SlideShare a Scribd company logo
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Engineered Systems - nejlepší cesta jak
zabezpečit Vaše dataAccelerate Cloud
Michal Vítek
Sales Consulting Manager
Oracle Systems CEE
April 2016
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |
Safe Harbor Statement
The following is intended to outline our general product direction. It is intended for
information purposes only, and may not be incorporated into any contract. It is not a
commitment to deliver any material, code, or functionality, and should not be relied upon
in making purchasing decisions. The development, release, and timing of any features or
functionality described for Oracle’s products remains at the sole discretion of Oracle.
3
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |
The New Economics of Security
Global Crime Statistics in Perspective
4
$288BILLIONGLOBAL CYBERCRIME MARKET
$30B
STOLEN
SMART
PHONES
$56B
STOLEN
VEHICLE
MARKET
$85B
COCAINE
MARKET
$114B
STOLEN
CREDIT CARD
MARKET
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |
Reported Intrusions Increased 1,121% in Nine Years by US Government Agencies
Information Security Attacks Are on the Rise
5
0
10,000
20,000
30,000
40,000
50,000
60,000
70,000
2006 2007 2008 2009 2010 2011 2012 2013 2014
Security Incidents Reported to US Computer Emergency Readiness Team by US Federal Agencies
Source: GAO analysis of US Computer Emergency Readiness Team data for fiscal years 2006-2014, GAO-15-573T
5,503
11,911
16,843
29,999
41,776 42,854
48,562
62,214
67,168
Reported Security Incidents Worldwide
Increased 48% from 2013 to 2014
Source: Global State of Information Security Survey 2015
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |
Poor Process Responsible for Majority of Security Incidents
6
of organizations take
3 months or more to
patch systems
Source: Verizon Data Breach Investigations Report, 2015; IIOUG Data Security Survey, 2014, Verizon’s 2015 Data Breach Investigations Report
74%
of 2014 exploits had
patches available for
more than one year
99.9% 76%
of intrusions are from
lost, stolen, or weak
credentials
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Hacking and Malware: Biggest Threats
2004 2005 2006 2007 2008 2009 2010 2011 2012 2013
HACKING
MALWARE
SOCIAL
PHYSICAL
16X
INCREASE
Source: http://www.verizonenterprise.com/DBIR/2014/
Hacking: Exploiting
software weakness
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |
Currently...
Single EU Directive (Directive
95/46/EC) has not prevented
fragmentation in the way Data
Protection is implemented
Outdated: Not prepared for the
Cloud, Big Data & Social
Tough to be competitive in a
market where compliance is not
streamlined
Oracle Confidential – Internal 8
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |
EU Global Data Protection Regulation
Regulation/Law not a Directive
Immediate effect on 28 EU members
after 2 year transition period
Does not require any enabling
legislation to be passed by
governments
Extends the scope to all foreign
companies processing data of EU
residents
Unify Data Protection within
the EU with a single law
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |
EU Global Data Protection Regulation
Aims
Oracle Confidential – Internal 10
Improve business
opportunities by
facilitating the free flow
of personal data in the
digital single market
Enhance data protection
rights of individuals
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |
Key Points
• 204 page legal document
that took 4 years to agree
• Applies to companies
having > 250 staff
• Applies to EU citizen data
inside or outside the EU
• Focus on personal data
• No reference to privacy in
latest document (data
protection instead)
• Rights for data-subjects
• Strict obligations for data-
owners
• Strict obligations for data-
processors
• Right to rectification
• Right to erasure (to be forgotten)
• Right to restriction of processing
• Right to data portability
• Right to object
• Right to not have decisions based
on profiling
• ...
• Data protection by design and
default
• Notification of a personal breach
to the supervisory authority
• Communication of a personal
breach to the data subject
Oracle Confidential
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |
EU General Data Protection Regulation
Need to be able to detect data-breach and respond within 72 hours
http://www.emeeting.europarl.europa.eu/committees/agenda/201512/LIBE/LIBE%282015%291217_1/sitt-1739884
Document: Miscellaneous - 3_consolidated_text- Consolidated text (outcome of the trilogue of 15/12/2015)
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | Oracle Corporation - Confidential 13
http://www.emeeting.europarl.europa.eu/committees/agenda/201512/LIBE/LIBE%282015%291217_1/sitt-1739884
Document: Miscellaneous - 3_consolidated_text- Consolidated text (outcome of the trilogue of 15/12/2015)
EU General Data Protection Regulation
Fine of up to 4% of global revenue
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |
Why do you care?
Administrative Sanctions
Oracle Confidential
€10M or 2%1
€20M or 4%1
- Doesn’t provide requested
information to a data subject
or fails to rectify or erase
- Fails to comply or process
data within legal basis.
- Doesn’t notify of a breach
1 Total Worldwide Annual Turnover
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |
From Now On, Survival Depends on Security
Public 15
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. |
Engineered Systems & Appliances Portfolio
Database
Appliance X5-2
Exadata
Database
Machine
X6-2
X6-8
Exalogic
Elastic Cloud
X5-2
SuperCluster
T5-8
&
M7
Exalytics In
Memory
Machine
X5-4
Big Data
Appliance
X6-2
Private Cloud
Appliance
X5-2
Zero Data
Loss
Recovery
Appliance
X6
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Cybersecurity Building Blocks for
Engineered Systems
17
Creative Commons Image Courtesy: Holger Zscheye @
Flickr
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | 18
Engineered Systems Common Components
COMPUTE STORAGE NETWORK DATABASE
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |
Oracle Security Focus Areas
Secure
Isolation
Access
Control
Data
Protection
Compliance,
Monitoring
and Auditing
COMPUTE STORAGE NETWORK DATABASE
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |
Oracle Security Technologies
Compute Storage Network Database
Secure
Isolation
 Physical
 Electrical
 Hypervisor-Mediated
 Kernel-Mediated
 Physical
 ASM Instances
 ZFS Data Sets
 Physical (Ethernet)
 Ethernet VLANs
 InfiniBand Partitions & Limited
Memberships
 Multitenant
 Instances
 Schema
 Labels
Access
Control
 Solaris Role-based Access
Control
 Delegated LDOM & Zone
Administration
 Trusted Path Login
 ZFS and NFS ACLs
 iSCSI Security
 ASM and Database Scoped
Security
 IP Filter / iptables
 Switch ACLs
 Audit Vault and Database
Firewall
 Exadata Host-based Access
Control
 Roles and Privileges
 Database Vault
 Virtual Private DBs
Data
Protection
 Immutable Zones
 Delegated ZFS Administration
 Oracle Key Manager
 Silicon Secured Memory
 ZFS Encryption
 LOFI Encryption
 Oracle TDE
 Oracle Key Manager
 SSH
 TLSv1.2
 IPsec / IKE
 Oracle TDE
 Data Masking and Redaction
 Oracle Key Manager
Compliance,
Monitoring
and Auditing
 Solaris & Linux Auditing
 BART / AIDE
 Compliance
 ZFS Logging
 Exadata Storage Auditing
 Compliance
 IP Filter / iptables
 Switch Logs
 Compliance
 Database Auditing
 Audit Vault and Database
Firewall
 Compliance
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |
Building the Layers
Securing every layer
21
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |4/20/2016 22
Ogres are like Onions. Onions have layers.Security is like an Ogre. Security has layers too.
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |
The Goal
• Tenants must be unable to see or detect the other tenants
– No visibility of other tenants processes running on the same system
– No visibility of network traffic. Inability to snoop
– No visibility of other tenants storage
– Inability to break out of their environment
• Service Provider must be unable to view or decipher tenant data
– Tenants data must be protected, not just from other tenants, but from the service provider as well
– The must be “some” trust between the service provider and the tenant, but the surfaces for potential
data leakage need to be minimised
– The level of security at this level depends on the contract between the SP and the tenant
Provide the illusion of a dedicated system per tenant
23
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |
Encryption Everywhere
• The most secure way of transporting or storing data is to encrypt it
• In many environments, encryption creates performance overhead which usually means
that expensive out of band encrypt/decrypt devices within the network, and within the
storage framework are used
• This often means that data is only encrypted at the perimeters of the system, and
unencrypted throughout
• SPARC processors contain Hardware based encryption and decryption which allows data
to be encrypted with almost no performance penalty
• The security model leverages this SPARC capability heavily
SPARC Differentiation
24
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |
SuperCluster M7: Crypto Faster than x86 & Power8
IBM Power8 does NOT have AES-CFB hardware, CFB required by Oracle Database
www.ibm.com/developerworks/ibmi/library/i-ibmi-7_2-and-ibm-power8 (fig 2)
AES-CBC
7.8 GB/s
22.1 GB/s
83.1 GB/s
IBM Power8
6core
x86 E5 v3
2.3 GHz
SPARC M7
4.13 Ghz
AES-128-CBC
DB, Cloud,..
SHA512
1.4 GB/s
4.7 GB/s
83.8 GB/s
IBM
Power7+ 8c
E5 v3 2.3
GHz AVX2
SPARC M7
4.13 GHZ
SHA512-1024
Banking,...
Oracle Confidential 254/20/2016
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |
Encryption Everywhere
• We can enable encryption of all data in motion
– All network traffic encrypted via ssl/ipsec
• We can enable encryption of all data at rest
– All filesystems encrypted, and all databases encrypted using Transparent Data Encrytption
• All with minimal performance overhead due to the onboard encryption H/W
• But what about memory?
• We can’t encrypt that
SPARC Differentiation
26
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |
Security In Silicon: Silicon Secured Memory
Applications Memory
Pointer “Y”
Pointer “R”
GO
Pointer “B”
GO
• Protects data in memory
• Hidden “color” bits added to
pointers (key), and content (lock)
• Pointer color (key) must match
content color or program is aborted
• Set on memory allocation, changed on
memory free’
• Protects against access off end of
structure, stale pointer access and
malicious attacks
M7 Processor
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |
Silicon Secured Memory
Revolutionary Improvement in Memory Architecture
• Database In-memory places terabytes of data in memory
– More vulnerable to corruption by bugs/attacks than storage
• SPARC M7 Application Data Integrity prevents malicious
attacks, invalid/stale references, buffer overflows
– Buffer Overflow
– Freed or Stale Pointers (Silent Data Corruption)
• Enables applications to inspect faulting references, diagnose
and take appropriate recovery actions
• Can be used in optimized production code and by using ADI
enabled libraries
• Oracle Studio 12.4 supports ADI: Higher quality code and
shorter development time
28
Buffer Overflow
Data Corruption
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |
A Couple of Famous Examples: Heartbleed & Venom
Buffer Over-Read Attack Buffer Over-Write Attack
Silicon Secured Memory completely neutralises these threats
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |
Encryption Everywhere (except in memory)
• We can enable encryption of all data in motion
– All network traffic encrypted via ssl/ipsec
• We can enable encryption of all data at rest
– All filesystems encrypted, and all databases encrypted using Transparent Data Encrytption
• All with minimal performance overhead due to the onboard encryption H/W
• Memory secured using Silicon Secured Memory.
SPARC Differentiation
30
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |
Securing Compute
• Each tenant runs in usually 4 or more Zones. (2 in the Application Domains,
and 2 in the DB Domains)
• The Zones themselves provide complete security isolation and resource
management from other zones on the domain, and the global zone itself.
• RBAC (Role Based Access Control) configured so tenant never actually gets
full “root” privileges
• Optionally Immutable Zones can be used
• Solaris Auditing configured, and logs stored remotely
Solaris Zones
31
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |
Securing Storage
• Zonepaths for booting the Zones encrypted
• NFS Filesystems mounted from the Zones accessible only via unique IB
partition
• ASM and DB Scoped Security enabled so that the Tenant DB Zones can only
see their own grid disks
• TDE (Transparent Data Encryption) used to encrypt all DB data. Makes use
of hardware based cryptographic acceleration
Exadata Storage Cells, and ZFS
32
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |
Securing Network
• Each Zone configured with dedicated IP stack, and each tenant on a
different vlan
• Dedicated IB partition for Tenant Zone – Zone communication
• Outbound traffic all configured with SSL
• IPsec configured for all traffic on common Exadata Storage Cell partition
• IPfilter to limit outbound communication on Management network and
connection to ZFS Appliance (RBAC stops tenant from changing it)
• IPfilter logging enabled to detect attempts to be naughty.
Client Access, Internal IB, Management
33
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |
Securing Database
• Database access is essentially protected by all of the aforementioned
techniques, but adding another layer provides even more protection, not
necessarily from other tenants, but to limit access to legitimate users
• Roles and Privileges to control who can see what. (Especially important
when DB instances are being managed by Service Provider)
• Data Redaction fits seamlessly into the above
• Database Vault, Audit Vault and Firewall all add even more defenses
Oracle 12c Security Features
34
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |
Implementing
Putting it all together
35
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |
Metering, Limiting and Charging
Tenant Self Provisioning
Resource Management
Role Based Access
Workload Isolation
Multitenant Cloud Architecture – Principals of Design
4/20/2016 Oracle Confidential 36
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |
Multi-Tenant Consolidation
Tenant Viewpoint
Secure Configuration Steps
• Implement Multiple Service
Workload Recommendations
• Enhance Operating System Security
– Restrict Tenant Access to Solaris Zones
– Implement Tenant Administrator Role
– Implement Immutable Firewall Policy
– Implement Immutable Auditing Policy
• Enhance Network Security
– Implement IPsec/IKE for RAC Interconnect
with Tenant Specific Keys
– Implement IP Filter on Application Zones
– Restrict Tenant Access to SuperCluster
Management Network and Services
Client
Access
Network
Oracle Database Cluster (RAC)
Tenant Specific
Immutable Zone
Oracle Database
Tenant Specific
Immutable Zone
Oracle Database
RDSv3
IPoIB
SDP
IPoIB
SDP
SSL
SSH
Oracle WebLogic Cluster
Tenant Specific
Immutable Zone
Oracle WebLogic
Tenant Specific
Immutable Zone
Oracle WebLogic
Tenant
Specific
VLANs
Tenant
Specific
InfiniBand
Network
Partition
Tenant-Specific
Internal
Communications
Oracle Exadata Storage Servers
RDSv3
Oracle Exadata Storage and RAC
Specific Communications
Tenant Specific Disk Group(s)
Exadata Storage Partition
InfiniBand Network
ZFS Volumes/Data Sets
Oracle
Sun ZFS
Storage
Appliance
Binaries
Configurations
Backups
Logs
Tenant-Specific NAS Storage
NFS
iSCSI
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |
Multi-Tenant Environment on SuperCluster
Compute Storage Network Database
Secure
Isolation
 Physical
 Electrical
 Hypervisor-Mediated
 Kernel-Mediated
 Physical
 ASM Instances
 ZFS Data Sets
 Physical (Ethernet)
 Ethernet VLANs
 InfiniBand Partitions & Limited
Memberships
 Multitenant
 Instances
 Schema
 Labels
Access
Control
 Solaris Role-based Access
Control
 Delegated LDOM & Zone
Administration
 Trusted Path Login
 ZFS and NFS ACLs
 iSCSI Security
 ASM and Database Scoped
Security
 IP Filter / iptables
 Switch ACLs
 Audit Vault and Database
Firewall
 Exadata Host-based Access
Control
 Roles and Privileges
 Database Vault
 Virtual Private DBs
Data
Protection
 Immutable Zones
 Delegated ZFS Administration
 Oracle Key Manager
 Silicon Secured Memory
 ZFS Encryption
 LOFI Encryption
 Oracle TDE
 Oracle Key Manager
 SSH
 TLSv1.2
 IPsec / IKE
 Oracle TDE
 Data Masking and Redaction
 Oracle Key Manager
Compliance,
Monitoring
and Auditing
 Solaris & Linux Auditing
 BART / AIDE
 Compliance
 ZFS Logging
 Exadata Storage Auditing
 Compliance
 IP Filter / iptables
 Switch Logs
 Compliance
 Database Auditing
 Audit Vault and Database
Firewall
 Compliance
Secure Multi-tenancy on Oracle SuperCluster: A
Technical Deployment Cookbook
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |
Secure Multi-tenancy On SuperCluster
Database
Mgmt
Compute
Network
Storage
OS
MgmtApplication
Database
ComputeNetwork
StorageOS Mgmt
Application Database
ComputeNetwork Storage
OS Mgmt
Application
Database
OS
Customer (C)
Customer (A)
Customer (D)
Customer (D)
Customer (E)
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |
• Secure system spanning both application and
database tiers
• M7 Application Data Integrity memory
protection Software-in-Silicon
• Built-in compliance report automation
• Restricted management console access
• Pervasive near-zero-overhead encryption
• Anti-malware protection
• Comprehensive administrative action audit trail
Monitoring the Security and Compliance
Oracle Confidential 404/20/2016
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |
Summary
• Security is underpinned by enabling encryption for all data in motion and at
rest
• The only place where data is NOT encrypted (memory), is protected by
Silicon Secured Memory
• Fully integrated and layered security model covering compute, storage,
networking and database
• Supported by a robust compliance and auditing framework, so that
attempted breaches can be identified and defended against
• It’s all about the layers!
Oracle provides a complete and integrated solution
41
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |
Engineered Systems Security Summary
Complete Tested
ü ü
ü ü
Integrated
Trusted
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | 43
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Backup slides
45
Creative Commons Image Courtesy: Holger Zscheye @
Flickr
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | 46
Engineered Systems Common Components
COMPUTE STORAGE NETWORK DATABASE
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | 47
Engineered Systems Security Focus Areas
Secure
Isolation
Access
Control
Data
Protection
Monitoring
and Auditing
COMPUTE STORAGE NETWORK DATABASE
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | 48
Secure Workload Isolation
Physical
Isolation
Domain 1
Database
Domain 1
SPARC
T5-8
Server
1
SPARC
T5-8
Server
2
Database
Zones
Isolation
Domain 1
SPARC
T5-8
Server
Zone A
Database
Zone B
Database
Zone C
Database
Zone D
Database
POSIX
Isolation
Domain 1
SPARC
T5-8
Server
Database
Database
Database
Database
Hypervisor
Isolation
Domain 1
Database
Domain 2
Database
Hypervisor!
SPARC
T5-8
Server
Electrical
Isolation
Domain 1
Database
Domain 2
Database
SPARC
M6-32
Server
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | 49
Secure Database Isolation
Instance
Isolation
Schema
Isolation
Label
Isolation
Container
Isolation
Domain 1
Server
Database
Database
Database
Database
Domain 1
Server
Container
Database
Pluggable
Database
Pluggable
Database
Pluggable
Database
Pluggable
Database
Domain 1
Server
Database
Schema
Schema
Schema
Schema
Domain 1
Server
Database
Schema
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | 50
Secure (Ethernet) Network Isolation
Domain 1
Domain 2
SPARC
T5-8
Server
Zone A
Client
Access
Network
Client
A-1
Zone C
VLAN
C
Database C-1
Client
C-1 IPsec / SSL
Zone B
Database A-1
IPMPA-1
VLAN A-1-0
VLAN A-1-1
Database B-1
Adding
Cryptographic
Isolation
Layer 2
VNIC and VLAN
Isolation
IPMPB-1
VNIC B-1-0
VNIC B-1-1
net1
net0
Client
B-1
VLAN
A
Network
B
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | 51
Secure (InfiniBand) Network Isolation
ASM Disk Groups
ASM Disk Group A
Oracle Exadata
Storage Servers
ZFS Data Sets
ZFS Data Set
C-1
ZFS Data Set
D-1
Sun ZFS Storage Appliance
InfiniBand
Network
Partition: 0xFFFF
Protocol: RDSv3
Partition: 0x8503
Protocol: NFS / IPoIB
Oracle VM Server for SPARC
Database Domain
Oracle Solaris 11 Zone
(Zone A)
Oracle Database
11g Release 2
Instance A-1
Oracle Database
11g Release 2
Instance A-2
Application Domain
Zone C
Oracle Database
11g Release 2
Instance C-1
Zone D
Oracle Database
11g Release 2
Instance D-1
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | 52
End to End Access Control
Compute
Strong
Authentication
Role-based
Access Control
Privileged User
Access Control
Storage
ASM Security
NFS Access
Controls
iSCSI Access
Controls
Network
Boundary
Hardening
Network
Partitioning
Packet Filtering
Database
Strong
Authentication
Role-based
Access Control
Privileged User
Access Control
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | 53
End to End Data Protection
Database Domain
SPARC T5 Hardware
Assisted Cryptography
Zone A
Oracle Database
A-1
Client
Access
Network
SSL
InfiniBand
Network
Partition
Intel AES-NI Hardware
Assisted Cryptography
Client
A-1
Oracle PKCS#11 Wallet
(Oracle Solaris PKCS#11 Softtoken)
SSL
Certificate
A-1
Oracle Solaris
Cryptographic Framework
ASM Disk Groups
Disk Group A-1
Oracle
Exadata
Storage
Servers
Encrypted
Tablespaces
ZFS Data Sets
Data Sets A-1
Encrypted
Backups
Export Files
Sun ZFS
Storage
Appliance
RDSv3
NFSv4
TDE
Master Key
A-1
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Secured Architectures on Engineered
Systems
54
Creative Commons Image Courtesy: Guillermo @ Flickr
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | 55
Single Service Workload
Oracle Exadata Database Machine Example
Sample Secure Configuration Steps
• Implement Exadata Hardening
• Apply Security Updates
• Enhance Operating System Security
– Site-Specific Security Hardening
– Authentication and Access Policies
– System Auditing Policy
• Enhance Database Security
– Site-Specific Security Hardening
– Enable Encrypted Communications
– Configure Transparent Data Encryption
– Configure Database Vault
• Enhance Management Security
– Change Default Passwords
– Site-Specific Hardening
– Replace Self-Signed Certificates
InfiniBand
Network
Oracle
Exadata
Storage
Servers
Oracle Linux 5
Oracle Linux 5
Sun
X4-2
Server
Sun
X4-2
Server
ASMASMClient
Access
Network
SSL
SSL
Oracle
Database 11g
Release 2
Oracle
Database 11g
Release 2
RAC
Cluster
Disk Group A
Disk Group B
Tablespace
Tablespace
Tablespace
Tablespace
Tablespace
Tablespace
ASM Cluster
RDSv3
RDSv3
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | 56
Single Service Tier Consolidation
Oracle Exadata Database Machine Example
Sample Secure Configuration Steps
• Implement Single Service Workload
Recommendations
• Enhance Operating System Security
– Implement Database-specific Users/Roles
– Implement POSIX Isolation of Instances
– Implement Resource Controls
• Enhance Storage Security
– Implement Exadata Security
– Implement Resource Controls
InfiniBand
Network
Oracle
Exadata
Storage
Servers
Oracle Linux 5
Oracle Linux 5
Sun
X4-2
Server
Sun
X4-2
Server
ASMASMClient
Access
Network
SSL
SSL
Tablespace
Tablespace
Tablespace
Tablespace
Tablespace
ASM Cluster
Oracle Database
11g Release 2
Oracle Database
11g Release 2
SSL
Tablespace
Tablespace
RDSv3
RDSv3
RDSv3
DiskGroupDiskGroupDiskGroup
Oracle Database
11g Release 2
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | 57
Multiple Service Tier Consolidation
Oracle SuperCluster Example – Secure Isolation View
Web
Tier
Network
IPoIB/SDP
InfiniBand
Network
Partition
Exadata
Tier
Network
RDSv3
InfiniBand
Network
Partition
Client
Access
Network
SSL/TLS
10GbE
Network
Database
Tier
Network
IPoIB/SDP
InfiniBand
Network
Partition
Oracle Traffic Director
Cluster
OTD Zone 1
Oracle Traffic
Director 11g
OTD Zone 1
Oracle Traffic
Director 11g
Oracle WebLogic
Server Cluster
WLS Zone 1
Oracle WebLogic
Server 12c
Oracle WebLogic
Server 12c
WLS Zone 2
Oracle WebLogic
Server 12c
Oracle WebLogic
Server 12c
Oracle Database
Cluster
DB Zone 1
Oracle Database 11g
Release 2
DB Zone 2
Oracle Database 11g
Release 2
Physical Server 1
Application Domain 1 Application Domain 1 Database Domain 1
Physical Server 2
Application Domain 2 Application Domain 2 Database Domain 2
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | 58
Multiple Service Tier Consolidation
Oracle SuperCluster Example – Data Protection View
InfiniBand
Network
Partition
#1
SPARC T5 Hardware
Assisted Cryptography
Client
Access
Network
Database Domain
Oracle Solaris
Cryptographic Framework
Zone C
Oracle Database
11g Release 2
Oracle PKCS#11 Wallet
(Oracle Solaris PKCS#11 Softtoken)
SSL
Certificate
TDE
Master Key
Intel AES-NI Hardware
Assisted Cryptography
ASM Disk Groups
Oracle
Exadata
Storage
ServersENCRYPTED
Tablespaces
ZFS Volumes/Data Sets
ENCRYPTED
Sun ZFS
Storage
Appliance
Binaries
Configurations
BackupsApplication Domain
Zone B
Oracle WebLogic
Server 12c
Oracle Solaris
Cryptographic Framework
Zone A
Oracle Traffic
Director 11g
SSL InfiniBand
Network
Partition
#2
RDSv3
InfiniBand
Network
Partition
#3
iSCSI,
NFS
SSL
SSL
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | 59
Multiple Service Tier Consolidation
Additional Security Controls and Technologies
COMPUTE
Oracle VM Server for
SPARC
Solaris Non-Global and
Immutable Zones
Solaris RBAC and Fine-
Grained Privileges
STORAGE
Encrypted ZFS Data Sets
and Volumes
iSCSI Authentication
iSCSI and NFS Access
Controls
NETWORK
Full and Limited
Membership InfiniBand
Partitions
Solaris IP Filter and
IPsec/IKE
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | 60
Multiple Tenant Consolidation
Oracle SuperCluster Example – Tenant Viewpoint
Sample Secure Configuration Steps
• Implement Multiple Service
Workload Recommendations
• Enhance Operating System Security
– Restrict Tenant Access to Solaris Zones
– Implement Tenant Administrator Role
– Implement Immutable Firewall Policy
– Implement Immutable Auditing Policy
• Enhance Network Security
– Implement IPsec/IKE for RAC Interconnect
with Tenant Specific Keys
– Implement IP Filter on Application Zones
– Restrict Tenant Access to SuperCluster
Management Network and Services
Client
Access
Network
Oracle Database Cluster (RAC)
Tenant Specific
Immutable Zone
Oracle Database
Tenant Specific
Immutable Zone
Oracle Database
RDSv3
IPoIB
SDP
IPoIB
SDP
SSL
SSH
Oracle WebLogic Cluster
Tenant Specific
Immutable Zone
Oracle WebLogic
Tenant Specific
Immutable Zone
Oracle WebLogic
Tenant
Specific
VLANs
Tenant
Specific
InfiniBand
Network
Partition
Tenant-Specific
Internal
Communications
Oracle Exadata Storage Servers
RDSv3
Oracle Exadata Storage and RAC
Specific Communications
Tenant Specific Disk Group(s)
Exadata Storage Partition
InfiniBand Network
ZFS Volumes/Data Sets
Oracle
Sun ZFS
Storage
Appliance
Binaries
Configurations
Backups
Logs
Tenant-Specific NAS Storage
NFS
iSCSI
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | 61
Multiple Tenant Consolidation
Oracle SuperCluster Example – Provider Viewpoint
Client
Access
Network
Application Domain
Database Domain
SPARC
T5-8
Server
Tenant A Zone 2
Oracle Database
Tenant B Zone 2
Oracle Database
Tenant B Zone 1
Application
Tenant A Zone 1
Application
VLAN B
Tenant
B
HTTPS
VLAN A
HTTPS
Tenant
A
RDSv3
Tenant B Network
Partition
Tenant A
Network
Partition
NFSv4
iSCSI
Application B
Storage
Application A
Storage
Database A
Storage
Database B
Storage
Sun ZFS
Storage
Appliance
InfiniBand
Network
Tenant A
Disk Groups
Tenant B
Disk Groups
Exadata
Storage
Servers
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | 62
Engineered Systems Security Capability Summary
Compute Storage Network Database
Secure
Isolation
§ Physical
§ Electrical
§ Hypervisor-Mediated
§ Kernel-Mediated
§ Physical
§ ASM Instances
§ ZFS Data Sets
§ Physical (Ethernet)
§ Ethernet VLANs
§ InfiniBand Partitions
§ Multitenant
§ Instances
§ Schema
§ Labels
Access
Control
§ RBAC / Privileges
§ LDOM Administration
§ Zone Administration
§ ZFS ACLs
§ Exadata Security
§ NFS Security
§ IP Filter / iptables
§ Switch ACLs
§ Audit Vault and
Database Firewall
§ Roles and Privileges
§ Real Application
Security
§ Database Vault
Data
Protection
§ Immutable Zones
§ Read-Only Mounts
§ ZFS Administration
§ ZFS Encryption
§ LOFI Encryption
§ TDE
§ SSH
§ SSL / TLS
§ IPsec / IKE
§ Virtual Private DB
§ Data Masking
§ Redaction
Monitoring
and Auditing
§ Solaris Auditing
§ Linux Auditing
§ BART / AIDE
§ ZFS Storage
Appliance Logs
§ Exadata Storage
Auditing
§ IP Filter / iptables
§ Switch Logs
§ Database Auditing
§ Audit Vault and
Database Firewall

More Related Content

What's hot

IRDAI Compliance & Data-Centric Security | Seclore
IRDAI Compliance & Data-Centric Security | SecloreIRDAI Compliance & Data-Centric Security | Seclore
IRDAI Compliance & Data-Centric Security | Seclore
Seclore
 
CipherCloud Technology Overview: Encryption
CipherCloud Technology Overview: EncryptionCipherCloud Technology Overview: Encryption
CipherCloud Technology Overview: Encryption
CipherCloud
 
CipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution OverviewCipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution Overview
CipherCloud
 
HIPAA
HIPAAHIPAA
Cisco Connect 2018 Indonesia - Building a secure data center
Cisco Connect 2018 Indonesia - Building a secure data center Cisco Connect 2018 Indonesia - Building a secure data center
Cisco Connect 2018 Indonesia - Building a secure data center
NetworkCollaborators
 
Information Security Challenges & Opportunities
Information Security Challenges & OpportunitiesInformation Security Challenges & Opportunities
Information Security Challenges & Opportunities
Muhammad Faisal Naqvi, CISSP, CISA, AMBCI, ITIL, ISMS LA n Master
 
CIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud AdoptionCIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud Adoption
CipherCloud
 
Secure Your Web Applications and Achieve Compliance
Secure Your Web Applications and Achieve Compliance Secure Your Web Applications and Achieve Compliance
Secure Your Web Applications and Achieve Compliance
Avi Networks
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Canada
 
Will your cloud be compliant
Will your cloud be compliantWill your cloud be compliant
Will your cloud be compliant
Evgeniya Shumakher
 
Mii Oracle Biz Map 2009
Mii Oracle Biz Map 2009Mii Oracle Biz Map 2009
Mii Oracle Biz Map 2009
Dira Sabrina
 
Apani Ov V9
Apani Ov V9Apani Ov V9
Apani Ov V9
ScottBreadmore
 
Insider Threat Protection | Seclore
Insider Threat Protection | SecloreInsider Threat Protection | Seclore
Insider Threat Protection | Seclore
Seclore
 
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...
NetworkCollaborators
 
SOC Foundation
SOC FoundationSOC Foundation
SOC Foundation
Masoud Ostad
 
Conquest Security Capabilities
Conquest Security CapabilitiesConquest Security Capabilities
Conquest Security Capabilities
Conquest Security, Inc.
 
SCADAShield-Datasheet
SCADAShield-DatasheetSCADAShield-Datasheet
SCADAShield-Datasheet
Oscar Williams
 
10 Things That Compromise Patient Data
10 Things That Compromise Patient Data10 Things That Compromise Patient Data
10 Things That Compromise Patient Data
Texas Medical Liability Trust
 
Metholodogies and Security Standards
Metholodogies and Security StandardsMetholodogies and Security Standards
Metholodogies and Security Standards
Conferencias FIST
 
Arul NCOAUG presentation - Aug 2010
Arul NCOAUG presentation - Aug 2010Arul NCOAUG presentation - Aug 2010
Arul NCOAUG presentation - Aug 2010
asenapathi
 

What's hot (20)

IRDAI Compliance & Data-Centric Security | Seclore
IRDAI Compliance & Data-Centric Security | SecloreIRDAI Compliance & Data-Centric Security | Seclore
IRDAI Compliance & Data-Centric Security | Seclore
 
CipherCloud Technology Overview: Encryption
CipherCloud Technology Overview: EncryptionCipherCloud Technology Overview: Encryption
CipherCloud Technology Overview: Encryption
 
CipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution OverviewCipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution Overview
 
HIPAA
HIPAAHIPAA
HIPAA
 
Cisco Connect 2018 Indonesia - Building a secure data center
Cisco Connect 2018 Indonesia - Building a secure data center Cisco Connect 2018 Indonesia - Building a secure data center
Cisco Connect 2018 Indonesia - Building a secure data center
 
Information Security Challenges & Opportunities
Information Security Challenges & OpportunitiesInformation Security Challenges & Opportunities
Information Security Challenges & Opportunities
 
CIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud AdoptionCIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud Adoption
 
Secure Your Web Applications and Achieve Compliance
Secure Your Web Applications and Achieve Compliance Secure Your Web Applications and Achieve Compliance
Secure Your Web Applications and Achieve Compliance
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
 
Will your cloud be compliant
Will your cloud be compliantWill your cloud be compliant
Will your cloud be compliant
 
Mii Oracle Biz Map 2009
Mii Oracle Biz Map 2009Mii Oracle Biz Map 2009
Mii Oracle Biz Map 2009
 
Apani Ov V9
Apani Ov V9Apani Ov V9
Apani Ov V9
 
Insider Threat Protection | Seclore
Insider Threat Protection | SecloreInsider Threat Protection | Seclore
Insider Threat Protection | Seclore
 
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...
 
SOC Foundation
SOC FoundationSOC Foundation
SOC Foundation
 
Conquest Security Capabilities
Conquest Security CapabilitiesConquest Security Capabilities
Conquest Security Capabilities
 
SCADAShield-Datasheet
SCADAShield-DatasheetSCADAShield-Datasheet
SCADAShield-Datasheet
 
10 Things That Compromise Patient Data
10 Things That Compromise Patient Data10 Things That Compromise Patient Data
10 Things That Compromise Patient Data
 
Metholodogies and Security Standards
Metholodogies and Security StandardsMetholodogies and Security Standards
Metholodogies and Security Standards
 
Arul NCOAUG presentation - Aug 2010
Arul NCOAUG presentation - Aug 2010Arul NCOAUG presentation - Aug 2010
Arul NCOAUG presentation - Aug 2010
 

Similar to Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud

MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirementsMySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
Olivier DASINI
 
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
Government Technology and Services Coalition
 
AV/DF Advanced Security Option
AV/DF Advanced Security OptionAV/DF Advanced Security Option
AV/DF Advanced Security Option
DLT Solutions
 
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba EraThe Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
Luca Martelli
 
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
Indus Khaitan
 
Enabling the-Connected-Car-Java
Enabling the-Connected-Car-JavaEnabling the-Connected-Car-Java
Enabling the-Connected-Car-Java
terrencebarr
 
Autonomous Database Security Features
Autonomous Database Security FeaturesAutonomous Database Security Features
Autonomous Database Security Features
SinanPetrusToma
 
Enterprise Mobility: Secure Containerization
Enterprise Mobility: Secure ContainerizationEnterprise Mobility: Secure Containerization
Enterprise Mobility: Secure Containerization
Domenico Catalano
 
B4 the identity of things-securing the internet of everything
B4   the identity of things-securing the internet of everythingB4   the identity of things-securing the internet of everything
B4 the identity of things-securing the internet of everything
Dr. Wilfred Lin (Ph.D.)
 
Oracle Key Vault Data Subsetting and Masking
Oracle Key Vault Data Subsetting and MaskingOracle Key Vault Data Subsetting and Masking
Oracle Key Vault Data Subsetting and Masking
DLT Solutions
 
Threat Modeling for the Internet of Things
Threat Modeling for the Internet of ThingsThreat Modeling for the Internet of Things
Threat Modeling for the Internet of Things
Eric Vétillard
 
Oracle Cloud Café IoT 12-APR-2016
Oracle Cloud Café IoT 12-APR-2016Oracle Cloud Café IoT 12-APR-2016
Oracle Cloud Café IoT 12-APR-2016
Jean-Marc Hui Bon Hoa
 
Oracle Cloud Café IOT 12 avril 2016
Oracle Cloud Café IOT 12 avril 2016Oracle Cloud Café IOT 12 avril 2016
Oracle Cloud Café IOT 12 avril 2016
Sorathaya Sirimanotham
 
The “Security” in Oracle’s Secure Cloud Infrastructure
The “Security” in Oracle’s Secure Cloud InfrastructureThe “Security” in Oracle’s Secure Cloud Infrastructure
The “Security” in Oracle’s Secure Cloud Infrastructure
MarketingArrowECS_CZ
 
A5 cloud security_now_a_reason_to_move_to_the_cloud
A5 cloud security_now_a_reason_to_move_to_the_cloudA5 cloud security_now_a_reason_to_move_to_the_cloud
A5 cloud security_now_a_reason_to_move_to_the_cloud
Dr. Wilfred Lin (Ph.D.)
 
SOUG Day - autonomous what is next
SOUG Day - autonomous what is nextSOUG Day - autonomous what is next
SOUG Day - autonomous what is next
Thomas Teske
 
Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - ...
Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - ...Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - ...
Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - ...
Nadine Schoene
 
JavaOne 2015: CON3434 - Bringing IoT Cloud Services ...
JavaOne 2015: CON3434 - Bringing IoT Cloud Services ...JavaOne 2015: CON3434 - Bringing IoT Cloud Services ...
JavaOne 2015: CON3434 - Bringing IoT Cloud Services ...
terrencebarr
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help
Niklas Hjorthen
 
Securing data in Oracle Database 12c - 2015
Securing data in Oracle Database 12c - 2015Securing data in Oracle Database 12c - 2015
Securing data in Oracle Database 12c - 2015
Connor McDonald
 

Similar to Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud (20)

MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirementsMySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
 
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
 
AV/DF Advanced Security Option
AV/DF Advanced Security OptionAV/DF Advanced Security Option
AV/DF Advanced Security Option
 
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba EraThe Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
 
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
 
Enabling the-Connected-Car-Java
Enabling the-Connected-Car-JavaEnabling the-Connected-Car-Java
Enabling the-Connected-Car-Java
 
Autonomous Database Security Features
Autonomous Database Security FeaturesAutonomous Database Security Features
Autonomous Database Security Features
 
Enterprise Mobility: Secure Containerization
Enterprise Mobility: Secure ContainerizationEnterprise Mobility: Secure Containerization
Enterprise Mobility: Secure Containerization
 
B4 the identity of things-securing the internet of everything
B4   the identity of things-securing the internet of everythingB4   the identity of things-securing the internet of everything
B4 the identity of things-securing the internet of everything
 
Oracle Key Vault Data Subsetting and Masking
Oracle Key Vault Data Subsetting and MaskingOracle Key Vault Data Subsetting and Masking
Oracle Key Vault Data Subsetting and Masking
 
Threat Modeling for the Internet of Things
Threat Modeling for the Internet of ThingsThreat Modeling for the Internet of Things
Threat Modeling for the Internet of Things
 
Oracle Cloud Café IoT 12-APR-2016
Oracle Cloud Café IoT 12-APR-2016Oracle Cloud Café IoT 12-APR-2016
Oracle Cloud Café IoT 12-APR-2016
 
Oracle Cloud Café IOT 12 avril 2016
Oracle Cloud Café IOT 12 avril 2016Oracle Cloud Café IOT 12 avril 2016
Oracle Cloud Café IOT 12 avril 2016
 
The “Security” in Oracle’s Secure Cloud Infrastructure
The “Security” in Oracle’s Secure Cloud InfrastructureThe “Security” in Oracle’s Secure Cloud Infrastructure
The “Security” in Oracle’s Secure Cloud Infrastructure
 
A5 cloud security_now_a_reason_to_move_to_the_cloud
A5 cloud security_now_a_reason_to_move_to_the_cloudA5 cloud security_now_a_reason_to_move_to_the_cloud
A5 cloud security_now_a_reason_to_move_to_the_cloud
 
SOUG Day - autonomous what is next
SOUG Day - autonomous what is nextSOUG Day - autonomous what is next
SOUG Day - autonomous what is next
 
Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - ...
Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - ...Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - ...
Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - ...
 
JavaOne 2015: CON3434 - Bringing IoT Cloud Services ...
JavaOne 2015: CON3434 - Bringing IoT Cloud Services ...JavaOne 2015: CON3434 - Bringing IoT Cloud Services ...
JavaOne 2015: CON3434 - Bringing IoT Cloud Services ...
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help
 
Securing data in Oracle Database 12c - 2015
Securing data in Oracle Database 12c - 2015Securing data in Oracle Database 12c - 2015
Securing data in Oracle Database 12c - 2015
 

More from MarketingArrowECS_CZ

INFINIDAT InfiniGuard - 20220330.pdf
INFINIDAT InfiniGuard - 20220330.pdfINFINIDAT InfiniGuard - 20220330.pdf
INFINIDAT InfiniGuard - 20220330.pdf
MarketingArrowECS_CZ
 
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
MarketingArrowECS_CZ
 
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Jak konsolidovat Vaše databáze s využitím Cloud služeb?Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
MarketingArrowECS_CZ
 
Chráníte správně svoje data?
Chráníte správně svoje data?Chráníte správně svoje data?
Chráníte správně svoje data?
MarketingArrowECS_CZ
 
Oracle databáze – Konsolidovaná Data Management Platforma
Oracle databáze – Konsolidovaná Data Management PlatformaOracle databáze – Konsolidovaná Data Management Platforma
Oracle databáze – Konsolidovaná Data Management Platforma
MarketingArrowECS_CZ
 
Nové vlastnosti Oracle Database Appliance
Nové vlastnosti Oracle Database ApplianceNové vlastnosti Oracle Database Appliance
Nové vlastnosti Oracle Database Appliance
MarketingArrowECS_CZ
 
Infinidat InfiniGuard
Infinidat InfiniGuardInfinidat InfiniGuard
Infinidat InfiniGuard
MarketingArrowECS_CZ
 
Infinidat InfiniBox
Infinidat InfiniBoxInfinidat InfiniBox
Infinidat InfiniBox
MarketingArrowECS_CZ
 
Novinky ve světě Oracle DB a koncept konvergované databáze
Novinky ve světě Oracle DB a koncept konvergované databázeNovinky ve světě Oracle DB a koncept konvergované databáze
Novinky ve světě Oracle DB a koncept konvergované databáze
MarketingArrowECS_CZ
 
Základy licencování Oracle software
Základy licencování Oracle softwareZáklady licencování Oracle software
Základy licencování Oracle software
MarketingArrowECS_CZ
 
Garance 100% dostupnosti dat! Kdo z vás to má?
Garance 100% dostupnosti dat! Kdo z vás to má?Garance 100% dostupnosti dat! Kdo z vás to má?
Garance 100% dostupnosti dat! Kdo z vás to má?
MarketingArrowECS_CZ
 
Využijte svou Oracle databázi naplno
Využijte svou Oracle databázi naplnoVyužijte svou Oracle databázi naplno
Využijte svou Oracle databázi naplno
MarketingArrowECS_CZ
 
Oracle Data Protection - 2. část
Oracle Data Protection - 2. částOracle Data Protection - 2. část
Oracle Data Protection - 2. část
MarketingArrowECS_CZ
 
Oracle Data Protection - 1. část
Oracle Data Protection - 1. částOracle Data Protection - 1. část
Oracle Data Protection - 1. část
MarketingArrowECS_CZ
 
Benefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (4/4): StorageBenefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (4/4): Storage
MarketingArrowECS_CZ
 
Benefity Oracle Cloudu (3/4): Compute
Benefity Oracle Cloudu (3/4): ComputeBenefity Oracle Cloudu (3/4): Compute
Benefity Oracle Cloudu (3/4): Compute
MarketingArrowECS_CZ
 
InfiniBox z pohledu zákazníka
InfiniBox z pohledu zákazníkaInfiniBox z pohledu zákazníka
InfiniBox z pohledu zákazníka
MarketingArrowECS_CZ
 
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 2. částExadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
MarketingArrowECS_CZ
 
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. částExadata z pohledu zákazníka a novinky generace X8M - 1. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
MarketingArrowECS_CZ
 
Úvod do Oracle Cloud infrastruktury
Úvod do Oracle Cloud infrastrukturyÚvod do Oracle Cloud infrastruktury
Úvod do Oracle Cloud infrastruktury
MarketingArrowECS_CZ
 

More from MarketingArrowECS_CZ (20)

INFINIDAT InfiniGuard - 20220330.pdf
INFINIDAT InfiniGuard - 20220330.pdfINFINIDAT InfiniGuard - 20220330.pdf
INFINIDAT InfiniGuard - 20220330.pdf
 
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
 
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Jak konsolidovat Vaše databáze s využitím Cloud služeb?Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
 
Chráníte správně svoje data?
Chráníte správně svoje data?Chráníte správně svoje data?
Chráníte správně svoje data?
 
Oracle databáze – Konsolidovaná Data Management Platforma
Oracle databáze – Konsolidovaná Data Management PlatformaOracle databáze – Konsolidovaná Data Management Platforma
Oracle databáze – Konsolidovaná Data Management Platforma
 
Nové vlastnosti Oracle Database Appliance
Nové vlastnosti Oracle Database ApplianceNové vlastnosti Oracle Database Appliance
Nové vlastnosti Oracle Database Appliance
 
Infinidat InfiniGuard
Infinidat InfiniGuardInfinidat InfiniGuard
Infinidat InfiniGuard
 
Infinidat InfiniBox
Infinidat InfiniBoxInfinidat InfiniBox
Infinidat InfiniBox
 
Novinky ve světě Oracle DB a koncept konvergované databáze
Novinky ve světě Oracle DB a koncept konvergované databázeNovinky ve světě Oracle DB a koncept konvergované databáze
Novinky ve světě Oracle DB a koncept konvergované databáze
 
Základy licencování Oracle software
Základy licencování Oracle softwareZáklady licencování Oracle software
Základy licencování Oracle software
 
Garance 100% dostupnosti dat! Kdo z vás to má?
Garance 100% dostupnosti dat! Kdo z vás to má?Garance 100% dostupnosti dat! Kdo z vás to má?
Garance 100% dostupnosti dat! Kdo z vás to má?
 
Využijte svou Oracle databázi naplno
Využijte svou Oracle databázi naplnoVyužijte svou Oracle databázi naplno
Využijte svou Oracle databázi naplno
 
Oracle Data Protection - 2. část
Oracle Data Protection - 2. částOracle Data Protection - 2. část
Oracle Data Protection - 2. část
 
Oracle Data Protection - 1. část
Oracle Data Protection - 1. částOracle Data Protection - 1. část
Oracle Data Protection - 1. část
 
Benefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (4/4): StorageBenefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (4/4): Storage
 
Benefity Oracle Cloudu (3/4): Compute
Benefity Oracle Cloudu (3/4): ComputeBenefity Oracle Cloudu (3/4): Compute
Benefity Oracle Cloudu (3/4): Compute
 
InfiniBox z pohledu zákazníka
InfiniBox z pohledu zákazníkaInfiniBox z pohledu zákazníka
InfiniBox z pohledu zákazníka
 
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 2. částExadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
 
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. částExadata z pohledu zákazníka a novinky generace X8M - 1. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
 
Úvod do Oracle Cloud infrastruktury
Úvod do Oracle Cloud infrastrukturyÚvod do Oracle Cloud infrastruktury
Úvod do Oracle Cloud infrastruktury
 

Recently uploaded

Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 

Recently uploaded (20)

Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 

Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud

  • 1.
  • 2. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | Engineered Systems - nejlepší cesta jak zabezpečit Vaše dataAccelerate Cloud Michal Vítek Sales Consulting Manager Oracle Systems CEE April 2016
  • 3. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle. 3
  • 4. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | The New Economics of Security Global Crime Statistics in Perspective 4 $288BILLIONGLOBAL CYBERCRIME MARKET $30B STOLEN SMART PHONES $56B STOLEN VEHICLE MARKET $85B COCAINE MARKET $114B STOLEN CREDIT CARD MARKET
  • 5. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | Reported Intrusions Increased 1,121% in Nine Years by US Government Agencies Information Security Attacks Are on the Rise 5 0 10,000 20,000 30,000 40,000 50,000 60,000 70,000 2006 2007 2008 2009 2010 2011 2012 2013 2014 Security Incidents Reported to US Computer Emergency Readiness Team by US Federal Agencies Source: GAO analysis of US Computer Emergency Readiness Team data for fiscal years 2006-2014, GAO-15-573T 5,503 11,911 16,843 29,999 41,776 42,854 48,562 62,214 67,168 Reported Security Incidents Worldwide Increased 48% from 2013 to 2014 Source: Global State of Information Security Survey 2015
  • 6. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | Poor Process Responsible for Majority of Security Incidents 6 of organizations take 3 months or more to patch systems Source: Verizon Data Breach Investigations Report, 2015; IIOUG Data Security Survey, 2014, Verizon’s 2015 Data Breach Investigations Report 74% of 2014 exploits had patches available for more than one year 99.9% 76% of intrusions are from lost, stolen, or weak credentials
  • 7. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Hacking and Malware: Biggest Threats 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 HACKING MALWARE SOCIAL PHYSICAL 16X INCREASE Source: http://www.verizonenterprise.com/DBIR/2014/ Hacking: Exploiting software weakness
  • 8. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | Currently... Single EU Directive (Directive 95/46/EC) has not prevented fragmentation in the way Data Protection is implemented Outdated: Not prepared for the Cloud, Big Data & Social Tough to be competitive in a market where compliance is not streamlined Oracle Confidential – Internal 8
  • 9. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | EU Global Data Protection Regulation Regulation/Law not a Directive Immediate effect on 28 EU members after 2 year transition period Does not require any enabling legislation to be passed by governments Extends the scope to all foreign companies processing data of EU residents Unify Data Protection within the EU with a single law
  • 10. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | EU Global Data Protection Regulation Aims Oracle Confidential – Internal 10 Improve business opportunities by facilitating the free flow of personal data in the digital single market Enhance data protection rights of individuals
  • 11. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | Key Points • 204 page legal document that took 4 years to agree • Applies to companies having > 250 staff • Applies to EU citizen data inside or outside the EU • Focus on personal data • No reference to privacy in latest document (data protection instead) • Rights for data-subjects • Strict obligations for data- owners • Strict obligations for data- processors • Right to rectification • Right to erasure (to be forgotten) • Right to restriction of processing • Right to data portability • Right to object • Right to not have decisions based on profiling • ... • Data protection by design and default • Notification of a personal breach to the supervisory authority • Communication of a personal breach to the data subject Oracle Confidential
  • 12. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | EU General Data Protection Regulation Need to be able to detect data-breach and respond within 72 hours http://www.emeeting.europarl.europa.eu/committees/agenda/201512/LIBE/LIBE%282015%291217_1/sitt-1739884 Document: Miscellaneous - 3_consolidated_text- Consolidated text (outcome of the trilogue of 15/12/2015)
  • 13. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | Oracle Corporation - Confidential 13 http://www.emeeting.europarl.europa.eu/committees/agenda/201512/LIBE/LIBE%282015%291217_1/sitt-1739884 Document: Miscellaneous - 3_consolidated_text- Consolidated text (outcome of the trilogue of 15/12/2015) EU General Data Protection Regulation Fine of up to 4% of global revenue
  • 14. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | Why do you care? Administrative Sanctions Oracle Confidential €10M or 2%1 €20M or 4%1 - Doesn’t provide requested information to a data subject or fails to rectify or erase - Fails to comply or process data within legal basis. - Doesn’t notify of a breach 1 Total Worldwide Annual Turnover
  • 15. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | From Now On, Survival Depends on Security Public 15
  • 16. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | Engineered Systems & Appliances Portfolio Database Appliance X5-2 Exadata Database Machine X6-2 X6-8 Exalogic Elastic Cloud X5-2 SuperCluster T5-8 & M7 Exalytics In Memory Machine X5-4 Big Data Appliance X6-2 Private Cloud Appliance X5-2 Zero Data Loss Recovery Appliance X6
  • 17. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Cybersecurity Building Blocks for Engineered Systems 17 Creative Commons Image Courtesy: Holger Zscheye @ Flickr
  • 18. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | 18 Engineered Systems Common Components COMPUTE STORAGE NETWORK DATABASE
  • 19. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | Oracle Security Focus Areas Secure Isolation Access Control Data Protection Compliance, Monitoring and Auditing COMPUTE STORAGE NETWORK DATABASE
  • 20. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | Oracle Security Technologies Compute Storage Network Database Secure Isolation  Physical  Electrical  Hypervisor-Mediated  Kernel-Mediated  Physical  ASM Instances  ZFS Data Sets  Physical (Ethernet)  Ethernet VLANs  InfiniBand Partitions & Limited Memberships  Multitenant  Instances  Schema  Labels Access Control  Solaris Role-based Access Control  Delegated LDOM & Zone Administration  Trusted Path Login  ZFS and NFS ACLs  iSCSI Security  ASM and Database Scoped Security  IP Filter / iptables  Switch ACLs  Audit Vault and Database Firewall  Exadata Host-based Access Control  Roles and Privileges  Database Vault  Virtual Private DBs Data Protection  Immutable Zones  Delegated ZFS Administration  Oracle Key Manager  Silicon Secured Memory  ZFS Encryption  LOFI Encryption  Oracle TDE  Oracle Key Manager  SSH  TLSv1.2  IPsec / IKE  Oracle TDE  Data Masking and Redaction  Oracle Key Manager Compliance, Monitoring and Auditing  Solaris & Linux Auditing  BART / AIDE  Compliance  ZFS Logging  Exadata Storage Auditing  Compliance  IP Filter / iptables  Switch Logs  Compliance  Database Auditing  Audit Vault and Database Firewall  Compliance
  • 21. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | Building the Layers Securing every layer 21
  • 22. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |4/20/2016 22 Ogres are like Onions. Onions have layers.Security is like an Ogre. Security has layers too.
  • 23. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | The Goal • Tenants must be unable to see or detect the other tenants – No visibility of other tenants processes running on the same system – No visibility of network traffic. Inability to snoop – No visibility of other tenants storage – Inability to break out of their environment • Service Provider must be unable to view or decipher tenant data – Tenants data must be protected, not just from other tenants, but from the service provider as well – The must be “some” trust between the service provider and the tenant, but the surfaces for potential data leakage need to be minimised – The level of security at this level depends on the contract between the SP and the tenant Provide the illusion of a dedicated system per tenant 23
  • 24. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | Encryption Everywhere • The most secure way of transporting or storing data is to encrypt it • In many environments, encryption creates performance overhead which usually means that expensive out of band encrypt/decrypt devices within the network, and within the storage framework are used • This often means that data is only encrypted at the perimeters of the system, and unencrypted throughout • SPARC processors contain Hardware based encryption and decryption which allows data to be encrypted with almost no performance penalty • The security model leverages this SPARC capability heavily SPARC Differentiation 24
  • 25. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | SuperCluster M7: Crypto Faster than x86 & Power8 IBM Power8 does NOT have AES-CFB hardware, CFB required by Oracle Database www.ibm.com/developerworks/ibmi/library/i-ibmi-7_2-and-ibm-power8 (fig 2) AES-CBC 7.8 GB/s 22.1 GB/s 83.1 GB/s IBM Power8 6core x86 E5 v3 2.3 GHz SPARC M7 4.13 Ghz AES-128-CBC DB, Cloud,.. SHA512 1.4 GB/s 4.7 GB/s 83.8 GB/s IBM Power7+ 8c E5 v3 2.3 GHz AVX2 SPARC M7 4.13 GHZ SHA512-1024 Banking,... Oracle Confidential 254/20/2016
  • 26. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | Encryption Everywhere • We can enable encryption of all data in motion – All network traffic encrypted via ssl/ipsec • We can enable encryption of all data at rest – All filesystems encrypted, and all databases encrypted using Transparent Data Encrytption • All with minimal performance overhead due to the onboard encryption H/W • But what about memory? • We can’t encrypt that SPARC Differentiation 26
  • 27. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | Security In Silicon: Silicon Secured Memory Applications Memory Pointer “Y” Pointer “R” GO Pointer “B” GO • Protects data in memory • Hidden “color” bits added to pointers (key), and content (lock) • Pointer color (key) must match content color or program is aborted • Set on memory allocation, changed on memory free’ • Protects against access off end of structure, stale pointer access and malicious attacks M7 Processor
  • 28. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | Silicon Secured Memory Revolutionary Improvement in Memory Architecture • Database In-memory places terabytes of data in memory – More vulnerable to corruption by bugs/attacks than storage • SPARC M7 Application Data Integrity prevents malicious attacks, invalid/stale references, buffer overflows – Buffer Overflow – Freed or Stale Pointers (Silent Data Corruption) • Enables applications to inspect faulting references, diagnose and take appropriate recovery actions • Can be used in optimized production code and by using ADI enabled libraries • Oracle Studio 12.4 supports ADI: Higher quality code and shorter development time 28 Buffer Overflow Data Corruption
  • 29. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | A Couple of Famous Examples: Heartbleed & Venom Buffer Over-Read Attack Buffer Over-Write Attack Silicon Secured Memory completely neutralises these threats
  • 30. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | Encryption Everywhere (except in memory) • We can enable encryption of all data in motion – All network traffic encrypted via ssl/ipsec • We can enable encryption of all data at rest – All filesystems encrypted, and all databases encrypted using Transparent Data Encrytption • All with minimal performance overhead due to the onboard encryption H/W • Memory secured using Silicon Secured Memory. SPARC Differentiation 30
  • 31. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | Securing Compute • Each tenant runs in usually 4 or more Zones. (2 in the Application Domains, and 2 in the DB Domains) • The Zones themselves provide complete security isolation and resource management from other zones on the domain, and the global zone itself. • RBAC (Role Based Access Control) configured so tenant never actually gets full “root” privileges • Optionally Immutable Zones can be used • Solaris Auditing configured, and logs stored remotely Solaris Zones 31
  • 32. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | Securing Storage • Zonepaths for booting the Zones encrypted • NFS Filesystems mounted from the Zones accessible only via unique IB partition • ASM and DB Scoped Security enabled so that the Tenant DB Zones can only see their own grid disks • TDE (Transparent Data Encryption) used to encrypt all DB data. Makes use of hardware based cryptographic acceleration Exadata Storage Cells, and ZFS 32
  • 33. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | Securing Network • Each Zone configured with dedicated IP stack, and each tenant on a different vlan • Dedicated IB partition for Tenant Zone – Zone communication • Outbound traffic all configured with SSL • IPsec configured for all traffic on common Exadata Storage Cell partition • IPfilter to limit outbound communication on Management network and connection to ZFS Appliance (RBAC stops tenant from changing it) • IPfilter logging enabled to detect attempts to be naughty. Client Access, Internal IB, Management 33
  • 34. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | Securing Database • Database access is essentially protected by all of the aforementioned techniques, but adding another layer provides even more protection, not necessarily from other tenants, but to limit access to legitimate users • Roles and Privileges to control who can see what. (Especially important when DB instances are being managed by Service Provider) • Data Redaction fits seamlessly into the above • Database Vault, Audit Vault and Firewall all add even more defenses Oracle 12c Security Features 34
  • 35. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | Implementing Putting it all together 35
  • 36. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | Metering, Limiting and Charging Tenant Self Provisioning Resource Management Role Based Access Workload Isolation Multitenant Cloud Architecture – Principals of Design 4/20/2016 Oracle Confidential 36
  • 37. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | Multi-Tenant Consolidation Tenant Viewpoint Secure Configuration Steps • Implement Multiple Service Workload Recommendations • Enhance Operating System Security – Restrict Tenant Access to Solaris Zones – Implement Tenant Administrator Role – Implement Immutable Firewall Policy – Implement Immutable Auditing Policy • Enhance Network Security – Implement IPsec/IKE for RAC Interconnect with Tenant Specific Keys – Implement IP Filter on Application Zones – Restrict Tenant Access to SuperCluster Management Network and Services Client Access Network Oracle Database Cluster (RAC) Tenant Specific Immutable Zone Oracle Database Tenant Specific Immutable Zone Oracle Database RDSv3 IPoIB SDP IPoIB SDP SSL SSH Oracle WebLogic Cluster Tenant Specific Immutable Zone Oracle WebLogic Tenant Specific Immutable Zone Oracle WebLogic Tenant Specific VLANs Tenant Specific InfiniBand Network Partition Tenant-Specific Internal Communications Oracle Exadata Storage Servers RDSv3 Oracle Exadata Storage and RAC Specific Communications Tenant Specific Disk Group(s) Exadata Storage Partition InfiniBand Network ZFS Volumes/Data Sets Oracle Sun ZFS Storage Appliance Binaries Configurations Backups Logs Tenant-Specific NAS Storage NFS iSCSI
  • 38. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | Multi-Tenant Environment on SuperCluster Compute Storage Network Database Secure Isolation  Physical  Electrical  Hypervisor-Mediated  Kernel-Mediated  Physical  ASM Instances  ZFS Data Sets  Physical (Ethernet)  Ethernet VLANs  InfiniBand Partitions & Limited Memberships  Multitenant  Instances  Schema  Labels Access Control  Solaris Role-based Access Control  Delegated LDOM & Zone Administration  Trusted Path Login  ZFS and NFS ACLs  iSCSI Security  ASM and Database Scoped Security  IP Filter / iptables  Switch ACLs  Audit Vault and Database Firewall  Exadata Host-based Access Control  Roles and Privileges  Database Vault  Virtual Private DBs Data Protection  Immutable Zones  Delegated ZFS Administration  Oracle Key Manager  Silicon Secured Memory  ZFS Encryption  LOFI Encryption  Oracle TDE  Oracle Key Manager  SSH  TLSv1.2  IPsec / IKE  Oracle TDE  Data Masking and Redaction  Oracle Key Manager Compliance, Monitoring and Auditing  Solaris & Linux Auditing  BART / AIDE  Compliance  ZFS Logging  Exadata Storage Auditing  Compliance  IP Filter / iptables  Switch Logs  Compliance  Database Auditing  Audit Vault and Database Firewall  Compliance Secure Multi-tenancy on Oracle SuperCluster: A Technical Deployment Cookbook
  • 39. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | Secure Multi-tenancy On SuperCluster Database Mgmt Compute Network Storage OS MgmtApplication Database ComputeNetwork StorageOS Mgmt Application Database ComputeNetwork Storage OS Mgmt Application Database OS Customer (C) Customer (A) Customer (D) Customer (D) Customer (E)
  • 40. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | • Secure system spanning both application and database tiers • M7 Application Data Integrity memory protection Software-in-Silicon • Built-in compliance report automation • Restricted management console access • Pervasive near-zero-overhead encryption • Anti-malware protection • Comprehensive administrative action audit trail Monitoring the Security and Compliance Oracle Confidential 404/20/2016
  • 41. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | Summary • Security is underpinned by enabling encryption for all data in motion and at rest • The only place where data is NOT encrypted (memory), is protected by Silicon Secured Memory • Fully integrated and layered security model covering compute, storage, networking and database • Supported by a robust compliance and auditing framework, so that attempted breaches can be identified and defended against • It’s all about the layers! Oracle provides a complete and integrated solution 41
  • 42. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | Engineered Systems Security Summary Complete Tested ü ü ü ü Integrated Trusted
  • 43. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | 43
  • 44.
  • 45. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Backup slides 45 Creative Commons Image Courtesy: Holger Zscheye @ Flickr
  • 46. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | 46 Engineered Systems Common Components COMPUTE STORAGE NETWORK DATABASE
  • 47. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | 47 Engineered Systems Security Focus Areas Secure Isolation Access Control Data Protection Monitoring and Auditing COMPUTE STORAGE NETWORK DATABASE
  • 48. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | 48 Secure Workload Isolation Physical Isolation Domain 1 Database Domain 1 SPARC T5-8 Server 1 SPARC T5-8 Server 2 Database Zones Isolation Domain 1 SPARC T5-8 Server Zone A Database Zone B Database Zone C Database Zone D Database POSIX Isolation Domain 1 SPARC T5-8 Server Database Database Database Database Hypervisor Isolation Domain 1 Database Domain 2 Database Hypervisor! SPARC T5-8 Server Electrical Isolation Domain 1 Database Domain 2 Database SPARC M6-32 Server
  • 49. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | 49 Secure Database Isolation Instance Isolation Schema Isolation Label Isolation Container Isolation Domain 1 Server Database Database Database Database Domain 1 Server Container Database Pluggable Database Pluggable Database Pluggable Database Pluggable Database Domain 1 Server Database Schema Schema Schema Schema Domain 1 Server Database Schema
  • 50. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | 50 Secure (Ethernet) Network Isolation Domain 1 Domain 2 SPARC T5-8 Server Zone A Client Access Network Client A-1 Zone C VLAN C Database C-1 Client C-1 IPsec / SSL Zone B Database A-1 IPMPA-1 VLAN A-1-0 VLAN A-1-1 Database B-1 Adding Cryptographic Isolation Layer 2 VNIC and VLAN Isolation IPMPB-1 VNIC B-1-0 VNIC B-1-1 net1 net0 Client B-1 VLAN A Network B
  • 51. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | 51 Secure (InfiniBand) Network Isolation ASM Disk Groups ASM Disk Group A Oracle Exadata Storage Servers ZFS Data Sets ZFS Data Set C-1 ZFS Data Set D-1 Sun ZFS Storage Appliance InfiniBand Network Partition: 0xFFFF Protocol: RDSv3 Partition: 0x8503 Protocol: NFS / IPoIB Oracle VM Server for SPARC Database Domain Oracle Solaris 11 Zone (Zone A) Oracle Database 11g Release 2 Instance A-1 Oracle Database 11g Release 2 Instance A-2 Application Domain Zone C Oracle Database 11g Release 2 Instance C-1 Zone D Oracle Database 11g Release 2 Instance D-1
  • 52. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | 52 End to End Access Control Compute Strong Authentication Role-based Access Control Privileged User Access Control Storage ASM Security NFS Access Controls iSCSI Access Controls Network Boundary Hardening Network Partitioning Packet Filtering Database Strong Authentication Role-based Access Control Privileged User Access Control
  • 53. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | 53 End to End Data Protection Database Domain SPARC T5 Hardware Assisted Cryptography Zone A Oracle Database A-1 Client Access Network SSL InfiniBand Network Partition Intel AES-NI Hardware Assisted Cryptography Client A-1 Oracle PKCS#11 Wallet (Oracle Solaris PKCS#11 Softtoken) SSL Certificate A-1 Oracle Solaris Cryptographic Framework ASM Disk Groups Disk Group A-1 Oracle Exadata Storage Servers Encrypted Tablespaces ZFS Data Sets Data Sets A-1 Encrypted Backups Export Files Sun ZFS Storage Appliance RDSv3 NFSv4 TDE Master Key A-1
  • 54. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Secured Architectures on Engineered Systems 54 Creative Commons Image Courtesy: Guillermo @ Flickr
  • 55. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | 55 Single Service Workload Oracle Exadata Database Machine Example Sample Secure Configuration Steps • Implement Exadata Hardening • Apply Security Updates • Enhance Operating System Security – Site-Specific Security Hardening – Authentication and Access Policies – System Auditing Policy • Enhance Database Security – Site-Specific Security Hardening – Enable Encrypted Communications – Configure Transparent Data Encryption – Configure Database Vault • Enhance Management Security – Change Default Passwords – Site-Specific Hardening – Replace Self-Signed Certificates InfiniBand Network Oracle Exadata Storage Servers Oracle Linux 5 Oracle Linux 5 Sun X4-2 Server Sun X4-2 Server ASMASMClient Access Network SSL SSL Oracle Database 11g Release 2 Oracle Database 11g Release 2 RAC Cluster Disk Group A Disk Group B Tablespace Tablespace Tablespace Tablespace Tablespace Tablespace ASM Cluster RDSv3 RDSv3
  • 56. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | 56 Single Service Tier Consolidation Oracle Exadata Database Machine Example Sample Secure Configuration Steps • Implement Single Service Workload Recommendations • Enhance Operating System Security – Implement Database-specific Users/Roles – Implement POSIX Isolation of Instances – Implement Resource Controls • Enhance Storage Security – Implement Exadata Security – Implement Resource Controls InfiniBand Network Oracle Exadata Storage Servers Oracle Linux 5 Oracle Linux 5 Sun X4-2 Server Sun X4-2 Server ASMASMClient Access Network SSL SSL Tablespace Tablespace Tablespace Tablespace Tablespace ASM Cluster Oracle Database 11g Release 2 Oracle Database 11g Release 2 SSL Tablespace Tablespace RDSv3 RDSv3 RDSv3 DiskGroupDiskGroupDiskGroup Oracle Database 11g Release 2
  • 57. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | 57 Multiple Service Tier Consolidation Oracle SuperCluster Example – Secure Isolation View Web Tier Network IPoIB/SDP InfiniBand Network Partition Exadata Tier Network RDSv3 InfiniBand Network Partition Client Access Network SSL/TLS 10GbE Network Database Tier Network IPoIB/SDP InfiniBand Network Partition Oracle Traffic Director Cluster OTD Zone 1 Oracle Traffic Director 11g OTD Zone 1 Oracle Traffic Director 11g Oracle WebLogic Server Cluster WLS Zone 1 Oracle WebLogic Server 12c Oracle WebLogic Server 12c WLS Zone 2 Oracle WebLogic Server 12c Oracle WebLogic Server 12c Oracle Database Cluster DB Zone 1 Oracle Database 11g Release 2 DB Zone 2 Oracle Database 11g Release 2 Physical Server 1 Application Domain 1 Application Domain 1 Database Domain 1 Physical Server 2 Application Domain 2 Application Domain 2 Database Domain 2
  • 58. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | 58 Multiple Service Tier Consolidation Oracle SuperCluster Example – Data Protection View InfiniBand Network Partition #1 SPARC T5 Hardware Assisted Cryptography Client Access Network Database Domain Oracle Solaris Cryptographic Framework Zone C Oracle Database 11g Release 2 Oracle PKCS#11 Wallet (Oracle Solaris PKCS#11 Softtoken) SSL Certificate TDE Master Key Intel AES-NI Hardware Assisted Cryptography ASM Disk Groups Oracle Exadata Storage ServersENCRYPTED Tablespaces ZFS Volumes/Data Sets ENCRYPTED Sun ZFS Storage Appliance Binaries Configurations BackupsApplication Domain Zone B Oracle WebLogic Server 12c Oracle Solaris Cryptographic Framework Zone A Oracle Traffic Director 11g SSL InfiniBand Network Partition #2 RDSv3 InfiniBand Network Partition #3 iSCSI, NFS SSL SSL
  • 59. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | 59 Multiple Service Tier Consolidation Additional Security Controls and Technologies COMPUTE Oracle VM Server for SPARC Solaris Non-Global and Immutable Zones Solaris RBAC and Fine- Grained Privileges STORAGE Encrypted ZFS Data Sets and Volumes iSCSI Authentication iSCSI and NFS Access Controls NETWORK Full and Limited Membership InfiniBand Partitions Solaris IP Filter and IPsec/IKE
  • 60. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | 60 Multiple Tenant Consolidation Oracle SuperCluster Example – Tenant Viewpoint Sample Secure Configuration Steps • Implement Multiple Service Workload Recommendations • Enhance Operating System Security – Restrict Tenant Access to Solaris Zones – Implement Tenant Administrator Role – Implement Immutable Firewall Policy – Implement Immutable Auditing Policy • Enhance Network Security – Implement IPsec/IKE for RAC Interconnect with Tenant Specific Keys – Implement IP Filter on Application Zones – Restrict Tenant Access to SuperCluster Management Network and Services Client Access Network Oracle Database Cluster (RAC) Tenant Specific Immutable Zone Oracle Database Tenant Specific Immutable Zone Oracle Database RDSv3 IPoIB SDP IPoIB SDP SSL SSH Oracle WebLogic Cluster Tenant Specific Immutable Zone Oracle WebLogic Tenant Specific Immutable Zone Oracle WebLogic Tenant Specific VLANs Tenant Specific InfiniBand Network Partition Tenant-Specific Internal Communications Oracle Exadata Storage Servers RDSv3 Oracle Exadata Storage and RAC Specific Communications Tenant Specific Disk Group(s) Exadata Storage Partition InfiniBand Network ZFS Volumes/Data Sets Oracle Sun ZFS Storage Appliance Binaries Configurations Backups Logs Tenant-Specific NAS Storage NFS iSCSI
  • 61. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | 61 Multiple Tenant Consolidation Oracle SuperCluster Example – Provider Viewpoint Client Access Network Application Domain Database Domain SPARC T5-8 Server Tenant A Zone 2 Oracle Database Tenant B Zone 2 Oracle Database Tenant B Zone 1 Application Tenant A Zone 1 Application VLAN B Tenant B HTTPS VLAN A HTTPS Tenant A RDSv3 Tenant B Network Partition Tenant A Network Partition NFSv4 iSCSI Application B Storage Application A Storage Database A Storage Database B Storage Sun ZFS Storage Appliance InfiniBand Network Tenant A Disk Groups Tenant B Disk Groups Exadata Storage Servers
  • 62. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | 62 Engineered Systems Security Capability Summary Compute Storage Network Database Secure Isolation § Physical § Electrical § Hypervisor-Mediated § Kernel-Mediated § Physical § ASM Instances § ZFS Data Sets § Physical (Ethernet) § Ethernet VLANs § InfiniBand Partitions § Multitenant § Instances § Schema § Labels Access Control § RBAC / Privileges § LDOM Administration § Zone Administration § ZFS ACLs § Exadata Security § NFS Security § IP Filter / iptables § Switch ACLs § Audit Vault and Database Firewall § Roles and Privileges § Real Application Security § Database Vault Data Protection § Immutable Zones § Read-Only Mounts § ZFS Administration § ZFS Encryption § LOFI Encryption § TDE § SSH § SSL / TLS § IPsec / IKE § Virtual Private DB § Data Masking § Redaction Monitoring and Auditing § Solaris Auditing § Linux Auditing § BART / AIDE § ZFS Storage Appliance Logs § Exadata Storage Auditing § IP Filter / iptables § Switch Logs § Database Auditing § Audit Vault and Database Firewall