CHAPTER 7Applied Database Vault for Existing Applications

Chapter 6 introduced you to techniques and patterns for designing DBV security controls as part of a custom application development effort. In this chapter, we present several techniques for analyzing existing applications that need additional security controls. This might be the case, for example, for an organization that must comply with regulations and is looking to products such as DBV to help in this effort.

The ability to apply DBV security policy to existing applications is a powerful feature that many customers should consider. It is driven by the fact that DBV enforcement runs within the database kernel and is applied to all SQL commands that are submitted to the database, regardless ...

Get Applied Oracle Security: Developing Secure Database and Middleware Environments now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.