© Osama Mustafa, Robert P. Lockard 2019
O. Mustafa, R. P. LockardOracle Database Application Securityhttps://doi.org/10.1007/978-1-4842-5367-0_2

2. Audits

Osama Mustafa1  and Robert P. Lockard2
(1)
Amman, Jordan
(2)
Baltimore, MD, USA
 

Auditing is one of the tools in your arsenal to learn about what has happened in your system. Has a hacker been in the system for months or years and nobody knew? Auditing happens after an event; therefore, a daily review of audit reports is critical to the safety of your system. Audits can be used to record events that happened on database objects, such as update, insert, delete, and select operations on tables; execution of PL/SQL code; logon information; and more.

You need to sit down and think about what actions you ...

Get Oracle Database Application Security: With Oracle Internet Directory, Oracle Access Manager, and Oracle Identity Manager now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.