Database Security On Premises - Day3 - Compressed
Database Security On Premises - Day3 - Compressed
On-Premises - Overview
Mostafa Emam
Principal Solutions Engineer
Agenda
NCUA
PIPEDA FOIPPA
FS-ISAC GLBA
RU DPA
CCPA FFIEC HIPAA CIP
SA ECTA
Cl PPL AU APP
NZ PA
FIPS
AR PDPL
140-2
6 Copyright © 2021, Oracle and/or its affiliates
The Oracle
Database Security
Story
Users
Exploit Database
Attack Users
Attack Network
Database Admins
RECORD
Attack Apps
OTHER PII
SECRETS
Test Dev
Bypass Database Database Clones
Attack Admins
Assess Data
Assess the current state of Data stored in a database is
security for the database your organization’s most
valuable asset, but also a
source of significant risk.
Detect Data
Detect attempts to access & Users
data, especially attempts Users
that violate policy
Users and applications
connecting to your database
Prevent are prime targets
Prevent unauthorized or
out-of-policy access to data
10 Copyright © 2021, Oracle and/or its affiliates
Maximum Security Architecture
Data Redaction
Users
Database Firewall
Network Encryption
Alerts
Transparent Oracle Test Dev
Reports Data Encryption Key Vault
Data Masking and Subsetting
Audit Data & Event
Policies Logs
Database+Big Data Security Leadership Database-as-a-Service Wave, June 2019 Operational DBMS Critical Capabilities, Oct. 2018
Compass, Jun ‘19 https://reprints.forrester.com/#/assets/2/132/ https://www.gartner.com/doc/reprints?id=1-
RES144407/reports 5LPN68L&ct=181015&st=sb
16 Copyright © 2021, Oracle and/or its affiliates Oracle Confidential – NOT FOR PUBLIC USE
Security for Oracle Databases
On-Premises
Assess Configuration Identify Risky Users Discover Sensitive Data Assessment Reports
Patches Database accounts What type, where, and Summary and detailed
Data Encryption User privileges how much? information
Auditing policies User roles Prioritized, actionable
Sample pattern files for and target specific
OS file permissions Greek, German, Dutch, recommendations
Database configuration French, Spanish, Italian, Mapping to EU GDPR,
Listener configuration and Portuguese based STIG and CIS
data models as well. Benchmark
Fine-grained access
control
Runs on 11g to 21c
Oracle Databases
Keep
Used Roles/Privileges
DBA Create …
Select …
Custom Update …
DBA role
applications
…. Audit, Consider Removing
Unused Roles/Privileges
Dashboard Alerts
• Supports both on premises and Cloud secured targets for audit log collection
• Can be deployed on-premises
Data Transparent
Redaction Data
Encryption
Disks
XXXX-XXXX-XXXX-1881
5454-5454-5454-5454
5111-1111-1111-1118
FASqw 34 £$1
DF@ £!1ah HH! Exports
DA45S& DD1
Redacted Encrypted
Display Data
e.g. Under
GDPR:
Disks
Clear Data
Encrypted Network Connection OTHER
TABLESPACE
DF11233 U*1
$5Ha1qui %H1 Backups
HSKQ112 A14
FASqw 34 £$1
HCM DF@ £!1ah HH!
DA45S& DD1 Exports
(TLS or Native Encryption) TABLESPACE
Applications Off-Site Facilities
Encrypted
Data
Software Key
Keystore Vault
TDE
Data encryption keys are created and managed by Encrypted
TDE automatically Master Columns
OR Key
The master encryption key encrypts the data TDE
Encrypted
encryption keys Tablespace
Key Tablespace
Authorized
Display
4012-8888-8888-1881
Sensitive Data
XXXX-XXXX-XXXX-1881 4012-8888-8888-1881
5454-5454-5454-5454
Redacted 5111-1111-1111-1118
Display Applications
• Dynamic masking of application data based upon user name, IP, application
context, and other session factors
• Library of redaction policies and point-and-click policy definition
• No impact on operational activities
GoldenGate 19.1
Java Keystore encrypted trail files
Download
Use Case 1
Upload / Download
Upload
Wallet Backup
Wallet
Use Case 2
Online Master Key
Master Key
Fetch
Use Case 3
Secrets Management Register
User
Secrets
App
50 Copyright © 2021, Oracle and/or its affiliates
What’s New with Oracle Key Vault 21?
Testing Development Cloud Partners Analytics Demo Training Research & More...
Production
Generate random values while preserving format Mask operating system files stored as LOBs
Name License# Name License# LOB LOB
Search : [0-9]{10}
Richard 7ZPN788 Richard 5AMC942 3178973456 Replace : * **********
Rishabh DL 12TC 0204 Rishabh KP 73GD 1948 6509876745 **********
Table Partitions
JAN JAN
SALES SALES
FEB FEB
EMEA APAC
in the Database
CloudOps SYS
User
DBA
Sensitive Data What about the front door?
4012-8888-8888-1881 Database Vault
5454-5454-5454-5454
5111-1111-1111-1118
Storage Admin
DF112334ggU*1
1 4012-8888-8888-1881
2 5454-5454-5454-5454
$5Ha1qui%43H1
3 5111-1111-13111-1118
Transparent Data Encryption
HSKQ112A144e
4 5454-5454-5999-5454
5 3111-8811-1111-1118
FASqw34£$14g!
6 3478-5352-5411-8744
Administrator
7 4758-0341-1111-1118
Encrypted
Data
Minimize impact to
• Applications
• Performance
• High Availability
• Operations
Separation of Duty
Separation of Duty
Trusted Path
Trusted Path
Prevent Database Change
DBA
Simulation Mode
• Reduce upfront analysis
• Reduce cycles
Benefit
• New use case for multitenant database for
on-premises customers
• Transparently prevent Cloud Admin
(infrastructure DBA) access to PDB data
• Protected by default for every PDB customer – no
customer action required
• No special SOD processes for PDB customers –
operate the same way they do today
• Adds to any existing PDB customer Database Vault
protections - without changes
• Simpler, faster Database Vault
implementation
Authorize
Users Control Access to Sensitive Data
LABELS DATA
Label Data
Confidential
Sensitive
Assess Data
Config-Assessment(DBSAT, DBLM) Label Security
Data Discovery Virtual Private Database (VPD)
Privilege Analysis* Real Application Security (RAS)*
DB Cryptographic Toolkit
Detect Data
Activity Auditing & Users
Audit Vault Users
Database Firewall* Password, PKI, Kerberos, Radius
Proxy Users, Password Profiles
Roles and Privileges
Prevent Oracle & Active Directory
Transparent Data Encryption & Key Vault
Data Masking, Data Redaction
Database Vault*
81 Copyright © 2021, Oracle and/or its affiliates * Unique to Oracle
Questions !!!!