and analyze audit data only and not create audit policies or truncate the audit trail. Typically, this
role is granted to auditors or security analysts.
The AUDSYS schema user, where Unified Audit trail resides cannot be logged into, as shown below. Thus, Oracle Database
auditing stores audit records in a schema that is protected from update and delete operations, only allowing purging of the
audit trail using the AUDIT_ADMIN role.
To ensure further integrity of audit data, key fields of unified audit records can be written to SYSLOG utility (on UNIX
platforms) or to the Windows Event Viewer (on Windows) by enabling the UNIFIED_AUDIT_SYSTEMLOG parameter. The
fields in SYSLOG uniquely identify the detailed unified audit records in the UNIFIED_AUDIT_TRAIL view.
As a best practice recommendation, forward the audit data from its source to a remote centralized location where the
individuals whose activities are audited, cannot purge the data. By removing audit data from the source Oracle Database
and storing it in the secured remote location like Oracle Audit Vault and Database Firewall (AVDF) appliance, we can protect
the integrity and reliability of the audit data and prove that it has not been tampered with.
AVDF is a secure data warehouse of audit data, with a highly scalable and secure repository that stores the audit data.
Timely transfer of audit data from source audit trails to Audit Vault server is critical to close the window on intruders who
may attempt to modify audit data and cover their tracks. Audit Vault transfers audit data on a near real time basis using the
Audit Vault Agent. Audit Vault encrypts data during transmission using industry standard TLS. Audit Vault protects audit
data using Oracle’s industry leading database security technology. The repository is an embedded Oracle Enterprise Edition
Database that includes numerous Oracle technologies, including automatic storage management (ASM), compression,
partitioning, encryption, Database Vault, and privileged user controls.
Audit Logs
User Login Oracle Database Audit Data Collection
Audit Trail
Secured At-Source
Oracle Audit Vault and
Database Firewall
Secured Remotely
AVDF uses a data warehouse schema called AVSYS. Audit data and network-based database activity event data is stored in
the AVSYS.EVENT_LOG table. The AVSYS account is locked in the Audit Vault database. The Audit Vault database uses
Oracle Database Vault to protect the AVSYS schema, and hence the Database Vault account manager can only unlock it. In
order to do so you have to login to the Audit Vault server using root password (this is set during the AVDF installation) and
then switch user to the Database Vault account manager. Thus, multiple layers of access control makes the access to the
AVSYS schema very restricted.
The AVSPACE tablespace containing the AVSYS schema in the Audit Vault server's repository is automatically encrypted
using Transparent Data Encryption (TDE). Hence, even archived event data is encrypted. AVDF protects audit trails with a
combination of encryption and strong access controls.
To enhance the integrity of audit and network data stored in AVDF, adhere to the guidelines outlined in ‘General Security
Guidelines’ of the Audit Vault and Database Firewall Administrator's Guide.
Retention of audit trails can be configured per-database target to allow for varying business requirements. For critical
systems like E-banking or core banking systems, the retention period for online and archived data can be defined to be
much longer than non-critical systems. Refer to ‘About Archiving and Retrieving Data in Oracle Audit Vault and
Database Firewall’ in the Audit Vault and Database Firewall Administrator's Guide for details on configuration.
Providing a centralized monitoring and management console for accelerating analysis, incident response, reporting, forensic
investigation, and for demonstrating regulatory compliance is a vital component of a Database Activity Monitoring solution.
RBI Guidelines recommend continuous surveillance and proactive security monitoring practices to detect unusual activity
patterns in the database and over the network, and establish escalation and communication processes to contain security
incidents.
RBI Guidelines that recommend centralized auditing, monitoring, reporting, and alerting of anomalous activity on the
database are listed here, followed by recommendations on how Oracle Audit Vault and Database Firewall(AVDF) can be used
to meet these requirements.
Developing and implementing processes for preventing, Ref 1, Page 23, Audit data must be
detecting, analyzing and responding to information security item collected and preserved to
incidents 10.(ii).a.b.d.e, support forensic
investigation.
Establishing escalation and communication processes and lines Item 10.(iii),
of authority item 10.(iv)
Establishing the capability to investigate information security Ability to send out alerts
incidents through various modes like forensics, evidence and report on issues.
collection and preservation, log analysis, interviewing, etc.
Potential security weaknesses / breaches (for example, as a Ref 1, Page 25, Support identification of
result of analyzing user behaviour or patterns of network traffic) item 11.c.13 potential breaches,
should be identified. including unusual patterns
of access to the database.
Concerns over the need to better control and protect sensitive Ref 1, Page 30, Monitoring access to
information have given rise to a new set of solutions aimed at item 15.xi sensitive information.
increasing an enterprise’s ability to protect its information assets.
… data leak prevention (DLP). It provides a comprehensive
approach covering people, processes, and systems that identify, Audit policies relating to
monitor, and protect data in use (e.g., endpoint actions), data sensitive data needs to be
in motion (e.g., network actions), and data at rest (e.g., data created.
storage) through deep content inspection and with a
centralized management framework. Most DLP solutions
include a suite of technologies that facilitate three key objectives:
• Locate and catalogue sensitive information stored
throughout the enterprise
Robust monitoring processes in place to identify events and Ref 1, Page 31, Ability to identify unusual
unusual activity patterns. The strength of the monitoring item activity patterns, and
controls needs to be proportionate to the criticality of an IT asset. 17.(i),(ii),(xv) generate alerts.
Alerts would need to be investigated in a timely manner.
Banks needs to ensure that audit trails exist for IT assets Ref 1, Page 36, Database activity
satisfying the banks business requirements including regulatory item 21.(i),(iv) monitoring and auditing,
and legal requirements, facilitating audit, serving as forensic along with the ability to
evidence when required and assisting in dispute resolution. monitor SQL traffic and
store in a central place is
Network and host activities typically are recorded on the host
needed.
and sent across the network to a central logging facility which
may process the logging data into a common format. The The solution should
process, called normalization, enables timely and effective log support heterogeneous
analysis. databases, and support
reporting and alerting.
• All remote access to an internal network, … Ref 1, Page 36, Ability to identify users
item 21.(v) accessing the database
• Operating systems should be configured to log access
remotely, and identify
control events … without the appropriate permissions
anomalies in access
• identify anomalies in logs and actively review the anomalies, patterns and alert on
events. In addition, audit
• Network boundary devices, including firewalls, network-
logs from OS should also
based IPSs, and inbound and outbound proxies may be
be captured.
configured to log verbosely all traffic (both allowed and
blocked) arriving at the device
Given the multiplicity of devices and systems, banks should Ref 1, Page 37, Ability to forward alerts to
consider deploying a Security Information and Event item 21.(vi) the SIEM for aggregation
Management (SIEM) system tool for log aggregation and and correlation.
consolidation from multiple machines/systems and for log
correlation and analysis..
Security monitoring arrangements should provide key decision- Ref 1, Page Ability to monitor SQL
makers … with an informed view of aspects like the 37/38, item traffic and log it, along with
effectiveness and efficiency of information security 22.(i),(iii),(iv),(v), database activity in a
arrangements.. (vi),(vii) centralized way giving key
decision makers a
Analysis performed as part of security monitoring and reporting
dashboard view is
arrangement may include
important. Ability to
The first step in an investigation process is gathering the entire Ref 1, Page 117, Fraud investigation
transaction details, documents and complete details of the item 2.(iii).a requires analyzing large
customer/employee or vendor. In order to investigate into volumes of data with
suspected cases, the group would adopt various advanced ability to store and archive
techniques including computer forensics, forensic accounting and data, so that historical data
tools to analyse large volumes of data. can also be considered as
part of the forensic
analysis.
Put in place mechanism to detect and remedy any unusual Ref 2, Page 9, Database Activity
activities in systems, servers, network devices and endpoints. item 4.7 Monitoring to detect
unusual activity within
your databases and send
alerts to SIEM so that
notifications can be sent to
administrators for taking
remedial actions.
Manage and analyse audit logs in a systematic manner so as to Ref 2, Page 14, Manage audit logs from
detect, understand or recover from an attack. item 16.2 multiple sources
(databases, operating
systems, firewall traffic),
and store and analyze
them to detect and
understand an attack.
Implement and periodically validate settings for capturing of Ref 2, Page 14, Database auditing should
appropriate logs/audit trails of each device, system software and item 17.1 contain the necessary
application software, ensuring that logs include minimum information to uniquely
information to uniquely identify the log for example by including identify the source of
a date, timestamp, source addresses, destination addresses. activity and detect any
audit setting changes.
Arrangement for continuous surveillance - Setting up of Cyber Ref 4, Page 9, Database auditing and
Security Operation Centre (C-SOC): item 1.1 network-based activity
monitoring are a key part
• Ability to Provide real-time/near-real time
of continuous surveillance,
information on and insight into the security posture of
preserving evidence of
the UCB
who did what, when they
Ensure proactive monitoring capabilities aligned with the banking Ref 4, Page 9, Ability to quickly collect
technology risk profile item 1.2 various audit logs centrally
for processing, making it
Security analytics engine which can process the logs within
available for analysis and
reasonable time frame and come out with possible
alerting. Additionally, there
recommendations
is a need to process and
Deep packet inspection approaches analyze SQL traffic.
Develop a comprehensive set of metrics that provides for Ref 4, Page 10, Support forensic
prospective and retrospective measures, like key performance item 4.1,item investigation, including
indicators and key risk indicators…. 4.2 correlation of activity
across different databases.
Have support/ arrangement for network forensics/forensic
investigation….
Recommendations:
Oracle Audit Vault and Database Firewall (AVDF) provides a comprehensive Database Activity Monitoring solution by
collecting and consolidating audit data, monitoring and logging network traffic, policy management, raising alerts, and
providing detailed reports for forensic and compliance purposes. Salient features of Oracle Audit Vault and Database
Firewall include:
• Ability to customize and create powerful alerts based on frequency of actions, and composite conditions
based on the audit data collected
e) Reporting
• Reporting for forensics and compliance tracking
Best practice recommendations to build an effective continuous surveillance solution, to help comply with RBI Guidelines,
fall in the following categories:
Information Captured Who, what, where, when Who, what, where, when
Before/After values
• Audit trails supports audit data collection from a broad spectrum of targets, including
• Database audit trails from Oracle Database, Microsoft SQL Server, MySQL, SAP Sybase
and IBM DB2 for LUW. The audit data can be collected from audit tables or files.
• OS audit trails from Oracle Linux, Oracle Solaris, Microsoft Windows, and IBM AIX.
• Custom audit data in either database tables or XML files. Audit data for custom
applications can be collected and reported.
• Refer to ‘Supported Secured Targets’ in the Audit Vault and Database Firewall
Installation Guide for the list of targets and their versions supported.
• By configuring the database firewall in proxy mode, network traffic to/from Oracle
Database, Microsoft SQL Server, SAP Sybase, IBM DB2, and MySQL can be monitored
and blocked if needed. Refer to ‘Database Firewall Protection: Supported Secured
Target Types and Versions’ in the Audit Vault and Database Firewall Installation
Guide for the list of targets and their versions supported.
• Host monitor, which captures SQL traffic from the network card and sends it over the
network to a Database Firewall, can also be used for monitoring SQL traffic, but this
cannot be used for blocking. The platforms where host monitor is supported, is listed in
‘Host Monitor: Supported Platforms and Versions’.
b) Configure data retention policies for each target based on data sensitivity and corporate retention rules
• Retention policies determine how long data is retained in the Audit Vault Server and can be used
for reporting, after what time period should the data be archived, and for how long archived data
can be brought back into the Audit Vault Server for reporting and forensics. Retention policies
may be different for different databases monitored by the same Audit Vault and Database
Firewall.
• Refer to ‘About Archiving And Retrieving Data In Oracle Audit Vault And Database
Firewall’ in the Audit Vault and Database Firewall Administrator’s Guide for
configuration details.
c) Enforce segregation of duties
• Auditors can configure and provision audit policies and firewall monitoring policies for databases,
as well as define, generate, and access audit reports and alerts.
• Administrators can configure basic network and host settings for the targets, start and stop Audit
Vault Agents and Database Firewalls, and configure and monitor Audit Vault Server operation.
Administrators do not have access to audit information and cannot create audit policies /firewall
monitoring policies.
• Within the two role categories, further separation of duties can be defined. A subset of database
targets can be assigned to individual auditors and administrators, ensuring that segregation of
duties is possible not only by role, but by the targets that they are allowed access to.
• Refer to ‘Managing User Accounts and Access’ in the Audit Vault and Database Firewall
Administrator’s Guide for configuration details.
Follow the recommendations highlighted in RBI Guidelines for Database Auditing to make the audit policy
configuration granular and conditional.
b) Firewall policies
Follow the recommendations highlighted in Firewall Policy to make the Firewall policy configuration selective.
c) Alert policies
Follow the recommendations highlighted in Define Alerts that are Actionable and Granular to ensure alerts are
specific to the conditions of interest and are targeted.
AVDF provides the ability to detect and alert on activities that may indicate attempts to gain unauthorized access to systems
and/or abuse system privileges. It lets you define rule-based alerts on audit records, whether these records come from the
native database audit trail, or are collected from the network by the Database Firewall. Database Firewall policies can be
configured to generate alerts on network activity, providing an early-warning detective control for potential malicious
activity. AVDF continuously monitors the events collected, evaluating the activities against defined alert conditions and
generating an alert if the condition is met. Alerts can be associated with any database event including system events such as
changes to application tables, creating privileged users, or events when someone attempts to access to sensitive business
information. Any actions that are blocked by an Oracle Database Vault policy also generate an audit event on top of which
an alert can be created.
Alert management capability in AVDF can be used to create alert definitions that raise alerts on the auditor’s dashboard and
send notifications to users for investigation. Alerts can be defined specifying a Boolean condition using SQL comparison
operators (=, <, LIKE, IN, NULL, and so on) and logical operations (NOT, AND, OR) using the fields in the audit record, as
shown in the screenshot below. Refer to ‘Creating Alerts’ in the Audit Vault and Database Firewall Auditor’s Guide for
details on alert configuration.
Flexibility to create
conditional alerts
Additionally, the AVDF dashboard provides graphical summaries of alerts as shown below. These include a summary of alert
activity. Consider using the alert trend in the auditor’s dashboard for analyzing the risk trends over time.
Consider configuring notifications for the generated alerts. For example, you can set up an email to be automatically sent to
a user, such as a security officer, or to a distribution list. Alerts can also be forwarded to syslog. This is useful if you want to
integrate AVDF with another system like the enterprise SIEM. Refer to ‘Responding to an Alert’ in the Audit Vault and
Database Firewall Auditor’s guide for information on configuring notifications.
3.4. Establish Proactive Security Monitoring Practices, including Sensitive Data Access
RBI recommends banks have continuous surveillance and robust monitoring processes in place to identify suspicious events
and unusual activity patterns. Use AVDF reports to establish continuous monitoring practices in your environment.
AVDF reports can be used to monitor a wide range of activities including privileged user activity on the database server,
changes to database structures, and SQL statements on the network that are executed on the database server. Reports are
based on the consolidated audit information from databases, operating systems, and directories, providing a holistic view of
activities across the enterprise. In addition, reports can include information on database account management, roles and
privileges, object management, and stored procedure changes.
Auditors can access reports interactively through a web interface, or generate PDF or XLS reports. The console’s easy-to-use
interactive browsing provides the ability to create color-coded charts and graphs. Columns of interest within the report can
be sorted, filtered, re-ordered, added, or removed. Rules can automatically highlight specific rows so that users can quickly
spot suspicious or unauthorized activity. PDF and XLS report definitions can be used to schedule automatic generation of
reports, which can be delivered via e-mail attachments or URLs. Reports can also be defined to require attestation by
auditors. Users can easily create new or customize PDF and XLS report templates to meet specific compliance and security
requirements.
Audit Vault Server provides optimal performance by expediting report generation with the help of Oracle Database In-
Memory feature, using which audit data can be stored in memory based on the selected date range, enabling reports to run
faster. Furthermore, the Audit Vault Server repository schema is documented and accessible, enabling integration with
third-party reporting solutions.
b) Summary Reports
c) Compliance Reports
a) Activity Reports:
Activity reports as shown below track database access activities such as audited SQL statements, application access
activities, and user logins. Specialized activity reports also cover failed logins, user entitlements, before-after data
modifications, changes to application tables, and database schema changes.
Entitlement reports as shown below describe the types of access that users have to an Oracle Database, providing
information about the users, roles, profiles, and privileges used. These reports are useful for tracking unnecessary access to
data, finding duplicate privileges, and simplifying privilege grants. An entitlement snapshot captures the state of user
entitlement information at a specific point in time. The snapshot contains the metadata of users and roles that a user has to
the Oracle Database: system and other SQL privileges, object privileges, role privileges, and user profiles. An entitlement
report job can be scheduled such that it periodically takes a snapshot of the user entitlements at specified intervals. After an
entitlement snapshot is generated, you can compare different snapshots to find how the entitlement information has
changed over time.
Correlation Reports helps correlate events on the database with the Linux OS user for Oracle Database targets running on
Linux. This is useful in cases where this OS user runs a shell or executes a command on the database as another user by
using su or sudo.
Database Firewall reports provide detailed event information on the SQL traffic to the monitored databases. For example,
details of SQL statements that had alerts enabled or were blocked can be seen. General information about SQL traffic to the
databases can be seen, including statement type (DDL, DML, etc.), database username, OS username, client application
name, client IP address, and Database Firewall action and threat level.
These Database Firewall reports as shown below, along with the other built-in audit reports provide a complete
understanding of the security and compliance status of the database environment.
A sample Database Firewall report, giving detailed information on the SQL traffic that is blocked by firewall policy rule is
shown below.
b) Summary Reports:
These set of reports contain trend charts, anomaly reports and various summaries by target (DDL summary, activity
summary, failed login summary) as shown below. These reports can be used to quickly review characteristics of user activity
on specific targets or across the enterprise. These reports can be used to identify anomalies such as new and dormant user
and client IP anomalies over time. Activities by new users, or previously dormant users, can be analyzed for potential
account hijacking.
c) Compliance Reports:
Standard out-of-the-box audit assessment reports are available and help to meet regulations such as:
• Data Privacy Reports (GDPR)
• Payment Card Industry Data Security Standard (PCI-DSS)
• Sarbanes-Oxley Act (SOX)
RBI Guidelines strongly recommend locating and cataloging sensitive information. RBI Guidelines also recommend closely
monitoring and controlling the movement of sensitive information across enterprise networks and on database systems.
AVDF allows importing information on sensitive data into its repository, thereby helping track activities on sensitive data
using the Data Privacy Reports. Refer to ‘Importing Sensitive Data Into Repository’ in the Audit Vault and Database
Firewall Auditor’s Guide for importing sensitive data discovery results from DBSAT /Oracle Enterprise Manager into AVDF.
A sample report showing sensitive data discovered in a specific target is shown below.
Sensitive data in
pdb1 database target
Through these Data Privacy reports, AVDF can closely monitor the movement and access of sensitive information in the
database and over the network. Enforcing controls on the access and movement of sensitive data over network can be
configured using Database Firewall in proxy deployment as detailed in Increase scrutiny of sensitive data access over
network.
Refer to ‘Reports’ in the Audit Vault and Database Firewall Auditor’s guide for in-depth details on the reports that are
available in AVDF to closely monitor and track activities.
Network traffic monitoring is an important component of Database Activity Monitoring. With near-zero overhead on the
monitored databases, network-based Database Activity Monitoring requires no modification to the databases, and can
monitor multiple heterogeneous database systems simultaneously. Network-based Database Activity Monitoring should be
used in conjunction with database auditing so that not only local activity on the database can be captured, but also any
database activity that doesn't cross the network as SQL, such as logging local or remote console connections, to make
database and user changes. An effective Database Activity Monitoring solution needs to combine native database auditing
with network-based monitoring for detecting intrusions.
One can classify the RBI Guidelines for network traffic monitoring into following three categories:
4.1. Network Segmentation
4.2. Deployment Topology
4.3. Firewall Policy
In this section, we will examine how the Database Firewall component of AVDF can help address the requirements outlined
in the RBI Guidelines.
RBI Guidelines recommend multiple layers of defense, known as defense in depth and highlights that at the minimum,
banks should consider protecting the perimeter and computing environment. It emphasizes that effective security
deployment requires carefully configured boundary defenses that separate networks with different threat levels, different
sets of users, and different levels of control. Effective multi-layered defense of perimeter networks help to lower the number
of successful attacks, allowing security personnel to focus on attackers who have devised methods to bypass boundary
restrictions. The following references in the RBI Guidelines highlight the importance of segmenting networks and building
boundary defenses.
Defense in depth for most organizations should at least consider the Ref 1, Page 39, Ability to support
following two areas: item 24.iv network traffic
monitoring of
(a) Protecting the enclave boundaries or perimeter
databases, which are in
(b) Protecting the computing environment. distinct enclave
boundaries.
An effective approach to securing a large network involves dividing
the network into logical security domains. A logical security domain
is a distinct part of a network with security policies that differ from
other domains and perimeter controls enforcing access at a network
level.
Network configuration considerations could include Ref 1, Page 39, Ability to enforce
item 24.v different policy rules
o Identifying the various applications and systems
(including blocking/
accessed via the network…
monitoring levels) for
o Determining the most appropriate network less trusted domains.
configuration to ensure adequate security and
performance for the bank..
Critical infrastructure of UCB (viz., NEFT, RTGS, SWIFT, CBS, ATM Ref 3, Page2, Ability to support
infrastructure) should be designed with adequate network separation Item 4.4 network separation by
controls providing a monitored
ingress point for
database traffic.
Recommendation:
If databases are located on different subnets (logical security domains), Database Firewall can use different network
interface into each of them for outbound connections from Database Firewall.
In proxy deployment mode, ensure that all database clients connect to the Database Firewall, which in turn connects to the
database servers in different logical security domains using the corresponding network interfaces. Proxy mode of
deployment supports blocking of SQL traffic in-addition to monitoring and is ideal for enforcing strict access control for
less-trusted domains. In the diagram below, databases are segmented into two logical security domains, Database Network 1
and Database Network 2.
A SQL statement between the client application and database server goes through the following steps.
A: The clients connect to the Database Firewall Traffic Proxy through the Network Router.
B: The extracted SQL data from the client traffic is analyzed and sent to the Audit Vault Server based on the Database
Firewall policy.
C: The traffic is forwarded to the target database in logical security domain1 by the Database Firewall over proxy source,
which represents the network interface for domain1.
D: The traffic is forwarded to the target database in logical security domain2 by the Database Firewall over proxy source,
which represents the network interface for domain2.
The firewall can be configured to run in proxy mode (where the client traffic goes through the firewall), or in out-of-band
mode or in host-monitor mode. In out-of-band/ host-monitor deployment mode, the Database Firewall receives a copy of
the database traffic for monitoring and is not in-line with the traffic from the clients. Hence, in this configuration the
database firewall can only be used for monitoring and not blocking. As part of the configuration, ensure that the host-
monitor deployed within the logical security domains is able to forward the traffic to the Database Firewall and connect to
the Audit Vault server. Consider out-of-band /host-monitor deployment mode when you want to monitor the traffic, and
there are other network perimeter controls to ensure stricter access (such as blocking) to the less-trusted domains.
For database systems requiring complete segregation from the rest of the corporate network due to the sensitivity of data,
consider having a dedicated Database Firewall appliance instance for the specific security domain.
RBI Guidelines specify the firewall types to choose from, and recommend selecting a firewall type based on characteristics of
the security zone, such as the amount of traffic, the sensitivity of the systems and data, and applications, as stated in
references below:
Financial institutions have four primary firewall types from which to Ref 1, Page 40, To be able to classify
choose: packet filtering, stateful inspection, proxy servers, and item 24.vii.a the firewall as one of
application-level firewalls. Any product may have characteristics of the RBI recommended
one or more firewall types. The selection of a firewall type is firewall types.
dependent on many characteristics of the security zone, such as the
amount of traffic, the sensitivity of the systems and data, and
applications.
Recommendation:
There are three deployment modes for Database Firewall. The capabilities of the firewall, and characteristics of its
implementation, are dependent on the deployment mode.
a) Proxy: One can configure Database Firewall in proxy mode such that all traffic to the database server is routed
through the Database firewall. The proxy mode of deployment supports both active and passive monitoring of
database activity. In this deployment mode, the Database Firewall can monitor and alert on SQL traffic, and can
block or substitute SQL statements as specified in the policy.
b) Out-of-Band: In this mode of monitoring, the Database Firewall receives a copy of the network traffic, including
client requests to the database and the database's response to those requests. Use spanning ports, network taps, or
packet replicators to copy database traffic to the firewall. In this mode, the Database Firewall can monitor and alert
on SQL traffic, but cannot block or substitute SQL statements.
c) Host Monitor: This is a specialized application of out-of-band. Database Firewall supports a local server-side
collection agent called the Host Monitor. This agent captures SQL traffic reaching the database server and securely
In this mode, the Database Firewall is in-line with the SQL traffic and the clients connect to the Database Firewall over TCP.
The Database Firewall makes an outbound connection to the database and forwards the SQL traffic only if the incoming
requests are allowed by the firewall policy. In this mode, the Database Firewall is an intermediary between internal and
external IP addresses. Hence, in proxy deployment mode, the Database Firewall acts as a combination of Proxy Server and
Application Firewall for the SQL traffic. Other controls, including traditional network firewalls or Database Vault should be
used to block direct access to the database that attempt to bypass the Database Firewall.
• Sybase: TDS
• MySQL: MySQL
• DB2: DARDA V5 specification (Distributed relational database architecture)
As a database proxy, the Database Firewall can understand and validate client properties including client IP address,
program module, and operating system user. The Database Firewall is not a general-purpose proxy, for instance there is no
access to information about packets nor caching capability. As an application firewall, the Database Firewall can understand
and validate database commands and offers logging capability as well as additional screening of the SQL statements.
Database Firewall policies are used to enforce access control, for example, allow only certain users access database from
specified IP addresses.
Host Monitor/ Out-of-band deployment mode:
In this mode, the Database Firewall receives a copy of database traffic, and can be configured only for monitoring and
alerting on network SQL traffic. Hence, the Database Firewall does not behave as an application firewall because it is not in -
line with the database traffic. This deployment mode cannot be used to enforce access control.
Consider using the proxy mode of deployment for very critical or sensitive database systems, which in addition to
monitoring and alerting, need a stricter prohibition of unauthorized activities at a layer closer to where the sensitive data
Non-proxy mode of deployment is recommended for database systems which are relatively less critical, or have other
complementary perimeter protection devices like filtering routers, web application firewall, gateways which already have the
capability to enforce stricter access control including blocking traffic.
All three modes of deployment (Proxy, Out-of-Band and Host Monitor) can monitor SQL traffic encrypted with Oracle Native
Network encryption for Oracle Databases.
RBI Guidelines emphasize the need for an effective firewall policy management to make sure that the IT infrastructure is
secured against unauthorized and potentially harmful traffic. Using a database firewall effectively requires creating and
establishing intelligent and targeted firewall policy decisions. A firewall policy dictates how Database Firewall should handle
SQL traffic for specific IP addresses, address ranges, protocols, applications, and content types (e.g., session content) based
on the organization’s information security policies. RBI Guidelines pertaining to structuring an effective firewall policy are
listed below.
A firewall policy states management’s expectation for how the Ref 1, Page 41, To be able to reject any
firewall should function and is a component of the overall security item 24.vii.a SQL traffic not explicitly
management framework. Acceptable inbound communication allowed and log SQL
types for the organization need to be explicitly defined in the traffic as specified in the
firewall policies. … policy.
Applications must also provide for, inter-alia, logging unsuccessful Ref 1, Page 25, To capture unsuccessful
logon attempts, access to sensitive options in the application, item 11.c.6 logon attempts and
e.g., master record changes, granting of access rights, use of system access to sensitive data.
utilities, changes in system configuration, etc.
Network boundary devices, including firewalls, network-based IPSs, Ref 1, Page 37, Ability to configure
and inbound and outbound proxies may be configured to log item 21.v.e logging of all traffic that
verbosely all traffic (both allowed and blocked) arriving at the device passes through the
firewall.
To be able to monitor
traffic across the
network boundary.
Banks use third-party service providers in a variety of different Ref 1, Page 38, To report on third-party
capacities. It can be an Internet service provider (ISP), application or item 23.i service provider
managed service provider (ASP/MSP) or business service provider activities within the
(BSP). These providers may often perform important functions for database.
the bank and usually may require access to confidential
information, applications and systems.
Firewalls: The main purpose of a firewall is access control. By Ref 1, Page 40, To block any
limiting inbound (from the Internet to the internal network) and item 24.vii.a communications not
outbound communications (from the internal network to the explicitly allowed.
Internet), various attack vectors can be reduced.
Network access by system engineers should be monitored and Ref 1, Page 46, Close scrutiny on
reviewed closely to detect unauthorized access to the network. item 24.viii.r system engineers by
constructing policies
specific to these users.
Banks may sometimes provide employees, vendors, and others with Ref 1, Page 46, Enabling remote access
access to the institution’s network and computing resources through item 25.i, item with greater monitoring
external connections. 25.iii.h,i,j,l along with logging. All
details such as IP, user,
Logging remote access communications, analyzing them in a
time, etc. needs to be
timely manner, and following up on anomalies…
captured.
.. subject the inbound and outbound network traffic to appropriate
perimeter protections and network monitoring
Instituting strong controls over remote access by privileged users Ref 1, Page 20, Privileged user remote
item 5.(xiii).b access monitoring to be
done using policies
specific to these users.
Have mechanism to automatically identify unauthorised device Ref 2, Page 9, Close supervision of
connections to the bank’s network and block such connections. item 4.6, item network access and
4.7, item 4.9 creation of policies that
Put in place mechanism to detect and remedy any unusual activities
alert on unusual access.
in systems, servers, network devices and endpoints.
Implement controls to minimize invalid logon counts, deactivate Ref 2, Page 11, Monitors invalid logins
dormant accounts. item 8.6, item and detect changes in
8.7 logon patterns.
Monitor any abnormal change in pattern of logon.
Consider implementing whitelisting of internet websites/systems. Ref 2, Page 14, Ability to whitelist and
item 13.3, item create policies is
Consider implementing secure web gateways with capability to deep
13.4 needed.
scan network packets including secure (HTTPS, etc.) traffic passing
through the web/internet gateway
Put in place mechanism to detect and remedy any unusual Ref 4, Page 7, To detect unusual
activities in systems, servers, network devices and endpoints. item 1.1, item 1.2 activities in databases.
Firewall rules shall be defined to block unidentified outbound
connections, reverse TCP shells and other potential backdoor
connections.
Recommendation:
RBI recommends that a good firewall practice should disallow all inbound traffic that is not specifically allowed or
permitted—traffic that is not needed by the organization. This practice, known as deny by default, decreases the risk of
attack. Whitelisting is a deny by default approach. Because of the dynamic nature of hosts, networks, protocols, and
applications, deny by default(i.e. whitelisting) is a more secure approach than permitting all traffic that is not explicitly
forbidden(i.e. blacklisting). To set up a whitelist policy, create a policy that monitors “normal" user behavior and use the
observed SQL traffic to create whitelist policies.
The Database Firewall policy is a combination of different rules like Session Context Rules, SQL Statement Rules, Database
Object Rules and Default Rules. Database Firewall in AVDF is a multi-stage Firewall policy rule-processing engine as shown
below in the diagram. The rule processing happens sequentially with the first match determining the appropriate action.
Session context rules based on whitelisting approach, provides a powerful means of controlling SQL requests based on
known sets of session attributes. These rules override all other policy rules and determine the action, logging level and
threat severity to use when certain session activity is observed. Session attributes that can be used are the following:
Consider creating ‘Session Context rules’ to allow specific traffic from trusted application paths without needing them to go
through further processing in the Database Firewall policy engine (e.g. SQL requests from a trusted set of whitelisted client
IPs). Combining multiple sets (for example, IP with database user or IP with OS user) provides flexibility in narrowing down
the permitted traffic through the Database Firewall. Any traffic, which does not fit the whitelist, is subjected to monitoring or
blocking using a combination of Action, Logging, Threat Severity and Escalation.
A sample session context rule is shown below, that allows the SQL traffic from specific set of whitelisted DBA users ( as
configured in the set ‘Allow DBAs’) to pass through the firewall policy.
SQL Statement rules are executed after the session context rules. The Database Firewall automatically captures, analyzes the
actual SQL traffic and classifies similar SQL statements into groups known as clusters. Consider creating whitelists of SQL
Cluster sets and specify Action, Logging level and Threat severity for each SQL cluster set in the analyzed SQL policy rule.
Whitelists of “normal” behavior could also be automatically created by running the Database Firewall in training mode with
Log Unique default policy (where it logs unique SQL statement) and capturing a set of expected SQLs representing normal
traffic, such as the set of SQL generated in a test or QA system.
A sample SQL Statement rule is shown below, that allows a trained set of SQL statements from HR application to access the
database (as configured in the set ‘Normal HR Application SQL’).
Allow the trained SQL traffic as
specified in the set ‘Normal HR
Application SQL’
It is recommended to use SQL Statement firewall policy rules only when all the trusted application paths accessing the
database are well known, including the expected SQL traffic. Any anomaly in the SQL network traffic, which is not yet
profiled, can be captured with this rule. Utilize this firewall policy rule for databases with highly sensitive and/or critical IT
assets, especially for applications accessible over the public internet.
Database Object rules can be used to prevent or allow specific types of SQL statements (DML, DCL, etc.) acting on specific
database objects such as tables and views. Consider these rules to increase scrutiny of sensitive data access over network.
Database object rules let you closely monitor network activities on sensitive tables in the database. These rules can prevent
or allow specific types of SQL statements acting on specific database tables. For instance, allow only SELECTS on application
tables but warn/alert if there are attempts to perform data modification on sensitive application tables.
These rules are often used for controlling behavior of privileged users over the network where it might be necessary to stop
them from accessing specific sensitive application database objects.
A sample database object rule is shown below, that raises an alert if SQL traffic has any DML activity (insert, update or
delete) on any of the two sensitive tables.
d) Default rule:
The default Rule is a catch-all rule where SQLs that does not match any of the above rules are acted upon. In the whitelisting
approach, it is recommended to alert with major threat severity so that any unseen SQL traffic is alerted on and marked as
actionable. In highly critical systems, consider using a blocking/ blocking-with-substitution action after the firewall is trained
to understand all the normal expected traffic.
The various rules are explained in detail in ‘Database Firewall Deployment’ in the Audit Vault and Database Firewall
Concepts Guide.
Consider incorporating the following firewall policy configuration best practices to help comply with RBI Guidelines:
a) Whitelist the client IP addresses that are authorized to access the database systems. For instance,
corporate network addresses that trusted clients will use to access the database. Any remote access
not originating from whitelisted client IP addresses warrants a higher level of scrutiny as indicated in
RBI Guidelines and can be configured to send an alert or be blocked.
b) Whitelist the database client programs that are authorized to connect to the database over specific
client IP address.
c) Whitelist the database users (application service accounts) expected from the client IP addresses
accessing the database systems using authorized client programs. Consider creating a combination of
client IP address, database users (application service accounts) and database client programs.
A sample escalation policy is shown below, that allows SQL traffic to pass the firewall. But if the same SQL traffic is seen
multiple times (as configured in threshold), the SQL traffic is blocked and replaced with a substitution SQL statement.
e) Database administrators are frequently given direct /SSH access to the database server. Database and
operating system auditing should be used to closely monitor their activities. For remote database
access, it is imperative to monitor and closely review the activity by these privileged administrators,
especially if there is any deviation from normal pattern of access. Consider monitoring the following
actions of these privileged administrators over the network:
o If the privileged database users are accessing over the network from the whitelisted client IP
addresses. Generate an alert with setting (Action =Warn, Logging Level=Unique) and indicate
the threat severity to a level that is actionable.
o If privileged database users are accessing from non-whitelisted client IP address, further
firewall policy rules like Database Object rules, SQL Statement rules and Default Rules can
factor in increased scrutiny of their actions.
o Repetitive SQLs attempts by privileged database users from whitelisted client IP addresses
firing the same SQL in specified threshold can be flagged as potential anomaly by creating an
escalation policy where Logging Level and Threat Severity can be increased.
f) If there are third party service providers in the system (differentiated by specific OS user/database
user), subject them to a higher level of scrutiny as indicated in RBI Guidelines even if their access is
through whitelisted client IP address. Recommend not whitelisting these users.
b) Remote access through public networks to sensitive assets and activities carrying higher risk like
third-party fund transfers
c) Third-party access to sensitive data/information
A sample policy configuration is show below, that detects five consecutive failed login attempts and blocks the client
connection for a minute.
Consider following these best practices for enabling logging in Database Firewall policy:
a) Be selective in what you log
b) Log all SQL for users with elevated privileges
c) Set Policy action to ‘Pass’ regular application activity
The Database Firewall sends the captured firewall events to the Audit Vault Server. There is a default alert policy rule called
‘Database Firewall Alert’, which processes all the firewall events in ‘Warn’ or ‘Bock’ status (as determined by the Action in the
firewall policy rules), and generates alerts.
A sample alert report is shown below, that provides the details of the alerted SQL traffic using the default firewall alert policy.
For continuous monitoring of network activity for detecting unusual traffic patterns, consider using Database Firewall
reports as given in Establish Proactive Security Monitoring Practices, including Sensitive Data Access.
CONCLUSION
Database Activity Monitoring is one of the key requirements for RBI compliance on cyber security regulations. RBI
recommends that banks address network and database security comprehensively.
By using Oracle Database’s native auditing feature, and Oracle Audit Vault and Database Firewall (AVDF), banks can not only
accelerate their implementation but also achieve comprehensive security controls for their sensitive data.
APPENDIX
A sample procedure, which populates application context attributes from gv$session and userenv, and the audit
configuration which captures the context attributes in the audit trail, is shown below.
APPLICATION_CONTEXTS
----------------------------------------------
(APP_CTX,[email protected](TNSV1-V3));
(APP_CTX,SERVICE_NAME=adm.DEV);(APP_CTX,UNIQUE_SESSION_ID=029D07880001);
Copyright © 2020, Oracle and/or its affiliates. All rights reserved. This document is provided for information purposes only, and the contents hereof are subject to change without
notice. This document is not warranted to be error-free, nor subject to any other warranties or conditions, whether expressed orally or implied in law, including implied warranties
and conditions of merchantability or fitness for a particular purpose. We specifically disclaim any liability with respect to this document, and no contractual obligations are formed
either directly or indirectly by this document. This document may not be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without
our prior written permission.
Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.