SlideShare a Scribd company logo
March, 2020
Oracle Autonomous Database
Security Features
1 © 2020 Oracle
Passionate about
Cloud & Database
Technologies
Sinan PetrusToma
Senior Solution Engineer
EMEA Solution Engineering Hub
Safe harbor statement
The following is intended to outline our general product direction. It is intended for information purposes
only, and may not be incorporated into any contract. It is not a commitment to deliver any material,
code, or functionality, and should not be relied upon in making purchasing decisions.
The development, release, timing, and pricing of any features or functionality described for Oracle’s
products may change and remains at the sole discretion of Oracle Corporation.
3 © 2020 Oracle
Agenda
4 © 2020 Oracle
 Encryption (Data, Backup,Connections)
 Network Access Control
 System & Data Protection
 Sensitive Data Discovery & Masking
 Auditing
5 © 2020 Oracle
Data | Your Most Valuable Asset
6 © 2020 Oracle
Examples of where data was not very well protected
Jul 2019: records of more than 5 million Bulgarians got stolen by hackers from the country’s tax
revenue office *
* https://edition.cnn.com/2019/07/21/europe/bulgaria-hack-tax-intl/index.html
** https://edition.cnn.com/2019/07/29/business/capital-one-data-breach/index.html
*** https://www.cnbc.com/2018/11/30/marriott-says-its-starwood-database-was-breached-onapproximately-500-million-guests-.html
Jul 2019: hacker gained access to 100 millionCapital One credit card applications and accounts **
Nov 2018: Marriott said the Starwood guest reservation database was breached, potentially exposing
information on about 500 million guests ***
7 © 2020 Oracle
Database in focus
NAMES
ADDRESSES
CREDIT CARDS
HEALTH RECORD
OTHER PII
SECRETS
Applications
Users
System, App
and DB Admins
Social
Engineering
Attack Apps
Bypass Database
Target
Data Copies
Attack Network
Test Dev
DB Clones
Social
Engineering
Transparent Data Encryption Data Masking
Command
Restrictions
DatabaseVault
Access Control
Net Encryption
Data Safe
Auditing
Data Redaction
Label Security
Agenda
8 © 2020 Oracle
 Encryption (Data, Backup,Connections)
 Network Access Control
 System & Data Protection
 Sensitive Data Discovery & Masking
 Auditing
9 © 2020 Oracle
Encryption | Transparent Data Encryption (TDE)
Encryption of Application Data on media
Enabled by default
Encryption keys are managed automatically
10 © 2020 Oracle
Encryption | Transparent Data Encryption (TDE)
WithoutTDE
WithTDE
In the event that the storage
media or data file is stolen, it
is not possible to read the
data
11 © 2020 Oracle
Encryption | Backups
All Backups are encrypted
12 © 2020 Oracle
Encryption | SQL*Net Connections
All connections MUST useTCP/IP + SSL (TCPS)
Customer‘s responsibility
 Store wallet files in a secure location
 Share wallet files only with authorized users
Agenda
13 © 2020 Oracle
 Encryption (Data, Backup,Connections)
 Network Access Control
 System & Data Protection
 Sensitive Data Discovery & Masking
 Auditing
14 © 2020 Oracle
10.0.0.3
138.1.64.0
138.1.64.192
138.1.66.3
IP Notation Type IP Addresses
IP Address 141.143.193.77
ACL
OCI RegionOn-Premise
141.143.193.77
Internet
TCP/IP : 1522
SSL
XTNS:listener
x.x.x.x
Basement
X
Oracle Services Network
Access Control List (ACL)
Wallet Rotation
15 © 2020 Oracle
Without ACL
With ACL
Access Control List (ACL)
16 © 2020 Oracle
OCI Region
NSG
Rule Stateless Source
Ingress No 10.0.2.0/24
private:10.0.2.0/24
VCN: 10.0.0.0/16
10.0.2.2
X
Oracle Services Network
10.0.2.3
SLpublic:10.0.1.0/24
Rule Stateless Source
Ingress
Egress
No
No
0.0.0.0/0
10.0.2.0/24
Internet
Gateway
Internet
Load Balancer
ADB Private
Endpoint
Rule Stateless Source
Ingress
Egress
No
No
10.0.1.0/24
10.0.3.0/24
private:10.0.3.0/24SL
RT
Private Endpoints & Network Security Groups
https://www.linkedin.com/pulse/implement-private-endpoint-your-autonomous-database-sinan-petrus-toma/
Agenda
17 © 2020 Oracle
 Encryption (Data, Backup,Connections)
 Network Access Control
 System & Data Protection
 Sensitive Data Discovery & Masking
 Auditing
18 © 2020 Oracle
Database Vault
 Stolen privileged user credentials are one of the most common attack vectors used by hackers
 Database Vault restricts access to application data by privileged users
 Prevent malicious or accidental changes that disrupt operations by privileged users
 Reduce the risk of insider and outside threats
 Address compliance with data privacy laws and standards such as the EU General Data Protection Regulation
(GDPR)
19 © 2020 Oracle
Database Vault
Without DBVault
With DBVault
20 © 2020 Oracle
High Privileges Restrictions
No OS/root logon or SYSDBA privileges
Prevent installing or modifying any software on the system
21 © 2020 Oracle
SQL Command Restrictions
Disable Encryption
Unlimited Failed Logins
DropTablespace
Agenda
22 © 2020 Oracle
 Encryption (Data, Backup,Connections)
 Network Access Control
 System & Data Protection
 Sensitive Data Discovery & Masking
 Auditing
23 © 2020 Oracle
Data Redaction
Mask (redact) data that is returned from queries issued by applications
Redaction at runtime! Data itself is not changed!
Redaction of Credit card, personal IDs, birth dates
comply with industry regulations such as Payment Card Industry Data Security
Standard (PCI DSS) and the Sarbanes-Oxley Act.
Policies can be implemented by the customer
24 © 2020 Oracle
Data Redaction
Without Data Redaction
With Data Redaction
25 © 2020 Oracle
Oracle Label Security (OLS)
Label their data using different sensitivity levels
Users are allowed to access only those data records with the
correspondent sensitivity level
26 © 2020 Oracle
Oracle Label Security (OLS)
Without OLS – All Users
With OLS – User 1
With OLS – User 2
27 © 2020 Oracle
Data Safe
Databases in Oracle CloudDatabases in Oracle Cloud
Audit …..Users DiscoverAssess Mask
 Unified Database Security Control Center
 Security Assessment
 User Assessment
 User Activity Auditing
 Sensitive Data Discovery
 Sensitive Data Masking
 Saves time and mitigates security risks
 Defense in Depth for all customers
 No special security expertise needed
Data Masking
28 © 2020 Oracle
Production Test
Development
Full Clone
Sensitive
Data Discover
Data Safe
Sensitive
Data Masking
Agenda
29 © 2020 Oracle
 Encryption (Data, Backup,Connections)
 Network Access Control
 System & Data Protection
 Sensitive Data Discovery & Masking
 Auditing
30 © 2020 Oracle
Database Auditing
Selective and effective auditing inside the Database using policies and conditions
Predefined policies to monitor any abnormal activity
Additional audit policies can be configured to audit based on specific IP addresses,
programs, time periods, or connection types
Enabled by default
Can NOT be disabled!
31 © 2020 Oracle
Database Auditing
32 © 2020 Oracle
API Audit Logs
33 © 2020 Oracle
API Audit Logs
Audit provides records of API operations performed against supported services
Audit logs are maintained for 90 days
Can be configured for up to 365 days
34 © 2020 Oracle
VCN Flow Logs
View connection information for traffic within yourVCN
Keeps detailed records of every flow that passes through yourVCN and presents this data
for analysis
 Source and destination of the traffic
 Quantity of traffic
 Permit or Deny action taken
Information can be used for:
 Network monitoring
 Troubleshooting
 Compliance
Copyright © 2019 Oracle and/or its affiliates.
OCI Compliance: Current Audit ProgramsGlobalGovernmentIndustryRegional
27001 : 27017 : 27018SOC 1 : SOC 2 : SOC 3
Level 1
Self-Assessment
PIPEDA -
Canada
DoD DISA SRG IL2 Moderate – Agency ATO VPAT – Section 508 G-Cloud 11 - UK Model Clauses - EU
US Privacy Shield
HIPAA PCI DSS FISC - Japan IGToolkit - UK
Cloud Security
Principles - UK
My Number -
Japan
Cyber Essentials
Plus - UK
TISAX - GermanyBSI C5 - GermanyGDPR - EU
C5
Autonomous Database | Security Features
36 © 2020 Oracle
Encryption
Transparent Data
Encryption
Backup Encryption
SQL*Net
Encryption
Access Control
Access Control Lists
Private Endpoints
System & Data
Protection
DatabaseVault
High Privileges
Restrictions
Sensitive Data
Oracle Label Security
Data Redaction
Data Safe
Auditing
DatabaseAuditing
API Audit Logs*
VCN Flow Logs*
SQLCommand
Restrictions
Network Security
Groups*
* OCI Security Features
Wallet Rotation
Data Masking
Self Patching
37 © 2020 Oracle
* Verizon - 2018 Data Breach Investigation Report
85%
of security breaches occurred
after the CVE was published*
Patch Available
On-PremiseAutonomous
 Downtime Restrictions
 Takes LongTime
 Human Resources
 No Downtime
 Applied Immediately
 No Customer Interaction
38 © 2020 Oracle
Security is Shared Responsibility
 Network security and monitoring
 OS and platform security
 Database patches and upgrades
 Data encryption by default
 Adminstrative separation of duties
 Ongoing security assessments
 Users and privileges
 Sensitive data discovery
 Data protection
 Activity auditing
Oracle Responsibility Customer Responsibility
Tools provided by Oracle
Thank you
Sinan PetrusToma
Senior Solution Engineer
Oracle DatabaseCloud Services
39

More Related Content

What's hot

はじめてのOracle Cloud Infrastructure(Oracle Cloudウェビナーシリーズ: 2020年7月1日)
はじめてのOracle Cloud Infrastructure(Oracle Cloudウェビナーシリーズ: 2020年7月1日)はじめてのOracle Cloud Infrastructure(Oracle Cloudウェビナーシリーズ: 2020年7月1日)
はじめてのOracle Cloud Infrastructure(Oracle Cloudウェビナーシリーズ: 2020年7月1日)
オラクルエンジニア通信
 
【旧版】Oracle Cloud Infrastructure 料金体系 [2020年5月版]
【旧版】Oracle Cloud Infrastructure 料金体系 [2020年5月版]【旧版】Oracle Cloud Infrastructure 料金体系 [2020年5月版]
【旧版】Oracle Cloud Infrastructure 料金体系 [2020年5月版]
オラクルエンジニア通信
 
Oracle Database / Exadata Cloud 最新情報(Oracle Cloudウェビナーシリーズ: 2020年7月2日)
Oracle Database / Exadata Cloud 最新情報(Oracle Cloudウェビナーシリーズ: 2020年7月2日)Oracle Database / Exadata Cloud 最新情報(Oracle Cloudウェビナーシリーズ: 2020年7月2日)
Oracle Database / Exadata Cloud 最新情報(Oracle Cloudウェビナーシリーズ: 2020年7月2日)
オラクルエンジニア通信
 
【旧版】Oracle Database Cloud Service:サービス概要のご紹介 [2020年5月版]
【旧版】Oracle Database Cloud Service:サービス概要のご紹介 [2020年5月版]【旧版】Oracle Database Cloud Service:サービス概要のご紹介 [2020年5月版]
【旧版】Oracle Database Cloud Service:サービス概要のご紹介 [2020年5月版]
オラクルエンジニア通信
 
Platform Deep Dive
Platform Deep DivePlatform Deep Dive
Platform Deep Dive
Conrad23
 
【旧版】Oracle Cloud Infrastructure:サービス概要のご紹介 [2020年6月版]
【旧版】Oracle Cloud Infrastructure:サービス概要のご紹介 [2020年6月版]【旧版】Oracle Cloud Infrastructure:サービス概要のご紹介 [2020年6月版]
【旧版】Oracle Cloud Infrastructure:サービス概要のご紹介 [2020年6月版]
オラクルエンジニア通信
 
Oracle databáze – Konsolidovaná Data Management Platforma
Oracle databáze – Konsolidovaná Data Management PlatformaOracle databáze – Konsolidovaná Data Management Platforma
Oracle databáze – Konsolidovaná Data Management Platforma
MarketingArrowECS_CZ
 
Deep Dive into the OPC UA / DDS Gateway Specification
Deep Dive into the OPC UA / DDS Gateway SpecificationDeep Dive into the OPC UA / DDS Gateway Specification
Deep Dive into the OPC UA / DDS Gateway Specification
Gerardo Pardo-Castellote
 
Database@Home : Data Driven Apps : Core-dev or Low Code UI
Database@Home : Data Driven Apps : Core-dev or Low Code UIDatabase@Home : Data Driven Apps : Core-dev or Low Code UI
Database@Home : Data Driven Apps : Core-dev or Low Code UI
Tammy Bednar
 
Database@Home : Data Driven Apps - Data-driven Microservices Architecture wit...
Database@Home : Data Driven Apps - Data-driven Microservices Architecture wit...Database@Home : Data Driven Apps - Data-driven Microservices Architecture wit...
Database@Home : Data Driven Apps - Data-driven Microservices Architecture wit...
Tammy Bednar
 
Oracle Cloud Infrastructure:2021年1月度サービス・アップデート
Oracle Cloud Infrastructure:2021年1月度サービス・アップデートOracle Cloud Infrastructure:2021年1月度サービス・アップデート
Oracle Cloud Infrastructure:2021年1月度サービス・アップデート
オラクルエンジニア通信
 
【旧版】Oracle Exadata Cloud Service:サービス概要のご紹介 [2020年8月版]
【旧版】Oracle Exadata Cloud Service:サービス概要のご紹介 [2020年8月版]【旧版】Oracle Exadata Cloud Service:サービス概要のご紹介 [2020年8月版]
【旧版】Oracle Exadata Cloud Service:サービス概要のご紹介 [2020年8月版]
オラクルエンジニア通信
 
【旧版】Oracle Cloud Infrastructure:サービス概要のご紹介 [2020年2月版]
【旧版】Oracle Cloud Infrastructure:サービス概要のご紹介 [2020年2月版]【旧版】Oracle Cloud Infrastructure:サービス概要のご紹介 [2020年2月版]
【旧版】Oracle Cloud Infrastructure:サービス概要のご紹介 [2020年2月版]
オラクルエンジニア通信
 
【旧版】Oracle Database Cloud Service:サービス概要のご紹介 [2020年8月版]
【旧版】Oracle Database Cloud Service:サービス概要のご紹介 [2020年8月版]【旧版】Oracle Database Cloud Service:サービス概要のご紹介 [2020年8月版]
【旧版】Oracle Database Cloud Service:サービス概要のご紹介 [2020年8月版]
オラクルエンジニア通信
 
GoldenGate and Stream Processing with Special Guest Rakuten
GoldenGate and Stream Processing with Special Guest RakutenGoldenGate and Stream Processing with Special Guest Rakuten
GoldenGate and Stream Processing with Special Guest Rakuten
Jeffrey T. Pollock
 
Oracle Cloud Infrastructure:2020年6月度サービス・アップデート
Oracle Cloud Infrastructure:2020年6月度サービス・アップデートOracle Cloud Infrastructure:2020年6月度サービス・アップデート
Oracle Cloud Infrastructure:2020年6月度サービス・アップデート
オラクルエンジニア通信
 
Percona Live Europe 2018: What's New in MySQL 8.0 Security
Percona Live Europe 2018: What's New in MySQL 8.0 SecurityPercona Live Europe 2018: What's New in MySQL 8.0 Security
Percona Live Europe 2018: What's New in MySQL 8.0 Security
Georgi Kodinov
 
[非公開]Oracle Cloud Infrastructure Classic ネットワーク機能詳細
[非公開]Oracle Cloud Infrastructure Classic ネットワーク機能詳細[非公開]Oracle Cloud Infrastructure Classic ネットワーク機能詳細
[非公開]Oracle Cloud Infrastructure Classic ネットワーク機能詳細
オラクルエンジニア通信
 

What's hot (20)

はじめてのOracle Cloud Infrastructure(Oracle Cloudウェビナーシリーズ: 2020年7月1日)
はじめてのOracle Cloud Infrastructure(Oracle Cloudウェビナーシリーズ: 2020年7月1日)はじめてのOracle Cloud Infrastructure(Oracle Cloudウェビナーシリーズ: 2020年7月1日)
はじめてのOracle Cloud Infrastructure(Oracle Cloudウェビナーシリーズ: 2020年7月1日)
 
【旧版】Oracle Cloud Infrastructure 料金体系 [2020年5月版]
【旧版】Oracle Cloud Infrastructure 料金体系 [2020年5月版]【旧版】Oracle Cloud Infrastructure 料金体系 [2020年5月版]
【旧版】Oracle Cloud Infrastructure 料金体系 [2020年5月版]
 
Oracle Database / Exadata Cloud 最新情報(Oracle Cloudウェビナーシリーズ: 2020年7月2日)
Oracle Database / Exadata Cloud 最新情報(Oracle Cloudウェビナーシリーズ: 2020年7月2日)Oracle Database / Exadata Cloud 最新情報(Oracle Cloudウェビナーシリーズ: 2020年7月2日)
Oracle Database / Exadata Cloud 最新情報(Oracle Cloudウェビナーシリーズ: 2020年7月2日)
 
【旧版】Oracle Database Cloud Service:サービス概要のご紹介 [2020年5月版]
【旧版】Oracle Database Cloud Service:サービス概要のご紹介 [2020年5月版]【旧版】Oracle Database Cloud Service:サービス概要のご紹介 [2020年5月版]
【旧版】Oracle Database Cloud Service:サービス概要のご紹介 [2020年5月版]
 
Platform Deep Dive
Platform Deep DivePlatform Deep Dive
Platform Deep Dive
 
【旧版】Oracle Cloud Infrastructure:サービス概要のご紹介 [2020年6月版]
【旧版】Oracle Cloud Infrastructure:サービス概要のご紹介 [2020年6月版]【旧版】Oracle Cloud Infrastructure:サービス概要のご紹介 [2020年6月版]
【旧版】Oracle Cloud Infrastructure:サービス概要のご紹介 [2020年6月版]
 
Oracle databáze – Konsolidovaná Data Management Platforma
Oracle databáze – Konsolidovaná Data Management PlatformaOracle databáze – Konsolidovaná Data Management Platforma
Oracle databáze – Konsolidovaná Data Management Platforma
 
Deep Dive into the OPC UA / DDS Gateway Specification
Deep Dive into the OPC UA / DDS Gateway SpecificationDeep Dive into the OPC UA / DDS Gateway Specification
Deep Dive into the OPC UA / DDS Gateway Specification
 
Database@Home : Data Driven Apps : Core-dev or Low Code UI
Database@Home : Data Driven Apps : Core-dev or Low Code UIDatabase@Home : Data Driven Apps : Core-dev or Low Code UI
Database@Home : Data Driven Apps : Core-dev or Low Code UI
 
Database@Home : Data Driven Apps - Data-driven Microservices Architecture wit...
Database@Home : Data Driven Apps - Data-driven Microservices Architecture wit...Database@Home : Data Driven Apps - Data-driven Microservices Architecture wit...
Database@Home : Data Driven Apps - Data-driven Microservices Architecture wit...
 
Oracle Cloud Infrastructure:2021年1月度サービス・アップデート
Oracle Cloud Infrastructure:2021年1月度サービス・アップデートOracle Cloud Infrastructure:2021年1月度サービス・アップデート
Oracle Cloud Infrastructure:2021年1月度サービス・アップデート
 
【旧版】Oracle Exadata Cloud Service:サービス概要のご紹介 [2020年8月版]
【旧版】Oracle Exadata Cloud Service:サービス概要のご紹介 [2020年8月版]【旧版】Oracle Exadata Cloud Service:サービス概要のご紹介 [2020年8月版]
【旧版】Oracle Exadata Cloud Service:サービス概要のご紹介 [2020年8月版]
 
【旧版】Oracle Cloud Infrastructure:サービス概要のご紹介 [2020年2月版]
【旧版】Oracle Cloud Infrastructure:サービス概要のご紹介 [2020年2月版]【旧版】Oracle Cloud Infrastructure:サービス概要のご紹介 [2020年2月版]
【旧版】Oracle Cloud Infrastructure:サービス概要のご紹介 [2020年2月版]
 
Cloud based database
Cloud based databaseCloud based database
Cloud based database
 
【旧版】Oracle Database Cloud Service:サービス概要のご紹介 [2020年8月版]
【旧版】Oracle Database Cloud Service:サービス概要のご紹介 [2020年8月版]【旧版】Oracle Database Cloud Service:サービス概要のご紹介 [2020年8月版]
【旧版】Oracle Database Cloud Service:サービス概要のご紹介 [2020年8月版]
 
GoldenGate and Stream Processing with Special Guest Rakuten
GoldenGate and Stream Processing with Special Guest RakutenGoldenGate and Stream Processing with Special Guest Rakuten
GoldenGate and Stream Processing with Special Guest Rakuten
 
Oracle Cloud Infrastructure:2020年6月度サービス・アップデート
Oracle Cloud Infrastructure:2020年6月度サービス・アップデートOracle Cloud Infrastructure:2020年6月度サービス・アップデート
Oracle Cloud Infrastructure:2020年6月度サービス・アップデート
 
Percona Live Europe 2018: What's New in MySQL 8.0 Security
Percona Live Europe 2018: What's New in MySQL 8.0 SecurityPercona Live Europe 2018: What's New in MySQL 8.0 Security
Percona Live Europe 2018: What's New in MySQL 8.0 Security
 
Oracle Database Vault
Oracle Database VaultOracle Database Vault
Oracle Database Vault
 
[非公開]Oracle Cloud Infrastructure Classic ネットワーク機能詳細
[非公開]Oracle Cloud Infrastructure Classic ネットワーク機能詳細[非公開]Oracle Cloud Infrastructure Classic ネットワーク機能詳細
[非公開]Oracle Cloud Infrastructure Classic ネットワーク機能詳細
 

Similar to Autonomous Database Security Features

Understanding AWS security
Understanding AWS securityUnderstanding AWS security
Understanding AWS security
Amazon Web Services
 
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate CloudEngineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
MarketingArrowECS_CZ
 
Cybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksCybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA Networks
George Wainblat
 
PTC Cloud Services Datasheet: Security Primer
PTC Cloud Services Datasheet: Security PrimerPTC Cloud Services Datasheet: Security Primer
PTC Cloud Services Datasheet: Security Primer
PTC
 
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...
Amazon Web Services
 
Snowflake Data Science and AI/ML at Scale
Snowflake Data Science and AI/ML at ScaleSnowflake Data Science and AI/ML at Scale
Snowflake Data Science and AI/ML at Scale
Adam Doyle
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
Mousumi Manna
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
Mousumi Manna
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
Tapan Biswas
 
PCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security MappingPCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security Mapping
Troy Kitch
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-final
OracleIDM
 
IRJET - Cloud based Datacenter in Virtual Private Network
IRJET - Cloud based Datacenter in Virtual Private NetworkIRJET - Cloud based Datacenter in Virtual Private Network
IRJET - Cloud based Datacenter in Virtual Private Network
IRJET Journal
 
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public CloudProxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
IRJET Journal
 
Block Armour Zero Trust Cybersecurity Mesh for Oil and Gas
Block Armour Zero Trust Cybersecurity Mesh for Oil and GasBlock Armour Zero Trust Cybersecurity Mesh for Oil and Gas
Block Armour Zero Trust Cybersecurity Mesh for Oil and Gas
BlockArmour1
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET Journal
 
PCI DSS Compliance in the Cloud
PCI DSS Compliance in the CloudPCI DSS Compliance in the Cloud
PCI DSS Compliance in the Cloud
ControlCase
 
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
IRJET Journal
 
MySQL 8.0 - Security Features
MySQL 8.0 - Security FeaturesMySQL 8.0 - Security Features
MySQL 8.0 - Security Features
Harin Vadodaria
 

Similar to Autonomous Database Security Features (20)

Understanding AWS security
Understanding AWS securityUnderstanding AWS security
Understanding AWS security
 
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate CloudEngineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
SAP HANA Cloud Security
SAP HANA Cloud SecuritySAP HANA Cloud Security
SAP HANA Cloud Security
 
Cybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksCybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA Networks
 
PTC Cloud Services Datasheet: Security Primer
PTC Cloud Services Datasheet: Security PrimerPTC Cloud Services Datasheet: Security Primer
PTC Cloud Services Datasheet: Security Primer
 
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...
 
Snowflake Data Science and AI/ML at Scale
Snowflake Data Science and AI/ML at ScaleSnowflake Data Science and AI/ML at Scale
Snowflake Data Science and AI/ML at Scale
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
PCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security MappingPCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security Mapping
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-final
 
IRJET - Cloud based Datacenter in Virtual Private Network
IRJET - Cloud based Datacenter in Virtual Private NetworkIRJET - Cloud based Datacenter in Virtual Private Network
IRJET - Cloud based Datacenter in Virtual Private Network
 
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public CloudProxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
 
Block Armour Zero Trust Cybersecurity Mesh for Oil and Gas
Block Armour Zero Trust Cybersecurity Mesh for Oil and GasBlock Armour Zero Trust Cybersecurity Mesh for Oil and Gas
Block Armour Zero Trust Cybersecurity Mesh for Oil and Gas
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
 
PCI DSS Compliance in the Cloud
PCI DSS Compliance in the CloudPCI DSS Compliance in the Cloud
PCI DSS Compliance in the Cloud
 
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
 
MySQL 8.0 - Security Features
MySQL 8.0 - Security FeaturesMySQL 8.0 - Security Features
MySQL 8.0 - Security Features
 

Recently uploaded

Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 

Recently uploaded (20)

Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 

Autonomous Database Security Features

  • 1. March, 2020 Oracle Autonomous Database Security Features 1 © 2020 Oracle
  • 2. Passionate about Cloud & Database Technologies Sinan PetrusToma Senior Solution Engineer EMEA Solution Engineering Hub
  • 3. Safe harbor statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, timing, and pricing of any features or functionality described for Oracle’s products may change and remains at the sole discretion of Oracle Corporation. 3 © 2020 Oracle
  • 4. Agenda 4 © 2020 Oracle  Encryption (Data, Backup,Connections)  Network Access Control  System & Data Protection  Sensitive Data Discovery & Masking  Auditing
  • 5. 5 © 2020 Oracle Data | Your Most Valuable Asset
  • 6. 6 © 2020 Oracle Examples of where data was not very well protected Jul 2019: records of more than 5 million Bulgarians got stolen by hackers from the country’s tax revenue office * * https://edition.cnn.com/2019/07/21/europe/bulgaria-hack-tax-intl/index.html ** https://edition.cnn.com/2019/07/29/business/capital-one-data-breach/index.html *** https://www.cnbc.com/2018/11/30/marriott-says-its-starwood-database-was-breached-onapproximately-500-million-guests-.html Jul 2019: hacker gained access to 100 millionCapital One credit card applications and accounts ** Nov 2018: Marriott said the Starwood guest reservation database was breached, potentially exposing information on about 500 million guests ***
  • 7. 7 © 2020 Oracle Database in focus NAMES ADDRESSES CREDIT CARDS HEALTH RECORD OTHER PII SECRETS Applications Users System, App and DB Admins Social Engineering Attack Apps Bypass Database Target Data Copies Attack Network Test Dev DB Clones Social Engineering Transparent Data Encryption Data Masking Command Restrictions DatabaseVault Access Control Net Encryption Data Safe Auditing Data Redaction Label Security
  • 8. Agenda 8 © 2020 Oracle  Encryption (Data, Backup,Connections)  Network Access Control  System & Data Protection  Sensitive Data Discovery & Masking  Auditing
  • 9. 9 © 2020 Oracle Encryption | Transparent Data Encryption (TDE) Encryption of Application Data on media Enabled by default Encryption keys are managed automatically
  • 10. 10 © 2020 Oracle Encryption | Transparent Data Encryption (TDE) WithoutTDE WithTDE In the event that the storage media or data file is stolen, it is not possible to read the data
  • 11. 11 © 2020 Oracle Encryption | Backups All Backups are encrypted
  • 12. 12 © 2020 Oracle Encryption | SQL*Net Connections All connections MUST useTCP/IP + SSL (TCPS) Customer‘s responsibility  Store wallet files in a secure location  Share wallet files only with authorized users
  • 13. Agenda 13 © 2020 Oracle  Encryption (Data, Backup,Connections)  Network Access Control  System & Data Protection  Sensitive Data Discovery & Masking  Auditing
  • 14. 14 © 2020 Oracle 10.0.0.3 138.1.64.0 138.1.64.192 138.1.66.3 IP Notation Type IP Addresses IP Address 141.143.193.77 ACL OCI RegionOn-Premise 141.143.193.77 Internet TCP/IP : 1522 SSL XTNS:listener x.x.x.x Basement X Oracle Services Network Access Control List (ACL) Wallet Rotation
  • 15. 15 © 2020 Oracle Without ACL With ACL Access Control List (ACL)
  • 16. 16 © 2020 Oracle OCI Region NSG Rule Stateless Source Ingress No 10.0.2.0/24 private:10.0.2.0/24 VCN: 10.0.0.0/16 10.0.2.2 X Oracle Services Network 10.0.2.3 SLpublic:10.0.1.0/24 Rule Stateless Source Ingress Egress No No 0.0.0.0/0 10.0.2.0/24 Internet Gateway Internet Load Balancer ADB Private Endpoint Rule Stateless Source Ingress Egress No No 10.0.1.0/24 10.0.3.0/24 private:10.0.3.0/24SL RT Private Endpoints & Network Security Groups https://www.linkedin.com/pulse/implement-private-endpoint-your-autonomous-database-sinan-petrus-toma/
  • 17. Agenda 17 © 2020 Oracle  Encryption (Data, Backup,Connections)  Network Access Control  System & Data Protection  Sensitive Data Discovery & Masking  Auditing
  • 18. 18 © 2020 Oracle Database Vault  Stolen privileged user credentials are one of the most common attack vectors used by hackers  Database Vault restricts access to application data by privileged users  Prevent malicious or accidental changes that disrupt operations by privileged users  Reduce the risk of insider and outside threats  Address compliance with data privacy laws and standards such as the EU General Data Protection Regulation (GDPR)
  • 19. 19 © 2020 Oracle Database Vault Without DBVault With DBVault
  • 20. 20 © 2020 Oracle High Privileges Restrictions No OS/root logon or SYSDBA privileges Prevent installing or modifying any software on the system
  • 21. 21 © 2020 Oracle SQL Command Restrictions Disable Encryption Unlimited Failed Logins DropTablespace
  • 22. Agenda 22 © 2020 Oracle  Encryption (Data, Backup,Connections)  Network Access Control  System & Data Protection  Sensitive Data Discovery & Masking  Auditing
  • 23. 23 © 2020 Oracle Data Redaction Mask (redact) data that is returned from queries issued by applications Redaction at runtime! Data itself is not changed! Redaction of Credit card, personal IDs, birth dates comply with industry regulations such as Payment Card Industry Data Security Standard (PCI DSS) and the Sarbanes-Oxley Act. Policies can be implemented by the customer
  • 24. 24 © 2020 Oracle Data Redaction Without Data Redaction With Data Redaction
  • 25. 25 © 2020 Oracle Oracle Label Security (OLS) Label their data using different sensitivity levels Users are allowed to access only those data records with the correspondent sensitivity level
  • 26. 26 © 2020 Oracle Oracle Label Security (OLS) Without OLS – All Users With OLS – User 1 With OLS – User 2
  • 27. 27 © 2020 Oracle Data Safe Databases in Oracle CloudDatabases in Oracle Cloud Audit …..Users DiscoverAssess Mask  Unified Database Security Control Center  Security Assessment  User Assessment  User Activity Auditing  Sensitive Data Discovery  Sensitive Data Masking  Saves time and mitigates security risks  Defense in Depth for all customers  No special security expertise needed
  • 28. Data Masking 28 © 2020 Oracle Production Test Development Full Clone Sensitive Data Discover Data Safe Sensitive Data Masking
  • 29. Agenda 29 © 2020 Oracle  Encryption (Data, Backup,Connections)  Network Access Control  System & Data Protection  Sensitive Data Discovery & Masking  Auditing
  • 30. 30 © 2020 Oracle Database Auditing Selective and effective auditing inside the Database using policies and conditions Predefined policies to monitor any abnormal activity Additional audit policies can be configured to audit based on specific IP addresses, programs, time periods, or connection types Enabled by default Can NOT be disabled!
  • 31. 31 © 2020 Oracle Database Auditing
  • 32. 32 © 2020 Oracle API Audit Logs
  • 33. 33 © 2020 Oracle API Audit Logs Audit provides records of API operations performed against supported services Audit logs are maintained for 90 days Can be configured for up to 365 days
  • 34. 34 © 2020 Oracle VCN Flow Logs View connection information for traffic within yourVCN Keeps detailed records of every flow that passes through yourVCN and presents this data for analysis  Source and destination of the traffic  Quantity of traffic  Permit or Deny action taken Information can be used for:  Network monitoring  Troubleshooting  Compliance
  • 35. Copyright © 2019 Oracle and/or its affiliates. OCI Compliance: Current Audit ProgramsGlobalGovernmentIndustryRegional 27001 : 27017 : 27018SOC 1 : SOC 2 : SOC 3 Level 1 Self-Assessment PIPEDA - Canada DoD DISA SRG IL2 Moderate – Agency ATO VPAT – Section 508 G-Cloud 11 - UK Model Clauses - EU US Privacy Shield HIPAA PCI DSS FISC - Japan IGToolkit - UK Cloud Security Principles - UK My Number - Japan Cyber Essentials Plus - UK TISAX - GermanyBSI C5 - GermanyGDPR - EU C5
  • 36. Autonomous Database | Security Features 36 © 2020 Oracle Encryption Transparent Data Encryption Backup Encryption SQL*Net Encryption Access Control Access Control Lists Private Endpoints System & Data Protection DatabaseVault High Privileges Restrictions Sensitive Data Oracle Label Security Data Redaction Data Safe Auditing DatabaseAuditing API Audit Logs* VCN Flow Logs* SQLCommand Restrictions Network Security Groups* * OCI Security Features Wallet Rotation Data Masking Self Patching
  • 37. 37 © 2020 Oracle * Verizon - 2018 Data Breach Investigation Report 85% of security breaches occurred after the CVE was published* Patch Available On-PremiseAutonomous  Downtime Restrictions  Takes LongTime  Human Resources  No Downtime  Applied Immediately  No Customer Interaction
  • 38. 38 © 2020 Oracle Security is Shared Responsibility  Network security and monitoring  OS and platform security  Database patches and upgrades  Data encryption by default  Adminstrative separation of duties  Ongoing security assessments  Users and privileges  Sensitive data discovery  Data protection  Activity auditing Oracle Responsibility Customer Responsibility Tools provided by Oracle
  • 39. Thank you Sinan PetrusToma Senior Solution Engineer Oracle DatabaseCloud Services 39