Book description
This guide demonstrates how to secure sensitive data and comply with internal and external audit regulations using Oracle 10g and 11g. It provides the hands-on guidance required to understand the complex options provided by Oracle and the know-how to choose the best option for a particular case.
Table of contents
- Front Cover
- HOWTO Secure and Audit Oracle 10g and 11g
- Chapter 1: Introduction: How This Book Will Help You Be Secure and Compliant
- Chapter 2: Hardening the Database
-
Chapter 3: Securing the Listener
- 3.1 HOWTO Secure Access to lsnrctl (1/2)
- 3.1 HOWTO Secure Access to lsnrctl (2/2)
- 3.2 HOWTO Limit the Ability to Change Listener Properties
- 3.3 HOWTO Secure EXTPROC (1/2)
- 3.3 HOWTO Secure EXTPROC (2/2)
- 3.4 HOWTO Limit the Sources from Which Connections Are Accepted
- 3.5 HOWTO Inspect Listener Logs and Traces and HOWTO Limit Traces
- 3.6 HOWTO Combat TNS Protocol Attacks
- 3.7 Discussion: History of Listener Security Alerts
-
Chapter 4: Account Security
- 4.1 HOWTO Create, Alter, Drop, and Lock User Accounts
- 4.2 HOWTO Understand the Standard Logon Process
- 4.3 HOWTO Use Password Policies
- 4.4 HOWTO Enforce Password Complexity
- 4.5 HOWTO Check for Weak and Default Passwords
- 4.6 HOWTO Set Password Case
- 4.7 HOWTO Use Impossible Passwords
- 4.8 HOWTO Limit System Resources Used by Users
- 4.9 HOWTO View Information on Users and Profiles
- 4.10 Additional Resources
- Chapter 5: Cryptography, Oracle Wallets, and Oracle PKI (1/4)
- Chapter 5: Cryptography, Oracle Wallets, and Oracle PKI (2/4)
- Chapter 5: Cryptography, Oracle Wallets, and Oracle PKI (3/4)
- Chapter 5: Cryptography, Oracle Wallets, and Oracle PKI (4/4)
-
Chapter 6: Authentication
- 6.1 HOWTO Understand and Use O3/O5 LOGON and OS Authentication
- 6.2 HOWTO Use Password Files
- 6.3 HOWTO Configure Clients to Use External Password Stores
- 6.4 HOWTO Configure SSL-Based Authentication Using ASO
- 6.5 HOWTO Configure Kerberos Authentication Using ASO
- 6.6 HOWTO Configure RADIUS and Two-Factor Authentication Using ASO
- 6.7 Discussion: Protect Your Password Hashes
- Chapter 7: Encrypting Data-in-Transit (1/2)
-
Chapter 7: Encrypting Data-in-Transit (2/2)
- 7.1 HOWTO Configure Network Encryption Using ASO
- 7.2 HOWTO Configure Network Encryption for JDBC Drivers
- 7.3 HOWTO Configure Data Integrity Using ASO
- 7.4 HOWTO Use IPSEC, Tunnels, and Hardware Acceleration (1/2)
- 7.4 HOWTO Use IPSEC, Tunnels, and Hardware Acceleration (2/2)
- 7.5 Discussion: Performance Impact When Encrypting Data-in-Transit
-
Chapter 8: Encrypting Data-at-Rest
- 8.1 Application-, Database-, and Storage-Based Encryption
- 8.2 HOWTO Use DBMS_CRYPTO (1/2)
- 8.2 HOWTO Use DBMS_CRYPTO (2/2)
- 8.3 HOWTO Use TDE to Encrypt Columns (1/2)
- 8.3 HOWTO Use TDE to Encrypt Columns (2/2)
- 8.4 HOWTO Encrypt Foreign Keys and Columns Used for Indexes
- 8.5 HOWTO Use TDE to Encrypt Tablespaces
- 8.6 HOWTO Manage TDE Master Keys
- 8.7 HOWTO Use HSMs and TDE
- 8.8 HOWTO Use TDE with External Tables (Oracle Data Pump)
- 8.9 HOWTO Keep Data Encrypted When You Export It Using Oracle Data Pump Utilities
- 8.10 HOWTO Encrypt Backups with RMAN
- 8.11 Discussion: Why Did Oracle Pick the TDE Approach?
-
Chapter 9: Standard Auditing
- 9.1 HOWTO Enable Standard Auditing
- 9.2 HOWTO Use Audit Qualifiers
- 9.3 HOWTO Use Statement Auditing
- 9.4 HOWTO Use Object Auditing
- 9.5 HOWTO Use Privilege Auditing
- 9.6 HOWTO Audit for Unexpected Errorsin the Network Layer
- 9.7 HOWTO Read Audit Records
- 9.8 HOWTO View What Is Currently Being Audited
- 9.9 HOWTO Use NOAUDIT
- 9.10 Discussion—Auditing and Performance
- Chapter 10: Mandatory and Administrator Auditing
- Chapter 11: Fine-Grained Auditing
-
Chapter 12: Auditing Before/After Values and Monitoring Selected Data
- 12.1 HOWTO Use Triggers for Capturing Before/After Values
- 12.2 HOWTO Use Oracle Streams for Capturing Before/After Values (1/2)
- 12.2 HOWTO Use Oracle Streams for Capturing Before/After Values (2/2)
- 12.3 HOWTO Use the SCN and Flashback Queries
- 12.4 HOWTO Use Flashback Data Archive
- 12.5 Discussion: Do You Really Need the Before Values?
- Chapter 13: Oracle Audit Vault (1/2)
-
Chapter 13: Oracle Audit Vault (2/2)
- 13.1 HOWTO Add, Configure, and Manage Agents
- 13.2 HOWTO Add, Configure, and Manage Sources
- 13.3 HOWTO Add, Configure, and Manage Collectors
- 13.4 HOWTO Configure Audit Rules
- 13.5 HOWTO Configure and Manage the AV Server and the Warehouse
- 13.6 HOWTO View Audit Data within the AV Console
- 13.7 HOWTO Configure Alerts
- 13.8 HOWTO Understand Performance and Storage Impact
- 13.9 Miscellaneous Discussion—Auditing AV
- Chapter 14: Database Activity Monitoring (1/2)
-
Chapter 14: Database Activity Monitoring (2/2)
- 14.1 HOWTO Protect against SQL Injection
- 14.2 HOWTO Categorize and Identify Misuse and Intrusions
- 14.3 HOWTO Understand the Compliance Landscape (1/2)
- 14.3 HOWTO Understand the Compliance Landscape (2/2)
- 14.4 HOWTO Determine Whether You Need DAM or DAMP
- 14.5 HOWTO Analyze Impact on Performance
- 14.6 HOWTO Analyze Impact on Storage
- 14.7 Discussion: Identifying the Real User
-
Chapter 15: Privileges and Authorization
- 15.1 HOWTO Manage Object and Column Privileges
- 15.2 HOWTO Manage System Privileges (1/3)
- 15.2 HOWTO Manage System Privileges (2/3)
- 15.2 HOWTO Manage System Privileges (3/3)
- 15.3 HOWTO Use Roles to Manage Privileges
- 15.4 HOWTO Use Secure Application Roles
- 15.5 HOWTO Manage the PUBLIC Role
- 15.6 HOWTO Use Access Control Lists (ACLs) to Limit Access to Database Network Services
- 15.7 HOWTO Generate Entitlement Audit Reports (1/2)
- 15.7 HOWTO Generate Entitlement Audit Reports (2/2)
- 15.8 Discussion—SQL92_SECURITY
-
Chapter 16: Virtual Private Database
- 16.1 HOWTO Use VPD Policies to Limit Access to Rows
- 16.2 HOWTO Use VPD Policies to Limit Access to Sensitive Column Data
- 16.3 HOWTO Use VPD Policies to Hide Sensitive Column Data
- 16.4 HOWTO Use Policy Groups
- 16.5 HOWTO Choose a Policy Type for Optimal Performance
- 16.6 HOWTO Review and Debug VPD Policies
- 16.7 Discussion—Using Secure Application Roles and VPD
-
Chapter 17: Oracle Database Vault
- 17.1 HOWTO Use a Realm to Secure Data Access from DBA Access
- 17.2 HOWTO Use Command Rules to Secure User Activity
- 17.3 HOWTO Use Rule Sets, Factors, and Secure Application Roles (1/2)
- 17.3 HOWTO Use Rule Sets, Factors, and Secure Application Roles (2/2)
- 17.4 HOWTO Use Reports in DV
- 17.5 HOWTO Enable sysdba Connections
- 17.6 HOWTO Disable DV and Track Whether It Is Enabled
- 17.7 HOWTO Better Understand DV’s Impact on Performance
- 17.8 Miscellaneous Discussion—Is Auditing Alone Enough?
- Appendix A: Payment Card Industry (PCI) Data Security Standard (DSS) Version 1.1: Impact on Oracle Security Implementations (1/3)
- Appendix A: Payment Card Industry (PCI) Data Security Standard (DSS) Version 1.1: Impact on Oracle Security Implementations (2/3)
- Appendix A: Payment Card Industry (PCI) Data Security Standard (DSS) Version 1.1: Impact on Oracle Security Implementations (3/3)
- Appendix B: Using an “All-in-One” Solution: An Example
- Back Cover
Product information
- Title: HOWTO Secure and Audit Oracle 10g and 11g
- Author(s):
- Release date: March 2009
- Publisher(s): Auerbach Publications
- ISBN: 9781420084139
You might also like
book
Oracle Automatic Storage Management: Under-the-Hood & Practical Deployment Guide
Streamline data management and provisioning Build and manage a storage infrastructure with Oracle scalable Automatic Storage …
book
Oracle Net8 Configuration and Troubleshooting
Net8 is the fundamental Oracle technology that allows Oracle services and clients to communicate with each …
book
Oracle Streams 11g Data Replication
Master Oracle Streams 11 g Replication Enable real-time information access and data sharing across your distributed …
book
Oracle RMAN 11g Backup and Recovery
Master Oracle Recovery Master Protect your databases from hardware, software, and operator failures using the detailed …