1. 2 Introduction This presentation describes introduction of data encryption into Oracle databases and how “Transparent Data Encryption” in Oracle 11g.

Slides:



Advertisements
Similar presentations
The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any.
Advertisements

Chris Ruel * Image used without permission.
Chapter 20 Oracle Secure Backup.
<Insert Picture Here>
An investigation into the security features of Oracle 10g R2 Enterprise Edition Supervisor: Mr J Ebden.
Notes: Update as of 1/13/2010. Vulnerabilities are included for SQL Server 2000, SQL Server 2005, SQL Server Oracle (8i, 9i, 9iR2, 10g, 10gR2,11g),
The twenty-four/seven database Oracle Database Security David Yahalom Senior database consultant
Oracle Database Security
The New Data Pump Caleb Small Next generation Import / Export New features Better performance Improved security Versatile interfaces.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Electronic Transaction Security (E-Commerce)
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Securing Data Storage Protecting Data at Rest Advanced Systems Group Dell Computer Asia Ltd.
Harvard University Oracle Database Administration Session 2 System Level.
Notes: Update as of 12/31/2010 inclusive. Chart counts NIST CVE – Reported Software Flaws by “published” date, utilizing the NIST NVD. SQL Server.
Dr Alejandra Flores-Mosri Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
15 Copyright © 2006, Oracle. All rights reserved. Database Security.
Backup Concepts. Introduction Backup and recovery procedures protect your database against data loss and reconstruct the data, should loss occur. The.
ORACLE DATABASE SECURITY
Introduction to Oracle Backup and Recovery
Oracle TDE -11gR2.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
PPOUG, 05-OCT-01 Agenda RMAN Architecture Why Use RMAN? Implementation Decisions RMAN Oracle9i New Features.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
The Right Choice for Call Recording OAISYS and PCI DSS Compliance Managing Payment Card Industry Compliance with OAISYS Call Recording Solutions.
CHAPTER 11 Large Objects. Need for Large Objects Data type to store objects that contain large amount of text, log, image, video, or audio data. Most.
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
Jim McLeod MyDBA  SQL Server Performance Tuning Consultant with MyDBA  Microsoft Certified Trainer with SQLskills Australia 
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
Credit Card Processing Gail “Montreal” Shoffey Keeler August 14, 2007.
Transparent Data Encryption Explained
Chapter 7 Making Backups with RMAN. Objectives Explain backup sets and image copies RMAN Backup modes’ Types of files backed up Backup destinations Specifying.
Cao Tiến Đức. Outline What is TDE How TDE works Basic TDE operations Tablespace encryption HSM Reference.
Roy Ernest Database Administrator Pinnacle Sports Worldwide SQL Server 2008 Transparent Data Encryption.
Introduction to Payment Card Industry Data Security Standard
1 Oracle Database 11g – Flashback Data Archive. 2 Data History and Retention Data retention and change control requirements are growing Regulatory oversight.
7202ICT Database Administration Lecture 7 Managing Database Storage Part 2 Orale Concept Manuel Chapter 3 & 4.
ORACLE
SEC835 Practical aspects of security implementation Part 1.
Additional Security Tools Lesson 15. Skills Matrix.
Transparent Data Encryption
Database Security and Data Protection Suseel Pachalla, CISSP.
Database structure and space Management. Database Structure An ORACLE database has both a physical and logical structure. By separating physical and logical.
Week 4 Lecture 2 Advanced Table Management. Learning Objectives  Create tables with large object (LOB) columns and tables that are index-organized 
Database Storage Structures
Database Security. Multi-user database systems like Oracle include security to control how the database is accessed and used for example security Mechanisms:
ThankQ Solutions Pty Ltd Tech Forum 2013 PCI Compliance.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Data Confidentiality Oracle Security Do Tri Tuc
11 Copyright © 2007, Oracle. All rights reserved. Implementing Oracle Database Security.
Secure Data Access with SQL Server 2005 Doug Rees Associate Technologist, CM Group
C Copyright © 2007, Oracle. All rights reserved. Security New Features.
SQL SATURDAY #444 – Kansas City, MO. A LOOK AT ALWAYS ENCRYPTED SQL SATURDAY #444 – KANSAS CITY, MO DAVE WALDEN PRINCIPAL SOLUTIONS ARCHITECT DB BEST.
8 Copyright © 2007, Oracle. All rights reserved. Implementing SecureFile LOBs.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
Secure SQL Database with TDE Thomas Chan SQL Saturday Raleigh.
The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle branded credit.
Security Policy and Key Management Centrally Manage Encryption Keys - Oracle TDE, SQL Server TDE and Vormetric. Tina Stewart, Vice President.
SQL Server Encryption Ben Miller Blog:
ORACLE's Approach ORALCE uses a proprietary mechanism for security. They user OLS.... ORACLE Labeling Security. They do data confidentiality They do adjudication.
Controlling User Access
PCI-DSS Security Awareness
Chapter 5 : Designing Windows Server-Level Security Processes
Database Security.
Transparent Data Encryption (TDE)
Presentation transcript:

1

2 Introduction This presentation describes introduction of data encryption into Oracle databases and how “Transparent Data Encryption” in Oracle 11g can benefit DBAs in achieving compliancy with Payment Card Industry Data Security Standard.

3 Content Identification of threats Basic framework of Oracle security PCI requirements What is Encryption ? Encryption in Oracle: DBMS_OBFUSCATION_TOOLKIT, DBMS_CRYPTO, TDE Demo of Transparent Data Encryption

4 Identification of Threats What are the Common Security Threats ? Eavesdropping and Data Theft Data Tampering Falsifying User Identities Password Related Threats

5 Basic Framework of Oracle Security Securing database during installation Securing user accounts Managing user privileges Auditing database activity Securing network Securing data (encryption, VPD, Database Vault)

6 PCI Requirements What is Payment Card Industry Data Security Standard (PCI DSS) ? Founded by American Express, Visa, MasterCard, Discover Financial Services, and JCB The standards apply to all organizations that store, process or transmit cardholder data Any company processing, storing, or transmitting cardholder data must be PCI DSS compliant

7 The Core Elements of DSS Build and Maintain a Secure Network Protect Cardholder Data (encryption) Maintain a Vulnerability Management Program Implement Strong Access Control Measures Regularly Monitor and Test Networks Maintain an Information Security Policy

8 What is encryption ? Transformation of information using “encryption algorithm” into a form that can not be deciphered without a decryption key

9 Two types of encryption: Symmetric key encryption Public-key (asymmetric key) encryption

10 Symmetric Key Encryption Method in which both the sender and receiver share the same key

11

12 Public Key Encryption The public key is freely distributed, while its paired private key remains secret The public key is typically used for encryption, while the private or secret key is used for decryption

13

14

15 Encryption Algorithms Supported by Oracle RC4 DES (Oracle 8 and 9) 3DES (Oracle 10) AES (Oracle 11)

16 DBMS_OBFUSCATION_TOOLKIT Introduced in Oracle 8i Uses DES algorithm

17 Syntax DBMS_OBFUSCATION_TOOLKIT.DES3Encrypt( input_string IN VARCHAR2, key_string IN VARCHAR2, which IN PLS_INTEGER DEFAULT TwoKeyMode iv_string IN VARCHAR2 DEFAULT NULL) RETURN VARCHAR2; DBMS_OBFUSCATION_TOOLKIT.DES3DECRYPT( input_string IN VARCHAR2, key_string IN VARCHAR2, which IN PLS_INTEGER DEFAULT TwoKeyMode iv_string IN VARCHAR2 DEFAULT NULL) RETURN VARCHAR2;

18 Key Management Store the key in the database Store the key in the operating system Have the user manage the key

19 DBMS_CRYPTO Released in Oracle 10.1 Supports AES Provides automatic padding Different options for block chaining Support for CLOB and BLOB Will deprecate dbms_obfuscation_toolkit

20 Real Life Both packages are complicated to use Key management represents a problem Encryption / decryption must be done through the application Not used as often as it should be Solution ?

21 Transparent Data Encryption (TDE) Introduced in Oracle 10.2 – column encryption Enhanced in Oracle tablespace encryption

22 How is TDE Implemented? 1 Setup Wallet and Master Key 2Identify columns with sensitive data 3Review constraints 4Encrypt existing and new data

23 Wallet Default wallet location $ORACLE_BASE/admin/$ORACLE_SID/wallet Alternative location specified in sqlnet.ora wallet_location encryption_wallet_location ewallet.p12 Created by creating a new Master key: alter system set encryption key identified by “password “; Load the Master key into the database: alter system set encryption wallet open identified by “password”;

24

25 Wallet Maintenance To disable all encryption columns in database: alter system set encryption wallet close; Wallet must be done after database restart: alter system set encryption wallet open authenticated by “password"; Enable auto logging using Wallet Manager or mkwallet utility cwallet.sso

26 Wallet Backups Back up the wallet to a secure location (HSM), separately from the tape backups. Use RMAN backups which automatically excludes the wallet.Sand*.sso During the OS backups exclude files *.p12 and *.sso

27 Column Encryption CREATE TABLE employee (name VARCHAR2(128), salary NUMBER(6) ENCRYPT); ALTER TABLE employee ADD (ssn VARCHAR2(11) ENCRYPT); ALTER TABLE employee MODIFY (first_name ENCRYPT); ALTER TABLE employee MODIFY (first_name DECRYPT);

28 Salt CREATE TABLE employee (name VARCHAR2(128), empID NUMBER ENCRYPT NO SALT, salary NUMBER(6) ENCRYPT USING '3DES168'); CREATE INDEX employee_idx on employee (empID); You cannot create an index on a column that has been encrypted with salt. ORA-28338: cannot encrypt indexed column(s) with salt

29 Export / Import Must use Datapump expdp hr TABLES=emp DIRECTORY=dpump_dir DUMPFILE=dumpemp.dmp ENCRYPTION=ENCRYPTED_COLUMNS_ONLY ENCRYPTION_PASSWORD=pw2encrypt impdp hr TABLES=employee_data DIRECTORY=dpump_dir DUMPFILE= dumpemp.dmp ENCRYPTION_PASSWORD=pw2encrypt ENCRYPTION_MODE=DUAL ENCRYPTION_MODE=TRANSPARENT

30 Overheads 5 % – 35 % performance overhead Indexes are using encrypted values Each encrypted value needs 20 bytes for integrity check Encrypted value padded to 16 bytes If using salt, additional 16 bytes needed NOMAC parameter skips integrity check ALTER TABLE employee MODIFY (salary ENCRYPT 'NOMAC');

31 Incompatible Features Index types other than B-tree Range scan search through an index External large objects (BFILE) Materialized View Logs Transportable Tablespaces Original import/export utilities

32 TDE - Advantages Simple - can be done in four easy steps! Automatically encrypts database column data before it's written to disk Encryption and decryption is performed through the SQL interface No need for triggers to call encryption API's Views to decrypt data are completely eliminated Encryption is completely transparent to the application

33 TDE - Disadvantages Will not use indexes where the search criteria requires a range scan “where account number > or < 20000” will not work with TDE Indexes not possible if using ‘salt’ Performance hit Requires more space

34 Data Dictionary Views DBA_ENCRYPTED_COLUMNS USER_ENCRYPTED_COLUMNS ALL_ENCRYPTED_COLUMNS V$RMAN_ENCRYPTION_ALGORITHMS V$ENCRYPTED_TABLESPACES V$ENCRYPTION_WALLET

35 Tablespace Encryption Compatibility = or higher CREATE TABLESPACE encryptblspc DATAFILE '/u01/oradata/encryptblspc01.dbf‘ SIZE 200M ENCRYPTION USING '3DES168‘ DEFAULT STORAGE(ENCRYPT); DBA_TABLESPACES

36 Considerations Great for encrypting whole tables Objects automatically created encrypted All data encrypted including data in TEMP, UNDO, REDO (except BFILEs) Data protected during JOIN and SORT Allows index range scan Can not encrypt existing tablespace Use datapump, “create table as select”, “alter table move” Tablespace can not be enctypted with NO SALT option

37 Transparent Data Encryption cont. Example

38 Encryption in Practice Not a solution to all security problems Represents only one layer of Oracle security model Should be implemented in combination with Data Pump, RMAN, VPD and Data Masking PCI’s requirement to change regularly the encryption key is difficult to achieve Only as safe as your wallet With TDE there is no reason why your datafiles should stay unsecured

39 This presentation explained: What is data encryption Why sensitive data should be secured using encryption Demonstrated how TDE in Oracle 11 can help DBAs to encrypt data in an elegant and easy way With Oracle 11g there is no reason to fail PCI audit !

40