Download presentation
Presentation is loading. Please wait.
Published byErica Dawson Modified over 9 years ago
2
Securing Your Enterprise with Enterprise Manager 10g Amir Najmi Principal Member of Technical Staff System Management Products Oracle Corporation Session id: 40034
3
“Through 2005, 90 percent of cyber-attacks will continue to exploit known security flaws for which a patch is available or a preventive measure is known.” -Gartner report, May 2002
4
Common security best practices are not quite so common Gartner report Slammer virus exploited known security flaw – Patch was available 6 months before attack – Many of Microsoft’s own servers were affected Conclusion: Administrators often do not take common security measures
5
Why is security difficult for administrators? Lack of knowledge No knowledge of the vulnerability No understanding of impact, justification for fix Lack of logistical support No easy way to identify vulnerable installations No convenient way to administer the fix No easy way to ensure the fix remains in place
6
Grid security requires infrastructure support Grid has greater security requirements due to – Sheer scale – Heterogeneity – Connectivity (weakest link in the chain) – Dynamic configuration Security must be reduced to routine procedure Management tools must facilitate this practice at low overhead
7
Aspects of enterprise security Develop secure applications Deploy secure installations, patches Employ secure configurations Provision users with appropriate access Detect and contain intruders Design and development time Install time Operations and Management Real time Timescale Post-install update
8
Aspects of enterprise security Develop secure applications Deploy secure installations, patches Employ secure configurations Provision users with appropriate access Detect and contain intruders Design and development time Install time Operations and Management Real time Timescale Post-install update
9
EM helps enforce common security best practices within the Oracle ecosystem
10
EM Security is built on the Policy Framework Policy Framework Database Configuration Policy Security Policy Storage Configuration Policy
11
Policy Framework: concepts Rule – Specific to target type – Severity: Critical, Warning, Informational Violation – Can be overridden by administrator Policy – Collected rules of a single category Provides common paradigm, user interface Policy is essential to the Grid
12
35
13
06
14
34
15
EM security management Software security – Addressing vulnerabilities in Oracle software Instance hardening – Configuring Oracle for security Database security – Guarding against excessive privilege
16
EM security management Software security – Addressing vulnerabilities in Oracle software Instance hardening – Configuring Oracle for security Database security – Guarding against excessive privilege
17
Patch management with EM Hosts Grid Control Oracle Metalink Patch Cache
18
Software security with EM Fetch latest security alert metadata (Metalink) Automatically add to software security rule If targets found vulnerable, list patches which address the problem Help stage (and in some cases, apply) patch Going forward, test for vulnerability as part of software security rule
19
31
20
34
21
32
22
33
23
23
24
21
25
22
26
24
27
25
28
EM security management Software security – Addressing vulnerabilities in Oracle software Instance hardening – Configuring Oracle for security Database security – Guarding against excessive privilege
29
Instance hardening with EM Identify products deployed in common insecure configurations Check for weak authentication practices Examples – Identify insecure services – Track down demo features enabled in production
30
Database security with EM Check for excessive user privilege Identify weak privilege model – Roles should be granular Examples – Find default passwords – Identify excessive privileges to PUBLIC role
35
05
36
06
37
07
38
08
39
09
40
10
41
Aspects of enterprise security Develop secure applications Deploy secure installations, patches Employ secure configurations Provision users with appropriate access Detect and contain intruders Design and development time Install time Operations and Management Real time Timescale Post-install update
42
EM helps enforce security best practices Deploy secure installations, patches – Provide rapid notification of security patches on Oracle products – Facilitate application of security patches Employ secure configurations – Alert customer if an Oracle product is deployed in a common insecure configurations Provision users with appropriate access – Check systems for accounts with excessive privileges – Provide in-context links to EM user management
43
Security administrator usage Predefined test library (by target type) – Software – Instance hardening – Privileges Tests are conducted automatically, periodically Administrator views results – Roll-up reporting – Which tests revealed security flaws – Impact of the security flaw – Known workarounds and remedies Overrides inappropriate violations Takes corrective action
44
The future of EM Security More elaborate security roles Security compliance history Extensions to EM Policy Framework – E.g. policy groups, exemptions, timed exemptions Greater automation for addressing problems Editable remedies Downloadable test definitions User-defined tests
45
A Q & Q U E S T I O N S A N S W E R S
46
Reminder – please complete the OracleWorld online session survey Thank you.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.