Miss Scarlet with a lead pipe, in the library Players: 3 to 6 Contents: Clue game board, six suspect tokens, six murder weapons, 21 cards, secret envelope,

Slides:



Advertisements
Similar presentations
BalaBit Shell Control Box
Advertisements

Oracle Audit Vault and Database Firewall
1 Auditing the DBA: What non-technical managers and auditors should know. Presented By Cam Larner Cam Larner President President Absolute Technologies,
Database Vault Welcome, today I’d like to present an overview of the latest security product from Oracle – Database Vault. We announced this new product.
Oracle Database Security
Audit Issues regarding Passwords on Elevated Privilege Accounts Gene Scheckel Global Internal Audit.
Database Vault Marco Alamanni
Oracle9i Database Administrator: Implementation and Administration 1 Chapter 12 System and Object Privileges.
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Oracle Database Vault with Oracle Database 12c Chi Ching Chui Senior Development.
Database Management System
Chapter 9 Auditing Database Activities
System Administration Accounts privileges, users and roles
Advanced Databases Basic Database Administration Guide to Oracle 10g 1.
ORACLE DATABASE SECURITY
1. Oracle Database 11g Release 2 Security Update and Plans Defense-in-Depth Vipin Samar Vice President, Oracle Database Security.
Database Security Managing Users and Security Models.
10 Copyright © 2005, Oracle. All rights reserved. Implementing Oracle Database Security.
1 S Database Auditing Demystified: The What, the How, and the Why.
Adapted from Afyouni, Database Security and Auditing DB Auditing Examples (Ch. 9) Dr. Mario Guimaraes.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
A Comprehensive Solution Team Mag 5 Valerie B., Derek C., Jimmy C., Julia M., Mark Z.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
Database Technical Session By: Prof. Adarsh Patel.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 6 Virtual Private Databases.
CSIS 4310 – Advanced Databases Virtual Private Databases.
Extreme Blue © 2004 IBM Corporation Eunomia HDB Compliance Auditing System Architecture.
1Introduction Objectives 1-2 Course Objectives 1-3 Oracle Products 1-4 Relational Database Systems 1-5 How the Data Is Organized 1-6 Integrity Constraints.
Week 6 Lecture 2 System and Object Privileges. Learning Objectives  Identify and manage system and object privileges  Grant and revoke privileges to.
SEC835 Practical aspects of security implementation Part 1.
Security David Frommer Principal Architect Business Intelligence Microsoft Partner of the Year 2005 & 2007.
Introduction to SEQUEL. What is SEQUEL? Acronym for Structural English Query Language Acronym for Structural English Query Language Standard language.
The protection of the DB against intentional or unintentional threats using computer-based or non- computer-based controls. Database Security – Part 2.
Sensitive Metric Collection and Reporting System Michael Aiello Hanning Gao Martin Goldberg Michael Sosonkin Jason Woloz.
C6 Databases. 2 Traditional file environment Data Redundancy and Inconsistency: –Data redundancy: The presence of duplicate data in multiple data files.
Managing users and security Akhtar Ali. Aims Understand and manage profiles Understand and manage users Understand and manage privileges Understand and.
Roles & privileges privilege A user privilege is a right to execute a particular type of SQL statement, or a right to access another user's object. The.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 9 Auditing Database Activities.
SQL Fundamentals  SQL: Structured Query Language is a simple and powerful language used to create, access, and manipulate data and structure in the database.
Database Role Activity. DB Role and Privileges Worksheet.
Database Security. Multi-user database systems like Oracle include security to control how the database is accessed and used for example security Mechanisms:
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Advanced Databases DBA: Security 1. Advanced Databases Agenda Understand the need for security. Learn about System Permissions and Object permissions.
SQL Server 2005 Implementation and Maintenance Chapter 6: Security and SQL Server 2005.
Oracle 11g: SQL Chapter 7 User Creation and Management.
Chapter 6 Virtual Private Databases
Intro To Oracle :part 1 1.Save your Memory Usage & Performance. 2.Oracle Login ways. 3.Adding Database to DB Trees. 4.How to Create your own user(schema).
11 Copyright © 2007, Oracle. All rights reserved. Implementing Oracle Database Security.
SQL Introduction to database and SQL. Chapter 1: Databases and Database Users 6 Introduction to Databases Databases touch all aspects of our lives. Examples:
SQL SERVER AUDITING. Jean Joseph DBA/Consultant Contact Info: Blog:
C Copyright © 2007, Oracle. All rights reserved. Security New Features.
SQL Server Security The Low Hanging Fruit. Lindsay Clark Database Administrator at American Credit Acceptance
Encryption DB2 Field Encryption for IBM i. The Need for Encryption PCI-DSS, HIPAA, FDA 21 CFR Part 11, and other regulations Use cases: Credit Card Numbers,
Vormetric Encryption Architecture Overview Protecting Enterprise Data at Rest with Encryption, Access Controls, and Auditing.
1 Copyright © 2005, Oracle. All rights reserved. Oracle Database Administration: Overview.
ORACLE's Approach ORALCE uses a proprietary mechanism for security. They user OLS.... ORACLE Labeling Security. They do data confidentiality They do adjudication.
Defense In Depth: Minimizing the Risk of SQL Injection
Microsoft SQL Server 2014 for Oracle DBAs Module 8
“Introduction To Database and SQL”
Security Management: Successes and Failures
Common Security Mistakes
Limiting SQL Server Exposure
Offices: DC, London, Sydney
Limiting SQL Server Exposure
SQL .. An overview lecture3.
Lecuter-1.
INTRODUCTION A Database system is basically a computer based record keeping system. The collection of data, usually referred to as the database, contains.
IT Management, Simplified
IT Management, Simplified
Presentation transcript:

Miss Scarlet with a lead pipe, in the library

Players: 3 to 6 Contents: Clue game board, six suspect tokens, six murder weapons, 21 cards, secret envelope, one die, pad of detective notebook sheets. Goal: To correctly name the murderer, murder weapon, and murder location. Setup - Sort the cards by type and shuffle each pile face- down. Without looking, take one suspect card, one weapon card, and one room card, and slide them into the secret envelope. Cluedo - the game

Cluedo - the tools

During setup... 1.Show all the players the cards before putting them in the secret envelope 2.Have a camera identifying the cards that goes into the secret envelope 3.Or have video cameras throughout the board scene This will save a lot of time Save some trees because of the detective notes So instead of going through all the clues and detective notes we would solve the crime Cluedo – the solution

Deon Roos Enterprise Architect Oracle Corporation South Africa

Developer End User Power Users Quality Assurance Prod Dev, QA, Test Report Server Storage Sys Admin Network Admin Storage Admin DBA HW Vendor Backup Server hAck3rs

Database Defense-in-Depth Access Control Oracle Database Vault Oracle Label Security Oracle Advanced Security Oracle Secure Backup Oracle Data Masking Encryption and Masking Auditing and Monitoring Oracle Audit Vault Oracle Configuration Management Oracle Total Recall Oracle Database Firewall Blocking and Logging Encryption & Masking Access Control Auditing & Monitoring Blocking & Logging

Database Defense-in-Depth Access Control Oracle Database Vault Oracle Label Security Oracle Advanced Security Oracle Secure Backup Oracle Data Masking Encryption and Masking Auditing and Monitoring Oracle Audit Vault Oracle Configuration Management Oracle Total Recall Oracle Database Firewall Blocking and Logging Encryption & Masking Access Control Auditing & Monitoring Blocking & Logging

Developer End User Power Users Quality Assurance Prod Dev, QA, Test Report Server Storage Sys Admin Network Admin Storage Admin DBA HW Vendor Backup Server SSL hAck3rs

Database Defense-in-Depth Access Control Oracle Database Vault Oracle Label Security Oracle Advanced Security Oracle Secure Backup Oracle Data Masking Encryption and Masking Auditing and Monitoring Oracle Audit Vault Oracle Configuration Management Oracle Total Recall Oracle Database Firewall Blocking and Logging Encryption & Masking Access Control Auditing & Monitoring Blocking & Logging

Developer End User Power Users Quality Assurance Prod Dev, QA, Test Report Server Storage Sys Admin Network Admin Storage Admin DBA HW Vendor Backup Server Sensitive Confidential Public hAck3rs

Database Defense-in-Depth Access Control Oracle Database Vault Oracle Label Security Oracle Advanced Security Oracle Secure Backup Oracle Data Masking Encryption and Masking Auditing and Monitoring Oracle Audit Vault Oracle Configuration Management Oracle Total Recall Oracle Database Firewall Blocking and Logging Encryption & Masking Access Control Auditing & Monitoring Blocking & Logging

Developer End User Power Users Quality Assurance Prod Dev, QA, Test Report Server Storage Sys Admin Network Admin Storage Admin DBA HW Vendor Backup Server Auditing vault hAck3rs Configuration Management & Audit Vulnerability Management Fix Analysis & Analytics Prioritize Policy Management AssessClassify Monitor Discover Asset Management

`

Why Audit? Compliance Mandates It –SOX, PCI-DSS, HIPAA ….. Your auditor told you to do it You don’t want to end up in the news Maintain customer trust

Detective controls –Monitor privileged application user accounts for non-compliant activity – trust but verify –Audit non-application access to sensitive data (credit card, financial data, personal identifiable information, etc) –Verify that no one is trying to bypass the application security controls –Line items are changed in order to avoid business processes and approvals Cost of compliance –Eliminate costly and complex scripts for reporting –Reduce reporting costs for specific compliance audits Business drivers

Statement Auditing Statement auditing audits SQL statements by type of statement, not by the specific schema objects on which the statement operates Data definition statements (DDL). Data manipulation statements (DML). Object Auditing Schema object auditing is the auditing of specific statements on a particular schema object. Privilege Auditing Privilege auditing is the auditing of SQL statements that use a system privilege. You can audit activities of all database users or of only a specified list of users. Standard Auditing

Database Audit Tables –Collect audit data for standard and fine-grained auditing Oracle audit trail from OS files –Collect audit records written in XML or standard text file Operating system SYSLOG –Collect Oracle database audit records from SYSLOG Redo log –Extract before/after values and DDL changes to table Database Vault specific audit records User Object Statement Privilege Condition AUD$ REDO Log FGA_LOG$ Audit on Logged in OS Logs

●●●●●● Failed Logins Do you have visibility of failed logins and other exception activities? ●●●●●● Accounts, Roles & Permissions Do you have visibility of GRANT and REVOKE activities? ● ● ● FISMA ● ● ● ● Basel II ●●●● Privileged User Activity Do you have visibility of users activities? ●●●● Schema Changes Are you aware of CREATE, DROP and ALTER Commands that are occurring on identified Tables / Columns? ● Data Changes Do you have visibility into Insert, Update, Merge, Delete commands? ●●● Access to Sensitive Data Can you have visibility into what information is being queried (SELECTs)? GLBAHIPAA PCI DSS SOX Database Audit Requirements What do you need to audit? Health Insurance Portability Account Act - Federal Info Sec Man Act – Gramm-Leech-Bliley Act

Siebel MS SQL Server 2000, 2005, & 2008 Sybase ASE x HCM Audit Data Policies Built-in Reports Alerts Custom Reports ! Auditor Various DB sources Adapters for packaged applications Oracle DB on Linux, Unix, Windows Easy to use reports Central provisioning of policies Meet compliance reporting Proactive – alerts & notifications (SMS/ ) Pre-defined & custom reports A Encryption in transit Audit warehouse Secured audited data Segregation of duties Completeness of audit Encryption at rest Consolidated auditing Performance & scalability Oracle Audit Vault Automated Activity Monitoring & Audit Reporting

Default reports

Out of the box - Compliance reports

Database Defense-in-Depth Access Control Oracle Database Vault Oracle Label Security Oracle Advanced Security Oracle Secure Backup Oracle Data Masking Encryption and Masking Auditing and Monitoring Oracle Audit Vault Oracle Configuration Management Oracle Total Recall Oracle Database Firewall Blocking and Logging Encryption & Masking Access Control Auditing & Monitoring Blocking & Logging

hAck3rs Developer End User Power Users Quality Assurance Prod Dev, QA, Test Report Server Storage Sys Admin Network Admin Storage Admin DBA Backup Server hack3rs

oracle.com/database/security search.oracle.com database security For more Information