Cut Database Security Guide
Cut Database Security Guide
Security Guide
21c
F31285-18
June 2024
1
Introduction to Oracle Database Security
Oracle Database provides a rich set of default security features to manage user accounts,
authentication, privileges, application security, encryption, network traffic, and auditing.
• About Oracle Database Security
Use Oracle Database's security features to reduce risk and protect data from theft,
destruction, or misuse.
• Additional Oracle Database Security Products
In addition to the security resources that are available in a default database installation,
Oracle Database provides several other database security products.
• User accounts. When a schema is created, it comes with a local database user account
that has privileges in that schema. When you create user accounts, you can secure them
in a variety of ways. You can also create password profiles and resource limits to better
secure password policies for your site. Oracle Database provides a set of predefined
schemas that provide database functionality and other predefined schemas with
administrative privileges.
• Authentication methods. Oracle Database provides several ways to configure
authentication for users and database administrators. For example, you can authenticate
users on the database level, from the operating system, and on the network, and for
multitier, global users, and application servers. If you use Microsoft Active Directory, you
can authenticate and authorize Microsoft Active Directory users with the database directly.
You can configure your databases to use strong authentication with Oracle authentication
adapters that support various thirdparty authentication services with digital certificates.
Oracle Database provides the following strong authentication support:
– Centralized authentication and single signon.
– Kerberos
– Remote Authentication Dialin User Service (RADIUS)
– Certificatebased authentication
• Privileges and roles. You can use privileges and roles to restrict user access to data in
the following ways:
– Creating and granting privileges and roles to users or other roles
– Performing privilege analysis to find information about how privileges are used in your
site
– Configure definer's rights and invoker's rights for your applications
– Manage finegrained access in PL/SQL packages and types
11
Chapter 1
Additional Oracle Database Security Products
• Oracle Advanced Security enables you to protect sensitive data by using Transparent
Data Encryption and Oracle Data Redaction.
• Oracle Label Security applies classification labels to data, allowing you to filter user
access to data at the row level.
• Oracle Database Vault provides finegrained access control to your sensitive data,
including protecting data from privileged users. For example, you can restrict database
administrators from having access to employee information such as salaries.
• Oracle Data Safe enables you to analyze the sensitivity and risks of data in your Oracle
databases, and based on these findings, create policies that mask sensitive data, create
and monitor security controls, assess user security, and monitor user activity.
• Oracle Enterprise User Security enables you to manage user security at the enterprise
level.
• Oracle Enterprise Manager Data Masking and Subsetting Pack can irreversibly replace
the original sensitive data with fictitious data so that production data can be shared safely
with IT developers or offshore business partners.
• Oracle Audit Vault and Database Firewall collects database audit data from sources
such as Oracle Database audit trail tables, database operating system audit files, and
12
Chapter 1
Additional Oracle Database Security Products
database redo logs. Using Oracle Audit Vault and Database Firewall, you can create alerts
on suspicious activities, and create reports on the history of privileged user changes,
schema modifications, and even datalevel access.
• Oracle Key Vault enables you to accelerate security and encryption deployments by
centrally managing encryption keys, Oracle wallets, Java keystores, and credential files. It
is optimized for Oracle wallets, Java keystores, and Oracle Advanced Security Transparent
Data Encryption (TDE) master keys. Oracle Key Vault supports the OASIS KMIP standard.
The fullstack, securityhardened software appliance uses Oracle Linux and Oracle
Database technology for security, availability, and scalability, and can be deployed on your
choice of compatible hardware.
In addition to these products, you can find the latest information about Oracle Database
security, such as new products and important information about security patches and alerts, by
visiting the Security Technology Center on Oracle Technology Network at
13