© Osama Mustafa, Robert P. Lockard 2019
O. Mustafa, R. P. LockardOracle Database Application Securityhttps://doi.org/10.1007/978-1-4842-5367-0_3

3. Privilege Analysis

Osama Mustafa1  and Robert P. Lockard2
(1)
Amman, Jordan
(2)
Baltimore, MD, USA
 

One of the top things an attacker does is use a compromised account to move laterally through the network. The more privileges the account has, the more damage an attacker can do. For this reason, you need to limit accounts to only the privileges required to function, and nothing else.

We know there are operational and organizational issues with keeping accounts clean of unneeded privileges. Over the years we’ve seen many accounts accumulating privileges that never get cleaned up. Then there is a security audit, ...

Get Oracle Database Application Security: With Oracle Internet Directory, Oracle Access Manager, and Oracle Identity Manager now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.