SlideShare a Scribd company logo
1 of 21
Download to read offline
Bloombase StoreSafe Oracle Database Server Encryption on IBM AIX Application Notes P1 © 2008 Bloombase, Inc.
Bloombase StoreSafe Oracle Database
Server Encryption on IBM AIX
Application Notes
A Quick Guide to Securing Oracle Database Server Data Files
on AIX Platform
2007/12/12
Executive Summary
Bloombase StoreSafe storage security server protects privacy of sensitive enterprise data by transparent encryption and
decryption. This paper summarizes quick notes to setup of Bloombase StoreSafe and simple migration of Oracle database
on IBM AIX platform installed on IBM p-Series POWER based server with IBM DS4100 SAN storage sub-system to achieve
transparent Oracle encryption meeting various information security regulatory compliance standards without sacrificing
performance.
Bloombase StoreSafe Oracle Database Server Encryption on IBM AIX Application Notes P2 © 2008 Bloombase, Inc.
Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations,
products, people and events depicted herein are fictitious and no association with any real company, organization, product, person or event is intended or should be inferred. Complying
with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a
retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of
Bloombase.
Bloombase may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in
any written license agreement from Bloombase, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.
This document is the property of Bloombase. No exploitation or transfer of any information contained herein is permitted in the absence of an agreement with Bloombase, and neither the
document nor any such information may be released without the written consent of Bloombase.
© 2008 Bloombase, Inc.
Bloombase, Spitfire, StoreSafe and Keyparc are either registered trademarks or trademarks of Bloombase in the United States, People’s Republic of China, Hong Kong Special
Administrative Region and/or other countries.
The names of actual companies and products mentioned herein may be the trademarks of their respective owners.
Document No.
Bloombase StoreSafe Oracle Database Server Encryption on IBM AIX Application Notes P3 © 2008 Bloombase, Inc.
Table of Contents
Table of Contents 3
Introduction 5
Purpose and Scope 7
Assumptions 8
Infrastructure 9
Setup ............................................................................................................. 9
Server ...........................................................................................................10
Storage Area Network (SAN) ...........................................................................10
Software........................................................................................................10
Configuration Overview 11
System Configuration..................................................................................... 11
Virtual Memory.................................................................................................11
Spitfire StoreSafe Setup.................................................................................12
Oracle Database Setup and Migration.............................................................14
Setup Spitfire StoreSafe Virtual Storage............................................................ 15
Migrate Oracle Data Files ................................................................................. 16
Bloombase StoreSafe Oracle Database Server Encryption on IBM AIX Application Notes P4 © 2008 Bloombase, Inc.
Validation Tests 18
Conclusion 19
Disclaimer 20
Technical Reference 21
Bloombase StoreSafe Oracle Database Server Encryption on IBM AIX Application Notes P5 © 2008 Bloombase, Inc.
Introduction
Digital assets including financial reports, legal documents, private human resources information, confidential contracts and
sensitive user data are invaluable properties of a corporation. A business cannot risk losing these information, both
confidentiality and non-repudiation. Nevertheless, the Internet has becoming more pervasive, security attacks have grown.
News and reports have revealed millions of dollars of loss in various enterprises and organizations due to security
breaches.
Data protection at the persistence layer used to be an uncommon subject in information technology industry. Persistence
data, in the old days, are assumed safely kept and stored in highly secure data centers with effective physical access
control and close surveillance. However, trends in the industry in backup, archive and high availability with an aim to
safeguard data from the worst attack and be responsive to rescues, keeping the enterprise core system running non-stop,
have opened up chances confidential data get disclosed and tampered by unauthorized parties.
Numerous security compliance and standards including Sarbanes Oxley, Gramm-Leach-Bliley Act and Personal Data Privacy
Ordinance have raised enterprises’ awareness of securing their core business and customer data. However, persistence
data protection is technically a difficult subject. One has to prepare for additional system complexity, loss of performance,
at the same time, maintaining the same level of stability and scalability, and most important of all, be highly secure, hacker-
proof rather than exposing more security loopholes.
Core business data of an enterprise constitutes a major segment of assets that a corporation possesses. Customer data,
marketing strategies, intellectual properties in form of source codes and business logic, sales history and prediction
figures, and other decision support numerical analysis as result of data-mining may often bury forward looking intelligence
that in some sense have very high future value when put into good use.
This application note discusses the application of Bloombase Spitfire StoreSafe storage security server to protect the most
popular enterprise database server in the world, Oracle, where sensitive business information from ERP, knowledge base to
Bloombase StoreSafe Oracle Database Server Encryption on IBM AIX Application Notes P6 © 2008 Bloombase, Inc.
contents, etc are stored, achieving transparent deployment and performance encryption without tedious schema alteration
or application change.
Bloombase StoreSafe Oracle Database Server Encryption on IBM AIX Application Notes P7 © 2008 Bloombase, Inc.
Purpose and Scope
Securing Oracle data files is not an easy task as data files are dynamic, they keep updated at all times which means static
way of data encryption offered by encryption utilities are not going to fit the bill. Sensitive data committed to Oracle data
files will also be written to database redo logs, archive logs and
flash recovery logs. Thus, to secure the system as a whole, all data files, redo, archive and flash recovery logs have to be
encrypted as well. Bloombase Spitfire StoreSafe storage security server provides a single solution to various information
security problems that place huge threats to sensitive data stored in Oracle databases.
This document describes application of Bloombase Spitfire StoreSafe storage security server on Oracle databases installed
on IBM AIX operating system to secure sensitive database information at rest transparently without tedious second
development efforts and numerous deployment risks and enables customers to protect their private business information
and immediately achieve various information security regulatory compliances and standards.
Bloombase StoreSafe Oracle Database Server Encryption on IBM AIX Application Notes P8 © 2008 Bloombase, Inc.
Assumptions
This document describes interoperability testing of Bloombase Spitfire StoreSafe storage security server 3.0 on Oracle 10g
release 2 database server on IBM AIX 5.3 ML 4.
We assume you have basic knowledge of administration of Oracle and AIX.
Bloombase StoreSafe Oracle Database Server Encryption on IBM AIX Application Notes P9 © 2008 Bloombase, Inc.
Infrastructure
Setup
The interoperability testing environment is setup as in below figure
pSeries
TotalStorageDS4100
1 2 3 4 5 6 7 8 9 10 11 12 13 14
Oracle 10gR2 on AIX 5.3 on IBM
pSeries 615
IBM DS 4100 SAN Storage
Bloombase Spitfire StoreSafe 3.0 on
AIX 5.3
Virtual plain Oracle
data
Bloombase StoreSafe Oracle Database Server Encryption on IBM AIX Application Notes P10 © 2008 Bloombase, Inc.
Server
Server IBM pSeries p5 550
Processors 8 x IBM POWER5+ 1.65 Hz
Memory 16 GB
Operating System IBM AIX 5.3 ML 4
Storage Area Network (SAN)
SAN Storage IBM DS4100
Link Speed 4 Gbps
Cache Size 2 GB
Software
Oracle Oracle Databaser Server 10g R2
Spitfire StoreSafe Bloombase Spitfire StoreSafe storage security server 3.0
Bloombase StoreSafe Oracle Database Server Encryption on IBM AIX Application Notes P11 © 2008 Bloombase, Inc.
Configuration Overview
System Configuration
Virtual Memory
As Bloombase Spitfire StoreSafe is installed on the same physical server and OS instance with Oracle database server
sharing the same virtual memory and filesystem cache for both Oracle and Bloombase Spitfire StoreSafe, system virtual
memory parameters have to be tuned to avoid exhaust of memory which might lead to unpredictable problems when vast
amount of storage data are accessed where Oracle and Spitfire StoreSafe will compete for memory resources
Tune AIX virtual memory parameters as
$ vmo -p -o minfree=3840 -o maxfree=4352
$ vmo -p -o maxperm%=40 -o maxclient%=40
Bloombase StoreSafe Oracle Database Server Encryption on IBM AIX Application Notes P12 © 2008 Bloombase, Inc.
Spitfire StoreSafe Setup
Spitfire StoreSafe supports both file-based and block-based on-the-fly storage encryption. As a quick start, an Oracle data
file is to be secured by Spitfire StoreSafe file-based encryption and will be migrated to Spitfire StoreSafe virtual storage and
accessed enabling transparent data encryption and decryption on-the-fly.
Spitfire StoreSafe file-based virtual storage and physical storage settings are configured as followings.
Assume an Oracle database instance named
hammer
is to be secured by Bloombase Spitfire StoreSafe having its flash recovery area and data file located at filesystem
Repository Physical Location
Flash recovery area /u02/flash_recovery_a
rea
Oracle data /u02/oradata/hamme
r/
What we want to achieve is to have all files under
/u02
to get secured by Spitfire StoreSafe.
Physical storage u02 is configured in Spitfire StoreSafe server with storage physically located in IBM DS 4100 SAN
accessible at filesystem path
Bloombase StoreSafe Oracle Database Server Encryption on IBM AIX Application Notes P13 © 2008 Bloombase, Inc.
/u02
u02 physical storage is configured to run on JFS filesystem as configured via Spitfire StoreSafe web-based management
console.
Parameter Value
Name hammer_physical
Physical Storage
Type
Local
Location /u02_physical
Virtual storage namely hammer is created on Spitfire StoreSafe storage encryption server to virtualize physical SAN storage
hammer_physical as a network share. hammer virtual storage is secured using AES 256-bit cryptographic cipher and is
configured to be accessible by authorized hosts only using storage networking protocols including NFS.
Plain persistent data are sent from storage host to Spitfire StoreSafe via NFS and/or CIFS. When Spitfire StoreSafe
intercepts the plain sensitive contents, they are encrypted on-the-fly and committed to IBM DS 4100 SAN storage.
Parameter Value
Name hammer
Mode File
Physical Storage hammer_physical
Protection Scheme Privacy
Key demo_valid1
Bloombase StoreSafe Oracle Database Server Encryption on IBM AIX Application Notes P14 © 2008 Bloombase, Inc.
Cipher Algorithm AES
Bit Length 256
Host Security  127.0.0.1
 readable and
writable
Oracle Database Setup and Migration
Oracle flash recovery area and oradata are now in plain without protection. To secure Oracle data, customers have to follow
below steps to migrate and setup filesystem to enable Oracle to access ciphered data AS-IF they are in plain
 Setup Spitfire StoreSafe virtual plain storage
 Migrate Oracle data
IMPORTANT: Make sure Oracle database server is brought to a stop on data migration or serious data corruption might
occur. Please make sure you keep a separate database backup for rollback in case of disaster in the middle of migration.
Bloombase StoreSafe Oracle Database Server Encryption on IBM AIX Application Notes P15 © 2008 Bloombase, Inc.
Setup Spitfire StoreSafe Virtual Storage
Plain Oracle data are now stored under
/u02
and recall last section that Spitfire StoreSafe virtual storage has its physical storage setup at
/u02_physical
What we need to do is to setup mount point at
/u02
to enable filesystem read/write actions to route through Spitfire StoreSafe virtual storage
hammer
so that the sensitive Oracle data contents get transparently encrypted and migrated to physically stored at its pre-
configured physical location
Rename current plain Oracle data repository
$ mv /u02 /u02_plain
Setup mount point /u02 for hammer Spitfire StoreSafe virtual storage
$ mount -o hard,llock,rw,bg,timeo=600,wsize=32768,rsize=32768,intr 127.0.0.1:/hammer /u02
Automate auto-mount of Spitfire StoreSafe virtual storage by configuring below in
/etc/filesystems
/u02:
Dev = 127.0.0.1:/hammer
vfs = nfs
mount = false
options = rw,bg,timeo=600,hard,llock,wsize=32768,rsize=32768,intr
Verify Spitfire StoreSafe virtual storage hammer by creating a test file
$ vi /u02/test.txt
Bloombase StoreSafe Oracle Database Server Encryption on IBM AIX Application Notes P16 © 2008 Bloombase, Inc.
Browse virtual plain contents of the test file by invoking command in prompt
$ cat /u02/test.txt
where virtual-plain contents can be seen
Verify encrypted physical file at
/u02_physical/test.txt
by command
$ cat / u02_physical/test.txt
where contents are physically stored at IBM DS4100 SAN as ciphered and secured.
Migrate Oracle Data Files
Migrate plain Oracle contents to Spitfire StoreSafe virtual storage by
$ cp –R /u02_plain/* /u02
With above action, database flash recovery area, archive log, redo log, control files, data system files and database user
files get encrypted and migrated to the same IBM DS-series SAN disk via Spitfire StoreSafe virtual storage.
Sensitive Data Location
Flash recovery area /u02/flash_recovery_area
Redo log  /u02/hammer/redo01.log
 /u02/hammer/redo02.log
 /u02/hammer/redo03.log
Database control files  u02/hammer/control01.ctl
 /u02/hammer/control02.ct
l
Bloombase StoreSafe Oracle Database Server Encryption on IBM AIX Application Notes P17 © 2008 Bloombase, Inc.
 /u02/hammer/control03.ct
l
Database system files /u02/hammer/system01.dbf
Database user files /u02/hammer/users01.dbf
Database temp tablespace
files
/u02/hammer/temp01.dbf
Bloombase StoreSafe Oracle Database Server Encryption on IBM AIX Application Notes P18 © 2008 Bloombase, Inc.
Validation Tests
Startup Oracle database instance ‘hammer’ as normal and issue test SQLs to verify if sensitive data are transparently
decrypted on database select whereas they are transparently encrypted on database insert and update
$ sqlplus user/password
SQL*Plus: Release 10.2.0.1.0 - Production on Thu Apr 3 06:50:59 2007
Copyright (c) 1982, 2005, Oracle. All rights reserved.
Connected to:
Oracle Database 10g Enterprise Edition Release 10.2.0.1.0 - Production
With the Partitioning, OLAP and Data Mining options
SQL> select count(*) from CREDIT_CARD;
COUNT(*)
----------
500016
SQL>
Bloombase StoreSafe Oracle Database Server Encryption on IBM AIX Application Notes P19 © 2008 Bloombase, Inc.
Conclusion
Bloombase Spitfire StoreSafe storage security server protects privacy of sensitive enterprise data by transparent encryption
and decryption. This paper summarizes quick notes to setup of Spitfire StoreSafe and simple migration of Oracle database
on IBM AIX platform installed on IBM p-Series POWER based server with IBM DS4100 SAN storage sub-system to achieve
transparent Oracle encryption meeting various information security regulatory compliance standards without sacrificing
performance.
Bloombase StoreSafe Oracle Database Server Encryption on IBM AIX Application Notes P20 © 2008 Bloombase, Inc.
Disclaimer
The tests described in this paper were conducted in the Bloombase InteropLab. Bloombase has not tested this configuration
with all the combinations of hardware and software options available. There may be significant differences in your
configuration that will change the procedures necessary to accomplish the objectives outlined in this paper. If you find that
any of these procedures do not work in your environment, please contact us immediately.
Bloombase StoreSafe Oracle Database Server Encryption on IBM AIX Application Notes P21 © 2008 Bloombase, Inc.
Technical Reference
1. Bloombase Spitfire StoreSafe storage security server certified on IBM Tivoli Storage Manager, eServer xSeries,
eServer p5 and IBM DS series SAN storage, http://www-
304.ibm.com/jct09002c/gsdod/solutiondetails.do?solution=27715
2. Oracle Storage Program Change Notice, http://www.oracle.com/technology/deploy/availability/htdocs/oscp.html
3. Oracle Database Protection by Spitfire StoreSafe,
http://www.bloombase.com/download/index.jsp?Url=/products/spitfire/storesafe/OracleDatabaseProtectionBy
SpitfireStoreSafe.pdf
4. Spitfire StoreSafe Compatibility Matrix,
http://www.bloombase.com/download/index.jsp?Url=/products/spitfire/storesafe/SpitfireStoreSafeNASCompati
bilityMatrix.pdf

More Related Content

Viewers also liked

Bloombase Spitfire KeyCastle Key Lifecycle Management Server Specifications
Bloombase Spitfire KeyCastle Key Lifecycle Management Server SpecificationsBloombase Spitfire KeyCastle Key Lifecycle Management Server Specifications
Bloombase Spitfire KeyCastle Key Lifecycle Management Server SpecificationsBloombase
 
ES-351 Bloombase Spitfire Identity Manager Essentials
ES-351 Bloombase Spitfire Identity Manager EssentialsES-351 Bloombase Spitfire Identity Manager Essentials
ES-351 Bloombase Spitfire Identity Manager EssentialsBloombase
 
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC CelerraBloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC CelerraBloombase
 
Performance Benchmarks for Bloombase Spitfire StoreSafe Encryption Security S...
Performance Benchmarks for Bloombase Spitfire StoreSafe Encryption Security S...Performance Benchmarks for Bloombase Spitfire StoreSafe Encryption Security S...
Performance Benchmarks for Bloombase Spitfire StoreSafe Encryption Security S...Bloombase
 
Bloombase Spitfire StoreSafe QLogic 10GbE Ethernet Adapter Interoperability
Bloombase Spitfire StoreSafe QLogic 10GbE Ethernet Adapter InteroperabilityBloombase Spitfire StoreSafe QLogic 10GbE Ethernet Adapter Interoperability
Bloombase Spitfire StoreSafe QLogic 10GbE Ethernet Adapter InteroperabilityBloombase
 
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...Bloombase
 
Bloombase Spitfire Identity Manager Compatibility Matrix
Bloombase Spitfire Identity Manager Compatibility MatrixBloombase Spitfire Identity Manager Compatibility Matrix
Bloombase Spitfire Identity Manager Compatibility MatrixBloombase
 
Bloombase Spitfire SOA Compatibility Matrix
Bloombase Spitfire SOA Compatibility MatrixBloombase Spitfire SOA Compatibility Matrix
Bloombase Spitfire SOA Compatibility MatrixBloombase
 
Bloombase Spitfire Messaging Security Server Specifications
Bloombase Spitfire Messaging Security Server SpecificationsBloombase Spitfire Messaging Security Server Specifications
Bloombase Spitfire Messaging Security Server SpecificationsBloombase
 
Bloombase Spitfire StoreSafe Security Server Specifications
Bloombase Spitfire StoreSafe Security Server SpecificationsBloombase Spitfire StoreSafe Security Server Specifications
Bloombase Spitfire StoreSafe Security Server SpecificationsBloombase
 
Interoperability of Bloombase Spitfire StoreSafe Security Server and Brocade ...
Interoperability of Bloombase Spitfire StoreSafe Security Server and Brocade ...Interoperability of Bloombase Spitfire StoreSafe Security Server and Brocade ...
Interoperability of Bloombase Spitfire StoreSafe Security Server and Brocade ...Bloombase
 
Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2
Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2
Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2Bloombase
 
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...Bloombase
 

Viewers also liked (13)

Bloombase Spitfire KeyCastle Key Lifecycle Management Server Specifications
Bloombase Spitfire KeyCastle Key Lifecycle Management Server SpecificationsBloombase Spitfire KeyCastle Key Lifecycle Management Server Specifications
Bloombase Spitfire KeyCastle Key Lifecycle Management Server Specifications
 
ES-351 Bloombase Spitfire Identity Manager Essentials
ES-351 Bloombase Spitfire Identity Manager EssentialsES-351 Bloombase Spitfire Identity Manager Essentials
ES-351 Bloombase Spitfire Identity Manager Essentials
 
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC CelerraBloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
 
Performance Benchmarks for Bloombase Spitfire StoreSafe Encryption Security S...
Performance Benchmarks for Bloombase Spitfire StoreSafe Encryption Security S...Performance Benchmarks for Bloombase Spitfire StoreSafe Encryption Security S...
Performance Benchmarks for Bloombase Spitfire StoreSafe Encryption Security S...
 
Bloombase Spitfire StoreSafe QLogic 10GbE Ethernet Adapter Interoperability
Bloombase Spitfire StoreSafe QLogic 10GbE Ethernet Adapter InteroperabilityBloombase Spitfire StoreSafe QLogic 10GbE Ethernet Adapter Interoperability
Bloombase Spitfire StoreSafe QLogic 10GbE Ethernet Adapter Interoperability
 
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...
 
Bloombase Spitfire Identity Manager Compatibility Matrix
Bloombase Spitfire Identity Manager Compatibility MatrixBloombase Spitfire Identity Manager Compatibility Matrix
Bloombase Spitfire Identity Manager Compatibility Matrix
 
Bloombase Spitfire SOA Compatibility Matrix
Bloombase Spitfire SOA Compatibility MatrixBloombase Spitfire SOA Compatibility Matrix
Bloombase Spitfire SOA Compatibility Matrix
 
Bloombase Spitfire Messaging Security Server Specifications
Bloombase Spitfire Messaging Security Server SpecificationsBloombase Spitfire Messaging Security Server Specifications
Bloombase Spitfire Messaging Security Server Specifications
 
Bloombase Spitfire StoreSafe Security Server Specifications
Bloombase Spitfire StoreSafe Security Server SpecificationsBloombase Spitfire StoreSafe Security Server Specifications
Bloombase Spitfire StoreSafe Security Server Specifications
 
Interoperability of Bloombase Spitfire StoreSafe Security Server and Brocade ...
Interoperability of Bloombase Spitfire StoreSafe Security Server and Brocade ...Interoperability of Bloombase Spitfire StoreSafe Security Server and Brocade ...
Interoperability of Bloombase Spitfire StoreSafe Security Server and Brocade ...
 
Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2
Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2
Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2
 
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...
 

Similar to Blbs an-bloombase-store safe-aix-oracle-encryption-application-notes-uslet-en-r2

Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Bloombase
 
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...Bloombase
 
Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic Bloombase
 
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...Bloombase
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplaceBloombase
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enwBloombase
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enwBloombase
 
Oracle storage best of-breed, best for oracle
Oracle storage  best of-breed, best for oracleOracle storage  best of-breed, best for oracle
Oracle storage best of-breed, best for oraclesolarisyougood
 
IBM Cloud OpenStack Services
IBM Cloud OpenStack ServicesIBM Cloud OpenStack Services
IBM Cloud OpenStack ServicesAshish Patel
 
Blbs sb-bloombase-turnkey-data-at-rest-security-compliance-solution-for-emc-v...
Blbs sb-bloombase-turnkey-data-at-rest-security-compliance-solution-for-emc-v...Blbs sb-bloombase-turnkey-data-at-rest-security-compliance-solution-for-emc-v...
Blbs sb-bloombase-turnkey-data-at-rest-security-compliance-solution-for-emc-v...Bloombase
 
Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...Kal BO
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16Bloombase
 
Bloombase integration with eskm final w alliance cert logo 4_9_15
Bloombase integration with eskm final w alliance cert logo 4_9_15Bloombase integration with eskm final w alliance cert logo 4_9_15
Bloombase integration with eskm final w alliance cert logo 4_9_15Bloombase
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase
 
IBM Cloud OpenStack Services
IBM Cloud OpenStack ServicesIBM Cloud OpenStack Services
IBM Cloud OpenStack ServicesOpenStack_Online
 
Oracle_DB_sobre_Oracle
Oracle_DB_sobre_OracleOracle_DB_sobre_Oracle
Oracle_DB_sobre_OracleFran Navarro
 
5 here today still here tomorrow new technology for big_forever_archives
5 here today still here tomorrow new technology for big_forever_archives5 here today still here tomorrow new technology for big_forever_archives
5 here today still here tomorrow new technology for big_forever_archivesDr. Wilfred Lin (Ph.D.)
 
8.1.6 newsecurity features
8.1.6 newsecurity features8.1.6 newsecurity features
8.1.6 newsecurity featuresAnil Pandey
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...Bloombase
 
SME Providing an Enterprise File Fabric™ for OpenStack Swift
SME Providing an Enterprise File Fabric™ for OpenStack SwiftSME Providing an Enterprise File Fabric™ for OpenStack Swift
SME Providing an Enterprise File Fabric™ for OpenStack SwiftHybrid Cloud
 

Similar to Blbs an-bloombase-store safe-aix-oracle-encryption-application-notes-uslet-en-r2 (20)

Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
 
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
 
Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic
 
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplace
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Oracle storage best of-breed, best for oracle
Oracle storage  best of-breed, best for oracleOracle storage  best of-breed, best for oracle
Oracle storage best of-breed, best for oracle
 
IBM Cloud OpenStack Services
IBM Cloud OpenStack ServicesIBM Cloud OpenStack Services
IBM Cloud OpenStack Services
 
Blbs sb-bloombase-turnkey-data-at-rest-security-compliance-solution-for-emc-v...
Blbs sb-bloombase-turnkey-data-at-rest-security-compliance-solution-for-emc-v...Blbs sb-bloombase-turnkey-data-at-rest-security-compliance-solution-for-emc-v...
Blbs sb-bloombase-turnkey-data-at-rest-security-compliance-solution-for-emc-v...
 
Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16
 
Bloombase integration with eskm final w alliance cert logo 4_9_15
Bloombase integration with eskm final w alliance cert logo 4_9_15Bloombase integration with eskm final w alliance cert logo 4_9_15
Bloombase integration with eskm final w alliance cert logo 4_9_15
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15
 
IBM Cloud OpenStack Services
IBM Cloud OpenStack ServicesIBM Cloud OpenStack Services
IBM Cloud OpenStack Services
 
Oracle_DB_sobre_Oracle
Oracle_DB_sobre_OracleOracle_DB_sobre_Oracle
Oracle_DB_sobre_Oracle
 
5 here today still here tomorrow new technology for big_forever_archives
5 here today still here tomorrow new technology for big_forever_archives5 here today still here tomorrow new technology for big_forever_archives
5 here today still here tomorrow new technology for big_forever_archives
 
8.1.6 newsecurity features
8.1.6 newsecurity features8.1.6 newsecurity features
8.1.6 newsecurity features
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
SME Providing an Enterprise File Fabric™ for OpenStack Swift
SME Providing an Enterprise File Fabric™ for OpenStack SwiftSME Providing an Enterprise File Fabric™ for OpenStack Swift
SME Providing an Enterprise File Fabric™ for OpenStack Swift
 

More from Bloombase

a50009291enw - Letter.pdf
a50009291enw - Letter.pdfa50009291enw - Letter.pdf
a50009291enw - Letter.pdfBloombase
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...Bloombase
 
Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusBloombase
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625Bloombase
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizationsBloombase
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentBloombase
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Bloombase
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...Bloombase
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12Bloombase
 
Bloombase store safe mf solution brief 2017 pdf
Bloombase store safe   mf solution brief 2017 pdfBloombase store safe   mf solution brief 2017 pdf
Bloombase store safe mf solution brief 2017 pdfBloombase
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017Bloombase
 
The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryptionBloombase
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBloombase
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Bloombase
 
Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Bloombase
 
Xsb03030 usen
Xsb03030 usenXsb03030 usen
Xsb03030 usenBloombase
 
Ibpstc30951 wdg ib_mbooklet
Ibpstc30951 wdg ib_mbookletIbpstc30951 wdg ib_mbooklet
Ibpstc30951 wdg ib_mbookletBloombase
 
Resource guide-30th-edition
Resource guide-30th-editionResource guide-30th-edition
Resource guide-30th-editionBloombase
 
Hitachi interoperability-guide-hcp-hcp-anywhere-hdi
Hitachi interoperability-guide-hcp-hcp-anywhere-hdiHitachi interoperability-guide-hcp-hcp-anywhere-hdi
Hitachi interoperability-guide-hcp-hcp-anywhere-hdiBloombase
 
Arcsight connector supported_products_flyer
Arcsight connector supported_products_flyerArcsight connector supported_products_flyer
Arcsight connector supported_products_flyerBloombase
 

More from Bloombase (20)

a50009291enw - Letter.pdf
a50009291enw - Letter.pdfa50009291enw - Letter.pdf
a50009291enw - Letter.pdf
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and Morpheus
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizations
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop Environment
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12
 
Bloombase store safe mf solution brief 2017 pdf
Bloombase store safe   mf solution brief 2017 pdfBloombase store safe   mf solution brief 2017 pdf
Bloombase store safe mf solution brief 2017 pdf
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017
 
The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryption
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-en
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2
 
Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2
 
Xsb03030 usen
Xsb03030 usenXsb03030 usen
Xsb03030 usen
 
Ibpstc30951 wdg ib_mbooklet
Ibpstc30951 wdg ib_mbookletIbpstc30951 wdg ib_mbooklet
Ibpstc30951 wdg ib_mbooklet
 
Resource guide-30th-edition
Resource guide-30th-editionResource guide-30th-edition
Resource guide-30th-edition
 
Hitachi interoperability-guide-hcp-hcp-anywhere-hdi
Hitachi interoperability-guide-hcp-hcp-anywhere-hdiHitachi interoperability-guide-hcp-hcp-anywhere-hdi
Hitachi interoperability-guide-hcp-hcp-anywhere-hdi
 
Arcsight connector supported_products_flyer
Arcsight connector supported_products_flyerArcsight connector supported_products_flyer
Arcsight connector supported_products_flyer
 

Recently uploaded

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Recently uploaded (20)

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

Blbs an-bloombase-store safe-aix-oracle-encryption-application-notes-uslet-en-r2

  • 1. Bloombase StoreSafe Oracle Database Server Encryption on IBM AIX Application Notes P1 © 2008 Bloombase, Inc. Bloombase StoreSafe Oracle Database Server Encryption on IBM AIX Application Notes A Quick Guide to Securing Oracle Database Server Data Files on AIX Platform 2007/12/12 Executive Summary Bloombase StoreSafe storage security server protects privacy of sensitive enterprise data by transparent encryption and decryption. This paper summarizes quick notes to setup of Bloombase StoreSafe and simple migration of Oracle database on IBM AIX platform installed on IBM p-Series POWER based server with IBM DS4100 SAN storage sub-system to achieve transparent Oracle encryption meeting various information security regulatory compliance standards without sacrificing performance.
  • 2. Bloombase StoreSafe Oracle Database Server Encryption on IBM AIX Application Notes P2 © 2008 Bloombase, Inc. Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, people and events depicted herein are fictitious and no association with any real company, organization, product, person or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Bloombase. Bloombase may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Bloombase, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. This document is the property of Bloombase. No exploitation or transfer of any information contained herein is permitted in the absence of an agreement with Bloombase, and neither the document nor any such information may be released without the written consent of Bloombase. © 2008 Bloombase, Inc. Bloombase, Spitfire, StoreSafe and Keyparc are either registered trademarks or trademarks of Bloombase in the United States, People’s Republic of China, Hong Kong Special Administrative Region and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. Document No.
  • 3. Bloombase StoreSafe Oracle Database Server Encryption on IBM AIX Application Notes P3 © 2008 Bloombase, Inc. Table of Contents Table of Contents 3 Introduction 5 Purpose and Scope 7 Assumptions 8 Infrastructure 9 Setup ............................................................................................................. 9 Server ...........................................................................................................10 Storage Area Network (SAN) ...........................................................................10 Software........................................................................................................10 Configuration Overview 11 System Configuration..................................................................................... 11 Virtual Memory.................................................................................................11 Spitfire StoreSafe Setup.................................................................................12 Oracle Database Setup and Migration.............................................................14 Setup Spitfire StoreSafe Virtual Storage............................................................ 15 Migrate Oracle Data Files ................................................................................. 16
  • 4. Bloombase StoreSafe Oracle Database Server Encryption on IBM AIX Application Notes P4 © 2008 Bloombase, Inc. Validation Tests 18 Conclusion 19 Disclaimer 20 Technical Reference 21
  • 5. Bloombase StoreSafe Oracle Database Server Encryption on IBM AIX Application Notes P5 © 2008 Bloombase, Inc. Introduction Digital assets including financial reports, legal documents, private human resources information, confidential contracts and sensitive user data are invaluable properties of a corporation. A business cannot risk losing these information, both confidentiality and non-repudiation. Nevertheless, the Internet has becoming more pervasive, security attacks have grown. News and reports have revealed millions of dollars of loss in various enterprises and organizations due to security breaches. Data protection at the persistence layer used to be an uncommon subject in information technology industry. Persistence data, in the old days, are assumed safely kept and stored in highly secure data centers with effective physical access control and close surveillance. However, trends in the industry in backup, archive and high availability with an aim to safeguard data from the worst attack and be responsive to rescues, keeping the enterprise core system running non-stop, have opened up chances confidential data get disclosed and tampered by unauthorized parties. Numerous security compliance and standards including Sarbanes Oxley, Gramm-Leach-Bliley Act and Personal Data Privacy Ordinance have raised enterprises’ awareness of securing their core business and customer data. However, persistence data protection is technically a difficult subject. One has to prepare for additional system complexity, loss of performance, at the same time, maintaining the same level of stability and scalability, and most important of all, be highly secure, hacker- proof rather than exposing more security loopholes. Core business data of an enterprise constitutes a major segment of assets that a corporation possesses. Customer data, marketing strategies, intellectual properties in form of source codes and business logic, sales history and prediction figures, and other decision support numerical analysis as result of data-mining may often bury forward looking intelligence that in some sense have very high future value when put into good use. This application note discusses the application of Bloombase Spitfire StoreSafe storage security server to protect the most popular enterprise database server in the world, Oracle, where sensitive business information from ERP, knowledge base to
  • 6. Bloombase StoreSafe Oracle Database Server Encryption on IBM AIX Application Notes P6 © 2008 Bloombase, Inc. contents, etc are stored, achieving transparent deployment and performance encryption without tedious schema alteration or application change.
  • 7. Bloombase StoreSafe Oracle Database Server Encryption on IBM AIX Application Notes P7 © 2008 Bloombase, Inc. Purpose and Scope Securing Oracle data files is not an easy task as data files are dynamic, they keep updated at all times which means static way of data encryption offered by encryption utilities are not going to fit the bill. Sensitive data committed to Oracle data files will also be written to database redo logs, archive logs and flash recovery logs. Thus, to secure the system as a whole, all data files, redo, archive and flash recovery logs have to be encrypted as well. Bloombase Spitfire StoreSafe storage security server provides a single solution to various information security problems that place huge threats to sensitive data stored in Oracle databases. This document describes application of Bloombase Spitfire StoreSafe storage security server on Oracle databases installed on IBM AIX operating system to secure sensitive database information at rest transparently without tedious second development efforts and numerous deployment risks and enables customers to protect their private business information and immediately achieve various information security regulatory compliances and standards.
  • 8. Bloombase StoreSafe Oracle Database Server Encryption on IBM AIX Application Notes P8 © 2008 Bloombase, Inc. Assumptions This document describes interoperability testing of Bloombase Spitfire StoreSafe storage security server 3.0 on Oracle 10g release 2 database server on IBM AIX 5.3 ML 4. We assume you have basic knowledge of administration of Oracle and AIX.
  • 9. Bloombase StoreSafe Oracle Database Server Encryption on IBM AIX Application Notes P9 © 2008 Bloombase, Inc. Infrastructure Setup The interoperability testing environment is setup as in below figure pSeries TotalStorageDS4100 1 2 3 4 5 6 7 8 9 10 11 12 13 14 Oracle 10gR2 on AIX 5.3 on IBM pSeries 615 IBM DS 4100 SAN Storage Bloombase Spitfire StoreSafe 3.0 on AIX 5.3 Virtual plain Oracle data
  • 10. Bloombase StoreSafe Oracle Database Server Encryption on IBM AIX Application Notes P10 © 2008 Bloombase, Inc. Server Server IBM pSeries p5 550 Processors 8 x IBM POWER5+ 1.65 Hz Memory 16 GB Operating System IBM AIX 5.3 ML 4 Storage Area Network (SAN) SAN Storage IBM DS4100 Link Speed 4 Gbps Cache Size 2 GB Software Oracle Oracle Databaser Server 10g R2 Spitfire StoreSafe Bloombase Spitfire StoreSafe storage security server 3.0
  • 11. Bloombase StoreSafe Oracle Database Server Encryption on IBM AIX Application Notes P11 © 2008 Bloombase, Inc. Configuration Overview System Configuration Virtual Memory As Bloombase Spitfire StoreSafe is installed on the same physical server and OS instance with Oracle database server sharing the same virtual memory and filesystem cache for both Oracle and Bloombase Spitfire StoreSafe, system virtual memory parameters have to be tuned to avoid exhaust of memory which might lead to unpredictable problems when vast amount of storage data are accessed where Oracle and Spitfire StoreSafe will compete for memory resources Tune AIX virtual memory parameters as $ vmo -p -o minfree=3840 -o maxfree=4352 $ vmo -p -o maxperm%=40 -o maxclient%=40
  • 12. Bloombase StoreSafe Oracle Database Server Encryption on IBM AIX Application Notes P12 © 2008 Bloombase, Inc. Spitfire StoreSafe Setup Spitfire StoreSafe supports both file-based and block-based on-the-fly storage encryption. As a quick start, an Oracle data file is to be secured by Spitfire StoreSafe file-based encryption and will be migrated to Spitfire StoreSafe virtual storage and accessed enabling transparent data encryption and decryption on-the-fly. Spitfire StoreSafe file-based virtual storage and physical storage settings are configured as followings. Assume an Oracle database instance named hammer is to be secured by Bloombase Spitfire StoreSafe having its flash recovery area and data file located at filesystem Repository Physical Location Flash recovery area /u02/flash_recovery_a rea Oracle data /u02/oradata/hamme r/ What we want to achieve is to have all files under /u02 to get secured by Spitfire StoreSafe. Physical storage u02 is configured in Spitfire StoreSafe server with storage physically located in IBM DS 4100 SAN accessible at filesystem path
  • 13. Bloombase StoreSafe Oracle Database Server Encryption on IBM AIX Application Notes P13 © 2008 Bloombase, Inc. /u02 u02 physical storage is configured to run on JFS filesystem as configured via Spitfire StoreSafe web-based management console. Parameter Value Name hammer_physical Physical Storage Type Local Location /u02_physical Virtual storage namely hammer is created on Spitfire StoreSafe storage encryption server to virtualize physical SAN storage hammer_physical as a network share. hammer virtual storage is secured using AES 256-bit cryptographic cipher and is configured to be accessible by authorized hosts only using storage networking protocols including NFS. Plain persistent data are sent from storage host to Spitfire StoreSafe via NFS and/or CIFS. When Spitfire StoreSafe intercepts the plain sensitive contents, they are encrypted on-the-fly and committed to IBM DS 4100 SAN storage. Parameter Value Name hammer Mode File Physical Storage hammer_physical Protection Scheme Privacy Key demo_valid1
  • 14. Bloombase StoreSafe Oracle Database Server Encryption on IBM AIX Application Notes P14 © 2008 Bloombase, Inc. Cipher Algorithm AES Bit Length 256 Host Security  127.0.0.1  readable and writable Oracle Database Setup and Migration Oracle flash recovery area and oradata are now in plain without protection. To secure Oracle data, customers have to follow below steps to migrate and setup filesystem to enable Oracle to access ciphered data AS-IF they are in plain  Setup Spitfire StoreSafe virtual plain storage  Migrate Oracle data IMPORTANT: Make sure Oracle database server is brought to a stop on data migration or serious data corruption might occur. Please make sure you keep a separate database backup for rollback in case of disaster in the middle of migration.
  • 15. Bloombase StoreSafe Oracle Database Server Encryption on IBM AIX Application Notes P15 © 2008 Bloombase, Inc. Setup Spitfire StoreSafe Virtual Storage Plain Oracle data are now stored under /u02 and recall last section that Spitfire StoreSafe virtual storage has its physical storage setup at /u02_physical What we need to do is to setup mount point at /u02 to enable filesystem read/write actions to route through Spitfire StoreSafe virtual storage hammer so that the sensitive Oracle data contents get transparently encrypted and migrated to physically stored at its pre- configured physical location Rename current plain Oracle data repository $ mv /u02 /u02_plain Setup mount point /u02 for hammer Spitfire StoreSafe virtual storage $ mount -o hard,llock,rw,bg,timeo=600,wsize=32768,rsize=32768,intr 127.0.0.1:/hammer /u02 Automate auto-mount of Spitfire StoreSafe virtual storage by configuring below in /etc/filesystems /u02: Dev = 127.0.0.1:/hammer vfs = nfs mount = false options = rw,bg,timeo=600,hard,llock,wsize=32768,rsize=32768,intr Verify Spitfire StoreSafe virtual storage hammer by creating a test file $ vi /u02/test.txt
  • 16. Bloombase StoreSafe Oracle Database Server Encryption on IBM AIX Application Notes P16 © 2008 Bloombase, Inc. Browse virtual plain contents of the test file by invoking command in prompt $ cat /u02/test.txt where virtual-plain contents can be seen Verify encrypted physical file at /u02_physical/test.txt by command $ cat / u02_physical/test.txt where contents are physically stored at IBM DS4100 SAN as ciphered and secured. Migrate Oracle Data Files Migrate plain Oracle contents to Spitfire StoreSafe virtual storage by $ cp –R /u02_plain/* /u02 With above action, database flash recovery area, archive log, redo log, control files, data system files and database user files get encrypted and migrated to the same IBM DS-series SAN disk via Spitfire StoreSafe virtual storage. Sensitive Data Location Flash recovery area /u02/flash_recovery_area Redo log  /u02/hammer/redo01.log  /u02/hammer/redo02.log  /u02/hammer/redo03.log Database control files  u02/hammer/control01.ctl  /u02/hammer/control02.ct l
  • 17. Bloombase StoreSafe Oracle Database Server Encryption on IBM AIX Application Notes P17 © 2008 Bloombase, Inc.  /u02/hammer/control03.ct l Database system files /u02/hammer/system01.dbf Database user files /u02/hammer/users01.dbf Database temp tablespace files /u02/hammer/temp01.dbf
  • 18. Bloombase StoreSafe Oracle Database Server Encryption on IBM AIX Application Notes P18 © 2008 Bloombase, Inc. Validation Tests Startup Oracle database instance ‘hammer’ as normal and issue test SQLs to verify if sensitive data are transparently decrypted on database select whereas they are transparently encrypted on database insert and update $ sqlplus user/password SQL*Plus: Release 10.2.0.1.0 - Production on Thu Apr 3 06:50:59 2007 Copyright (c) 1982, 2005, Oracle. All rights reserved. Connected to: Oracle Database 10g Enterprise Edition Release 10.2.0.1.0 - Production With the Partitioning, OLAP and Data Mining options SQL> select count(*) from CREDIT_CARD; COUNT(*) ---------- 500016 SQL>
  • 19. Bloombase StoreSafe Oracle Database Server Encryption on IBM AIX Application Notes P19 © 2008 Bloombase, Inc. Conclusion Bloombase Spitfire StoreSafe storage security server protects privacy of sensitive enterprise data by transparent encryption and decryption. This paper summarizes quick notes to setup of Spitfire StoreSafe and simple migration of Oracle database on IBM AIX platform installed on IBM p-Series POWER based server with IBM DS4100 SAN storage sub-system to achieve transparent Oracle encryption meeting various information security regulatory compliance standards without sacrificing performance.
  • 20. Bloombase StoreSafe Oracle Database Server Encryption on IBM AIX Application Notes P20 © 2008 Bloombase, Inc. Disclaimer The tests described in this paper were conducted in the Bloombase InteropLab. Bloombase has not tested this configuration with all the combinations of hardware and software options available. There may be significant differences in your configuration that will change the procedures necessary to accomplish the objectives outlined in this paper. If you find that any of these procedures do not work in your environment, please contact us immediately.
  • 21. Bloombase StoreSafe Oracle Database Server Encryption on IBM AIX Application Notes P21 © 2008 Bloombase, Inc. Technical Reference 1. Bloombase Spitfire StoreSafe storage security server certified on IBM Tivoli Storage Manager, eServer xSeries, eServer p5 and IBM DS series SAN storage, http://www- 304.ibm.com/jct09002c/gsdod/solutiondetails.do?solution=27715 2. Oracle Storage Program Change Notice, http://www.oracle.com/technology/deploy/availability/htdocs/oscp.html 3. Oracle Database Protection by Spitfire StoreSafe, http://www.bloombase.com/download/index.jsp?Url=/products/spitfire/storesafe/OracleDatabaseProtectionBy SpitfireStoreSafe.pdf 4. Spitfire StoreSafe Compatibility Matrix, http://www.bloombase.com/download/index.jsp?Url=/products/spitfire/storesafe/SpitfireStoreSafeNASCompati bilityMatrix.pdf