• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Partner Webcast - Oracle Database Security Inside-Out DB Security Part 2: Audit Vault & Database Firewall (AVDF)
 

Partner Webcast - Oracle Database Security Inside-Out DB Security Part 2: Audit Vault & Database Firewall (AVDF)

on

  • 1,369 views

Businesses not only have to protect sensitive information, but also monitor access to sensitive information for both compliance and potential threats. Avoid risky third-party solutions, and leverage ...

Businesses not only have to protect sensitive information, but also monitor access to sensitive information for both compliance and potential threats. Avoid risky third-party solutions, and leverage the full potential of the #1 Database with 33 years of security innovations to safeguard data where it lives- in the database.

On 2 webcasts we explore Oracle’s comprehensive database security and compliance solutions.
Part 1: Advanced Security and Database Vault - 04 April 2013
Part 2: Audit Vault and Database Firewall (AVDF) - 11 April 2013
Find out more at https://blogs.oracle.com/imc/entry/partner_webcasts_oracle_database_security

Statistics

Views

Total Views
1,369
Views on SlideShare
1,367
Embed Views
2

Actions

Likes
1
Downloads
38
Comments
0

2 Embeds 2

http://digg.com 1
http://cloud.feedly.com 1

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Partner Webcast - Oracle Database Security Inside-Out DB Security Part 2: Audit Vault & Database Firewall (AVDF) Partner Webcast - Oracle Database Security Inside-Out DB Security Part 2: Audit Vault & Database Firewall (AVDF) Presentation Transcript

    • “This slide format serves to call attention to a quote from a prominent customer, executive, or thought leader in regards to a particular  Name topic.” Name  Title, Company CUSTOMER LOGOblogs.oracle.com/IMC 1 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • 2 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • Oracle Audit Vault andDatabase Firewall Tarek Salama DB Options Specialist MEA
    • Program Agenda Database Security Defense in Depth Oracle Audit Vault & Database Firewall  Activity Monitoring and Blocking  Fine Grained, Customizable Reporting and Alerting  Enterprise Audit Data Consolidation and Lifecycle Management  Deployment Flexibility and Scalability Oracle Audit Vault & Database Firewall Value Proposition Oracle Maximum Security Architecture Q&A4 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • Database Sprawl Makes Attacking Easier! Sensitive DataOutsourced Data Temp use Reports DW/Analytics Stand By Test Dev5 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • Only 35% Can Prevent SQL Injection Attacks Have you taken steps to prevent SQL injection attacks?6 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • Only 30% Using a Network-Based Database Firewall Solution (Total does not equal 100% due to rounding.) Are you using a network-based database firewall solution for blocking unauthorized database activity?7 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • Billions of Database Records Breached Globally 97% of Breaches Were Avoidable with Basic Controls 98% records stolen from databases 96% of victims subject to PCI DSS had not achieved compliance 71% Breach within minutes 92% discovered by third partyhttp://www.verizonenterprise.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf 8 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • 85% Breached in Minutes or Faster9 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • 85% Took Weeks, Months and Even Years to Discover10 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • Are Databases Adequately Protected? Network Security “Forrester estimates that although 70% Authentication Endpoint Security Security of enterprises have an information security plan, only 20% of enterprises have a Database database security plan.” Security Vulnerability Email Security Management11 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Source: Forrester Research Inc., Creating An Enterprise Database Security Plan, July 2010
    • The Business Response Is Reactive IT has shifted attention away from the applications & data “Most security organizations continue to focus inappropriate attention on network vulnerabilities and reactive network security tools rather than on proactive application security practices”.12 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • The Reactive Approach Fails Increased IT Spending & Focused on The Wrong Risks 2010 Endpoint Security 94% against servers Vulnerability Management 96% Non-compliance PCI 2007 14% Network Security 5% Privilege Misuse 32% of hacking IT Budget Email Securityinvolved stolen login credentials 8.2% Other Security IT Budget13 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • Focus On The Core SystemsThe Experience The Applications The Cloud The Data Center 14 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • Security at Every Layer Security between layers and across layers Infrastructure Security Database Security • Trusted OS Extensions • Encryption and Masking • Virtualization Security • Privileged User Controls • Cryptographic Acceleration • Database Firewall • Key Storage Built-In • Secure Configuration • Secure Storage Identity Management Risk & Compliance • Privilege Account Management • Auditing • User and Role Management • Attestation • Entitlements Management • Segregation of Duties • Risk-Based Access Control • Process Controls • Directory Services • Transaction Controls15 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • Customer Experience Security Challenges Expanding business requires securing the interaction Identity Theft Quality of Service Fraud Detection & Trust Brand & Reputation Data Security & Integrity Regulatory Compliance Consumer Privacy PII, PCI DSS, PIPEDA, EU DPD16 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • 17 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • Why are Databases so Vulnerable? 80% of IT Security Programs Don’t Address Database SecurityForrester Research Network Security “Enterprises are taking on risks Authentication SIEM & User Security that they may not even be aware of. Especially as more and more Email Security Endpoint attacks against databases exploit Database Security Security legitimate access.” Web Application Firewall18 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • Why We Care About Auditing? Applications & Data Anytime Anywhere19 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • Transform IT Security Take an inside out approach MANAGE THE RISKS SECURITY PREVENT THE THREATS INSIDE-OUT UNLOCK THE OPPORTUNITIES20 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • Oracle Database Security Solutions Defense-in-Depth for Maximum Security PREVENTIVE DETECTIVE ADMINISTRATIVE Encryption Activity Monitoring Privilege Analysis Redaction and Masking Database Firewall Sensitive Data Discovery Privileged User Controls Auditing and Reporting Configuration Management21 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • Oracle Database Security Solutions Detect and Block Threats, Alert, Audit and Report PREVENTIVE DETECTIVE ADMINISTRATIVE Encryption Activity Monitoring Privilege Analysis Redaction and Masking Database Firewall Sensitive Data Discovery Privileged User Controls Auditing and Reporting Configuration Management22 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • Oracle Audit Vault and Database Firewall Product Overview23 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • Oracle Announces Oracle Audit Vault and Database Firewall New Product Expands protection beyond Oracle and third party databases. Consolidate Unified New software appliance-based platform accelerates audit data platform to enterprise-wide deployments. from display Detective and preventive control to protect against the multiple audit abuse of legitimate access. sources reports Expanded Enterprise Auditing: Capabilities to collect, consolidate, and manage native audit and event logs. Consolidated Reporting and Alerting: Consolidated, centralized repository for all audit and event logs to be analyzed in real-time. 24 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • Oracle Audit Vault and Database Firewall New Solution for Oracle and Non-Oracle Databases Database Firewall Users Allow Log Alert Applications Substitute Block Firewall Events SOC Alerts ! Audit Data Built-in Auditor Reports Custom Reports OS, Directory, File System & Security Custom Audit Logs Analyst Policies Audit Vault25 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • Oracle Audit Vault and Database Firewall SQL Injection Protection with Positive Security Model SELECT * from stock White List where catalog-no=PHE8131 Allow Block Applications SELECT * from stock where catalog-no=‘ Databases union select cardNo,0,0 from Orders --’ • “Allowed” behavior can be defined for any user or application • Automated white list generation for any application • Out-of-policy database transaction detected and blocked/alerted26 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • Oracle Audit Vault and Database Firewall Enforcing Database Activity with Negative Security Model SELECT * FROM v$session Black List Block DBA activity from Application? SELECT * FROM Allow + Log DBA activity from v$session Approved Workstation • Stop specific unwanted SQL interactions, user or schema access • Blacklisting can be done on factors such as time of day, day of week, network, application, user name, OS user name etc • Provide flexibility to authorized users while still monitoring activity27 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • Oracle Audit Vault and Database Firewall Comprehensive Enterprise Audit and Log Consolidation  Databases: Oracle, SQL Server, DB2 LUW, Sybase ASE  New Audit Sources – Operating Systems: Microsoft Windows, Solaris – Directory Services: Active Directory – File Systems: Oracle ACFS  Audit Collection Plugins for Custom Audit Sources – XML file maps custom audit elements to canonical audit elements – Collect and map data from XML audit file and database tables28 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • Oracle Audit Vault and Database Firewall Audit and Event Repository  Based on proven Oracle Database technology – Includes compression, partitioning, scalability, high availability, etc. – Open schema for flexible reporting  Information lifecycle management for target specific data retention  Centralized web console for easy administration  Command line utility for automation and scripting29 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • Oracle Audit Vault and Database Firewall Audit and Event Data Security  Software appliance based on hardened OS and pre-configured database  Fine-grained administrative groups – Sources can be grouped for access authorization – Individual auditor reports limited to data from the ‘grouped’ sources  Separation of duties  Powerful multi-event alerting with thresholds and group-by30 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • Oracle Audit Vault and Database Firewall Flexible Deployment Architectures In-Line Blocking and Monitoring Remote Monitoring Out-of-Band Monitoring Applications and Users HA Mode Inbound SQL Traffic Audit Agents Audit Vault Audit Data Audit Vault Primary Standby Software Appliances31 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • Oracle Audit Vault and Database Firewall Performance and Scalability  Audit Vault – Supports monitoring and auditing multiple hundreds of heterogeneous database and non-database targets – Supports wide range of hardware to meet load requirements  Database Firewall – Decision time is independent of the number of rules in the policy – Multi-device / multi-process / multi-core scalability – 8 core can handle between 30K – 60K transactions/second32 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • Database Activity Monitoring and Firewall Detective Control for Oracle and non-Oracle DatabasesOracle Audit Vault andDatabase Firewall Monitors network traffic, detect and Users Allow block unauthorized activity Log Alert Highly accurate SQL grammar analysis Apps Substitute Block Can detect/stop SQL injection attacks Whitelist approach to enforce activity Blacklists for managing high risk activity SQL Analysis Policy Factors Scalable secure software appliance Whitelist Blacklist 33 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • Audit, Report, and Alert in Real-Time Detective Control for Oracle and non-Oracle DatabasesOracle Audit Vault andDatabase Firewall Audit Data & Event Logs SOC Centralized secure repository delivered Oracle Database ! as secure, scalable software appliance Firewall Alerts Powerful alerting - thresholds, group-by OS & Built-in Storage Reports Out-of-the box and custom reports Custom Directories Reports Consolidated multi-source reporting Policies Auditor Databases Built-in fine grain segregation of duties Custom Security Analyst 34 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • Oracle Audit Vault and Database Firewall Summary • Automate collection of native database auditing from Oracle, SQL Server, IBM DB2, & Sybase • Consolidated secure repository • Reduce manual time to correlate audit data • Snapshot view of audit settings for reporting • Provision audit settings from a centralized interface • Eliminate the need to wait for the DBA to send you the audit settings • Schedule reports to be reviewed automatically by security team • Continues view of database access • Save HOURS of time creating reports manually • Review only out of policy behavior • Automatic notification means you can proactively review database access • Disregard the behavior that doesn’t require your attention35 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • Oracle Audit Vault and Database Firewall Value Proposition36 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • Oracle Audit Vault and Database Firewall Value Proposition Value to the Partners Value to the Customers Ease of deployment & High availability of Eliminate existing manual processes for audit expertise data consolidation and reporting Detailed and effective audit controls Out-of-the-box compliance reports Real-Time notification on out of policy behavior Increased competitiveness/revenues by with automated alerts protecting the end user’s data and reputation Centralized database audit setting Management Minimize costs of offering security solutions heterogeneous database security framework Complete protection of data from one vendor Multiple levels/layers of protection Earning customer trust – Security Advisor Enforcing regulations compliance & standards37 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • Database Security Additional Enhancement38 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • Label Based Access Control Preventive Control for Oracle DatabasesOracle Label Security Virtual information partitioning for cloud, Sensitive SaaS, hosting environments Transactions Confidential Classify users and data using labels Report Data Public Labels based on business drivers Reports Confidential Sensitive Automatically enforced row level access control, transparent to applications Labels can be factors in other policies 39 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • Masking Data for Non-Production Use Preventive Control for Oracle Databases LAST_NAME SSN SALARYOracle Data Masking AGUILAR 203-33-3234 40,000 Replace sensitive application data BENSON 323-22-2943 60,000 Extensible template library and formats Production Non-Production Application templates available Test Dev Referential integrity detected/preserved At source masking and sub-setting* Support for masking data in non-Oracle LAST_NAME SSN SALARY databases ANSKEKSL 323—23-1111 60,000 BKJHHEIEDK 252-34-1345 40,000 Production 40 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • Discover Sensitive Data and Databases Administrative Control for Oracle DatabaseOracle Enterprise Manager 12c Scan Oracle for sensitive data Built-in, extensible data definitions Discover application data models Protect sensitive data appropriately: encrypt, redact, mask, audit… 41 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • Configuration Management Administrative Control for Oracle DatabasesOracle Database Lifecycle Management Discover Discover and classify databases Scan for best practices, standards Detect unauthorized changes Scan & Monitor Automated remediation Patching and provisioning Patch 42 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • Oracle Maximum Security Architecture Secure Patch Configuration Management Scanning Enterprise Manager Oracle Audit Vault Unauthorized DBA Activity Procurement Sensitive Auditing Multi-factor Authorization HR Confidential Authorization DB Consolidation Security Rebates Public AuthenticationApplications Oracle Database Vault Encrypted Database Encrypted Traffic Mask For Test and Dev Oracle Database Firewall Oracle Advanced Security Oracle Data Masking 43 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • Next Steps…  Protect sensitive data and database infrastructure ASAP!  Database consolidation and private clouds enable better security at lower cost and complexity  Secured Oracle Exadata Database Machines provide the secure database cloud building block you need  Securing your databases will allow you to outsource/take advantage of Public Clouds with less risk44 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • Oracle Database Security Partner Support and Resources45 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • Useful Resources for Partners and Customers  Test your company IT security! : Questions resulting in a diagram assessing your company’s security readiness  Cost Effective Security and Compliance with Oracle Database 11g Release 2: http://www.oracle.com/us/products/database/056892.pdf  Oracle Audit Vault and Database Firewall FAQ: http://www.oracle.com/technetwork/products/audit-vault-and-database-firewall/audit- vault-database-firewall-faq-1906550.pdf  Introducing Oracle Audit Vault and Database Firewall Web-Cast: http://event.on24.com/eventRegistration/EventLobbyServlet?target=lobby.jsp&eventid=541890&sessionid=1&part nerref=prod_sec_db12122012&key=E38B905176AAA94A27C94F87B829007A&eventuserid=73511945  Audit Vault and Database Firewall Forum46 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • Oracle Database Security Partner Resell Requirements • OPN member at Gold+ in good standing • Acceptance into Oracle Database Knowledge Zone • Valid Oracle Full Use Program Distribution Agreement • NO competency or specialization requirementshttp://www.oracle.com/partners/en/knowledge-zone/database/database-021468.htm 47 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • OPN “Security” Specialization Business Criteria RequiredCustomer References 3 Resell or# Of Transactions * Non-Commission Co-sell or 2 Referral Competency Criteria Required•Oracle Database 11g Security Sales Specialist Recommended Training 2•Oracle Database 11g Security Sales Specialist•Oracle Database 11g Security PreSales Specialist Recommended Training 2•Oracle Database 11g Security PreSales SpecialistGeneral Product Support Assessment (v3.0) OrOracle Database 11g Security Technology Support Specialist acceptable: Count before March 1, 2013 - valid until March 1, 2014 1•Recommended Training•Oracle Database 11g Security Technology Support Specialist•Oracle Database 11g Security Certified Implementation Specialist.Oracle Database 11g Security Essentials (1Z0-528) 1•Recommended Training•Oracle Database 11g Security Implementation Specialist48 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • For More Information Oracle Audit Vault and Database Firewall http://www.oracle.com/technetwork/products/audit-vault-and-database-firewall/overview/index.htmlhttp://www.oracle.com/database/security/audit-vault-database-firewall/overview/index.html 49 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • Key Take Away & Next Steps50 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • ORACLE DATABASE APPLIANCE SECURE HA PLATFORM Oracle Database Enabling Partners Appliance Reliable • to deliver a higher quality of Simple Affordable service at much lower cost in shorter time. DB Options • to deliver simplified IT Consolidated + = solutions (simplify DBaaS). DB Products • to easily adopt a wider range of Manageable products. ISV Applications • to rapidly offer endless custom High Performance solutions. • to expand their services Engineered System opportunities Single Box • to increase their solution competitiveness & revenue Small To Medium Business51 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • Inside Out ApproachSECURING BUSINESS AT THE CORE SECURITY AT EVERY LAYER & BETWEEN SECURITY A HOLISTIC & COMPREHENSIVE APPROACH INSIDE-OUTBETTER PERFORMANCE AT EVERY LEVEL52 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • Oracle Database Security Solutions Key Benefits Enterprise Ready Security and Compliance Simple and Flexible Speed and Scale53 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • Thank You !tarek.salama@oracle.com 54 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • 55 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • “This slide format serves to call attention to a quote from a prominent customer, executive, or thought leader in regards to a particular  Name topic.” Name  Title, Company CUSTOMER LOGOblogs.oracle.com/IMC56 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.