SlideShare a Scribd company logo
Database Security Enhancements With Oracle
Database 11g
Daniel Wong
Director of Engineering, Database Security
Oracle Corporation
2
Agenda
• About Oracle Software Security Assurance
• Overview of Security Enhancements in 11g
• Secure Configuration Enhancements
• Other Key Security Enhancements
• Q&A
3
Oracle Software Security Assurance
All the processes, procedures, and
technologies that have been
implemented to ensure that Oracle’s
products are meeting our customers’
security requirements, while
providing for the most cost-effective
ownership experience.
Product
Development
Product
Definition
Ongoing
Assurance
Secure
Coding
Standards
4
Oracle Software Security Assurance
Secure Configuration
• Enhance “out of the box installation” settings to be
more secure
• Remove default passwords
• Disable unneeded services
• Reduce proliferation of powerful privileges
• Identify and minimize potential effects of enhanced
secure configuration settings:
• Impacts resulting from version upgrade
• Impacts on Oracle and third-party applications
• Document and share current security best practices
• http://www.oracle.com/security/resource-library.html
5
Oracle Software Security Assurance
Secure Configuration
• Goals:
• Improve security of default configuration
• Secure by Default while maintaining upgradability and usability
• Inputs:
• Internal: Various Oracle Software Security Assurance programs
• External: CIS, SANS, DISA
• Recent Enhancements:
• Locked default accounts, expired passwords
• Optional install of demo schemas
• Best Practices document
• Default password/account scanner
6
Secure Configuration Enhancements
with 11g - Overview
1. Default Audit Settings
• Preconfigured
• Enhanced performance
2. Default Password Management
• Enhanced protection against brute force attack
• Complexity enforcement procedure
• Built-in default password scanner
3. Enhanced Authentication
• Case sensitive password authentication
• Control authentication version
4. Enhanced Access Control
• Improved security for several utl* packages
7
Audit Settings
• Key requirement for compliance
• 10gR2: OFF by default
• 11g:
• AUDIT_TRAIL=DB by default in DBCA
• security-relevant actions audited
• Performance:
• Set audit_trail=XML or OS for best performance
• In our informal lab environment, we found 1-2% performance
degradation for the TPCC benchmark with AUDIT_TRAIL=DB
and our default auditing statements
8
Updated Default Audit Settings
• Statement Audit option
• ROLE
• Privilege Audit Options
• CREATE USER
• ALTER USER
• DROP USER
• CREATE SESSION
• CREATE ANY TABLE
• ALTER ANY TABLE
• DROP ANY TABLE
• CREATE ANY PROCEDURE
• ALTER ANY PROCEDURE
• DROP ANY PROCEDURE
• ALTER PROFILE
• DROP PROFILE
• GRANT ANY PRIVILEGE
• GRANT ANY OBJECT PRIV.
• GRANT ANY ROLE
• CREATE ANY JOB
• CREATE EXTERNAL JOB
• CREATE ANY LIBRARY
• CREATE PUBLIC DB LINK
• EXEMPT ACCESS POLICY
• ALTER DATABASE
• ALTER SYSTEM
• AUDIT SYSTEM
9
Default Profile Password Settings
• 10gR2
• FAILED_LOGIN_ATTEMPTS = 10
• all others: unlimited
• 11g - more restrictive
• FAILED_LOGIN_ATTEMPTS = 10 (no change)
• PASSWORD_LOCK_TIME = 1
• PASSWORD_GRACE_TIME = 7
• PASSWORD_LIFE_TIME = 180
• Balanced protection against Denial of Service (DOS)
and password attacks while keeping usability
10
Password Complexity
• Supports case sensitive passwords
• Supports special and multi-byte characters to increase security and usability
• Takes effect immediately after password change
• Enhanced default password complexity verification
• Password Complexity Verification not enabled in default profile; can be
enabled via Enterprise Manager or SQL
• In utlpwdmg.sql in $ORACLE_HOME/admin directory
• SQL to set the password complexity verification
• ALTER PROFILE DEFAULT PASSWORD_VERIFY_FUNCTION
verify_function_11G
• This routine will verify that password
• Has minimum length of 8 characters
• Has at least one letter and one digit
• Is not username, reverse thereof, or username(1-100)
• Is not one of a few common passwords (e.g. welcome1)
• Must differ from previous password by at least 3 characters
11
Password Complexity
Recommendations
• Default password profile parameters may not suit everyone
• Adjust the password settings to your security needs
• Change default password verification routine as per your needs
• Define at least two password profiles - one for users and one for
mid-tiers and administrators
• Password recommendations vary with use cases:
• See for example, recommendations for E-Business Suite - MetaLink
189367.1
• See also Visit OTN: otn.oracle.com -> products -> database ->
security and compliance for detailed recommendations
12
Default Password View
• View DBA_USERS_WITH_DEFPWD will show all
accounts still using default passwords
• Over 140 default username/passwords collected from
the field, including application accounts for Peoplesoft
and Ebizs
• SQL> desc DBA_USERS_WITH_DEFPWD
• Name Null? Type
• ----------------------------------------- -------- ----------------------------
• USERNAME NOT NULL VARCHAR2(30)
• SQL> select * from DBA_USERS_WITH_DEFPWD
• 2 ;
• USERNAME
• ------------------------------
• JONES
13
Enhanced Authentication
• Supports multi-bytes and special characters
• Case sensitive passwords always enforced
• Use SEC _ CASE _ SENSITIVE _ LOGON to turn it OFF if
necessary
• Set SQLNET . ALLOWED _ LOGON _ VERSION to highest OCI client
version in use:
• Use 8 if there are Oracle 8.x clients connecting to the DB
• Use 9 if there are Oracle 9.x clients connecting to the DB
• Use 11 if there are Oracle 10.x and/or 11.x clients connecting to the
DB
• Use 8 if there are pre-Oracle 11g JDBC pure Java client connecting
to the DB
• Use of SHA-1 hashing algorithm to protect password
14
Enhanced Access Control
• Improved security for several utl* packages
• UTL_TCP, UTL_SMTP, UTL_MAIL, UTL_HTTP, etc.
• These packages will no longer allow connections to external
network services to non-privileged users by default
• SYS and XDB schemas will specifically remain
excluded from this kind of restriction
• DBAs will be able to specify what network services
database users will be allowed to access when using
these packages.
15
Enhanced Access Control
Recommendations
• Open access to external network services only
minimally
• Specify down to hosts and ports, avoid unnecessary “*”
wildcards
• Have small number of ACLs for manageability and
performance
• Share ACLs among network services open to the same users
• Consider giving access indirectly through application
schemas
• Applications can further restrict user interaction with network
services
16
Access Control Administration
• Administration via DBMS_NETWORK_ACL_ADMIN
• Grant access to a network service
• create_acl – create an ACL for the first user
• assign_acl – assign ACL to network service
• Grant access to more users in ACL – add_privilege
• Revoke access from users in ACL – delete_privilege
• Stop access to network services
• unassign_acl – take ACL away from network service
• All ACL changes are transactional
• Remember to “COMMIT” the transaction !!!
• View ACL settings via dictionary views
• DBA_NETWORK_ACLS – which network services have ACLs?
• DBA_NETWORK_ACL_PRIVILEGES – who are in the ACLs?
17
Access Control Administration
Example
begin
dbms_network_acl_admin.create_acl(
acl => 'smtp-access.xml',
description => 'ACL for SMTP service',
principal => 'MAILAGENT',
is_grant => TRUE,
privilege => 'connect');
dbms_network_acl_admin.assign_acl(
acl => 'smtp-access.xml',
host => 'smtp-host.oracle.com',
lower_port => 25);
end;
/
commit;
18
Access Control Administration
Example
SQL> select * from dba_network_acls;
HOST LOWER_PORT UPPER_PORT ACL
-------------------- ---------- ---------- -------------------------
smtp-host.oracle.com 25 25 /sys/acls/smtp-access.xml
SQL> select * from dba_network_acl_privileges;
ACL PRINCIPAL PRIVILEGE
------------------------- -------------------- ---------
/sys/acls/smtp-access.xml MAILAGENT connect
19
How Do These Changes Impact
Installation?
• Default new installations will include audit and
password profiles
• Option during install to retain 10gR2 settings
• DBCA screens to:
• Revert back to 10gR2 settings for audit and/or password
• Apply new default settings
• Upgrades will not change the audit and password
profile settings
20
Recommendations for Upgrades I
• Audit settings
• Turn on auditing for security sensitive DDL operations listed
• Set to DB or DB_extended for querability
• Set to OS or XML for performance
• Password Management
• Institute password policies by classifying users into a different
usage groups and assign dedicated profiles to each group
• Check DBA_USERS_WITH_DEFPWD for default passwords
21
Recommendations for Upgrades II
• Authentication
• Identify sources of connection and set security level to highest
possible supported by the client
• Ask users to change password as soon as possible for case
sensitive password to take effect
• Look into EUS for centralized user management
• Reminder: we support connect username/password as SYSDBA
• Access Control
• Identify applications using utl_* packages, and identify and grant
appropriate new ACL privileges and confirm applications are running
fine
• Evaluate current privileges granted, follow least privileged model
22
Other Key Security Enhancements
• Tablespace Encryption option in Transparent Data Encryption
• Allows bulk encryption at tablespace level
• No restriction on data types and indexes
• Works with all High Availability offerings
• Hardware Security Module and External Key Server support in
Transparent Data Encryption
• Provides additional option for security and key management services
by third party products
• Management of SYSDBA and SYSOPER in Enterprise User
Security
• Identity management of super users in databases
• Enhanced Kerberos support
• Cross realm and type 4 certificate support
• Support Microsoft KDC default encryption modes
23
Oracle Software Security Assurance
Conclusion
• MAXIMUM SECURITY
• Best of breed security features
• Secure design from the
ground up
• Effective vulnerability
remediation process
• LOWER COST OF
OWNERSHIP
• Unwavering commitment to
maintaining our customer’s
security posture
• Predictable security patch
process
• Priority given to quality
24
For More Information
• Oracle Software Security Assurance Web Site at
http://www.oracle.com/security/software-security-assurance.html
• Technical white papers and security guides
• Online security seminars and webcasts
• Blogs and more
• Critical Patch Update & Security Alerts
at http://www.oracle.com/technology/deploy/security/alerts.htm
• Critical Patch Updates and current security alerts
• Patch download
• CPU documentation & Risk Matrices
http://search.oracle.com
Oracle Software Security Assurance

More Related Content

What's hot

Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2Oracle BH
 
Introducing Oracle Audit Vault and Database Firewall
Introducing Oracle Audit Vault and Database FirewallIntroducing Oracle Audit Vault and Database Firewall
Introducing Oracle Audit Vault and Database Firewall
Troy Kitch
 
AV/DF Advanced Security Option
AV/DF Advanced Security OptionAV/DF Advanced Security Option
AV/DF Advanced Security Option
DLT Solutions
 
Oracle Audit Vault Training | Audit Vault - Oracle Trainings
Oracle Audit Vault Training | Audit Vault - Oracle TrainingsOracle Audit Vault Training | Audit Vault - Oracle Trainings
Oracle Audit Vault Training | Audit Vault - Oracle Trainings
OracleTrainings
 
Geek Sync | Understanding Oracle Database Security
Geek Sync | Understanding Oracle Database SecurityGeek Sync | Understanding Oracle Database Security
Geek Sync | Understanding Oracle Database Security
IDERA Software
 
Oracle database 12c security and compliance
Oracle database 12c security and complianceOracle database 12c security and compliance
Oracle database 12c security and complianceFITSFSd
 
Oracle Key Vault Overview
Oracle Key Vault OverviewOracle Key Vault Overview
Oracle Key Vault Overview
Troy Kitch
 
Isaca sql server 2008 r2 security & auditing
Isaca sql server 2008 r2 security & auditingIsaca sql server 2008 r2 security & auditing
Isaca sql server 2008 r2 security & auditingAntonios Chatzipavlis
 
Database Options
Database OptionsDatabase Options
Database Options
Connor McDonald
 
Database & Technology 1 _ Barbara Rabinowicz _ Database Security Methoda and ...
Database & Technology 1 _ Barbara Rabinowicz _ Database Security Methoda and ...Database & Technology 1 _ Barbara Rabinowicz _ Database Security Methoda and ...
Database & Technology 1 _ Barbara Rabinowicz _ Database Security Methoda and ...InSync2011
 
Oracle Audit vault
Oracle Audit vaultOracle Audit vault
Oracle Audit vault
uzzal basak
 
Oracle security 08-oracle network security
Oracle security 08-oracle network securityOracle security 08-oracle network security
Oracle security 08-oracle network security
Zhaoyang Wang
 
Oracle Key Vault Data Subsetting and Masking
Oracle Key Vault Data Subsetting and MaskingOracle Key Vault Data Subsetting and Masking
Oracle Key Vault Data Subsetting and Masking
DLT Solutions
 
Database security issues
Database security issuesDatabase security issues
Database security issues
n|u - The Open Security Community
 
SQL Server 2012 Security Task
SQL Server 2012 Security TaskSQL Server 2012 Security Task
SQL Server 2012 Security TaskYaakub Idris
 
Oracle database 12c data masking and subsetting guide
Oracle database 12c data masking and subsetting guideOracle database 12c data masking and subsetting guide
Oracle database 12c data masking and subsetting guide
bupbechanhgmail
 
Database Systems Security
Database Systems SecurityDatabase Systems Security
Database Systems Security
amiable_indian
 
Sql Server Security
Sql Server SecuritySql Server Security
Sql Server Security
Vinod Kumar
 
DevTalks.ro 2019 What's New in MySQL 8.0 Security
DevTalks.ro 2019 What's New in MySQL 8.0 SecurityDevTalks.ro 2019 What's New in MySQL 8.0 Security
DevTalks.ro 2019 What's New in MySQL 8.0 Security
Georgi Kodinov
 

What's hot (20)

Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2
 
Introducing Oracle Audit Vault and Database Firewall
Introducing Oracle Audit Vault and Database FirewallIntroducing Oracle Audit Vault and Database Firewall
Introducing Oracle Audit Vault and Database Firewall
 
AV/DF Advanced Security Option
AV/DF Advanced Security OptionAV/DF Advanced Security Option
AV/DF Advanced Security Option
 
Oracle Audit Vault Training | Audit Vault - Oracle Trainings
Oracle Audit Vault Training | Audit Vault - Oracle TrainingsOracle Audit Vault Training | Audit Vault - Oracle Trainings
Oracle Audit Vault Training | Audit Vault - Oracle Trainings
 
Geek Sync | Understanding Oracle Database Security
Geek Sync | Understanding Oracle Database SecurityGeek Sync | Understanding Oracle Database Security
Geek Sync | Understanding Oracle Database Security
 
Oracle database 12c security and compliance
Oracle database 12c security and complianceOracle database 12c security and compliance
Oracle database 12c security and compliance
 
Oracle Key Vault Overview
Oracle Key Vault OverviewOracle Key Vault Overview
Oracle Key Vault Overview
 
Oracle Database Vault
Oracle Database VaultOracle Database Vault
Oracle Database Vault
 
Isaca sql server 2008 r2 security & auditing
Isaca sql server 2008 r2 security & auditingIsaca sql server 2008 r2 security & auditing
Isaca sql server 2008 r2 security & auditing
 
Database Options
Database OptionsDatabase Options
Database Options
 
Database & Technology 1 _ Barbara Rabinowicz _ Database Security Methoda and ...
Database & Technology 1 _ Barbara Rabinowicz _ Database Security Methoda and ...Database & Technology 1 _ Barbara Rabinowicz _ Database Security Methoda and ...
Database & Technology 1 _ Barbara Rabinowicz _ Database Security Methoda and ...
 
Oracle Audit vault
Oracle Audit vaultOracle Audit vault
Oracle Audit vault
 
Oracle security 08-oracle network security
Oracle security 08-oracle network securityOracle security 08-oracle network security
Oracle security 08-oracle network security
 
Oracle Key Vault Data Subsetting and Masking
Oracle Key Vault Data Subsetting and MaskingOracle Key Vault Data Subsetting and Masking
Oracle Key Vault Data Subsetting and Masking
 
Database security issues
Database security issuesDatabase security issues
Database security issues
 
SQL Server 2012 Security Task
SQL Server 2012 Security TaskSQL Server 2012 Security Task
SQL Server 2012 Security Task
 
Oracle database 12c data masking and subsetting guide
Oracle database 12c data masking and subsetting guideOracle database 12c data masking and subsetting guide
Oracle database 12c data masking and subsetting guide
 
Database Systems Security
Database Systems SecurityDatabase Systems Security
Database Systems Security
 
Sql Server Security
Sql Server SecuritySql Server Security
Sql Server Security
 
DevTalks.ro 2019 What's New in MySQL 8.0 Security
DevTalks.ro 2019 What's New in MySQL 8.0 SecurityDevTalks.ro 2019 What's New in MySQL 8.0 Security
DevTalks.ro 2019 What's New in MySQL 8.0 Security
 

Similar to Presentation database security enhancements with oracle

Kangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot EDB Webinar Best Practices in Security with PostgreSQLKangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot
 
Presentation database security audit vault & database firewall
Presentation   database security audit vault & database firewallPresentation   database security audit vault & database firewall
Presentation database security audit vault & database firewall
xKinAnx
 
Less10 security mb3
Less10 security mb3Less10 security mb3
Less10 security mb3Imran Ali
 
Oracle Enterprise Manager 12c: updates and upgrades.
Oracle Enterprise Manager 12c: updates and upgrades.Oracle Enterprise Manager 12c: updates and upgrades.
Oracle Enterprise Manager 12c: updates and upgrades.
Rolta
 
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Andrejs Prokopjevs
 
Oracle Database Performance Tuning Advanced Features and Best Practices for DBAs
Oracle Database Performance Tuning Advanced Features and Best Practices for DBAsOracle Database Performance Tuning Advanced Features and Best Practices for DBAs
Oracle Database Performance Tuning Advanced Features and Best Practices for DBAs
Zohar Elkayam
 
SOUG Day Oracle 21c New Security Features
SOUG Day Oracle 21c New Security FeaturesSOUG Day Oracle 21c New Security Features
SOUG Day Oracle 21c New Security Features
Stefan Oehrli
 
Enterprise-class security with PostgreSQL - 1
Enterprise-class security with PostgreSQL - 1Enterprise-class security with PostgreSQL - 1
Enterprise-class security with PostgreSQL - 1
Ashnikbiz
 
Geek Sync | Handling HIPAA Compliance with Your Data Access
Geek Sync | Handling HIPAA Compliance with Your Data AccessGeek Sync | Handling HIPAA Compliance with Your Data Access
Geek Sync | Handling HIPAA Compliance with Your Data Access
IDERA Software
 
2008 Collaborate IOUG Presentation
2008 Collaborate IOUG Presentation2008 Collaborate IOUG Presentation
2008 Collaborate IOUG Presentation
Biju Thomas
 
Oracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptxOracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptx
Satishbabu Gunukula
 
Improve oracle 12c security
Improve oracle 12c securityImprove oracle 12c security
Improve oracle 12c security
Laurent Leturgez
 
A to z for sql azure databases
A to z for sql azure databasesA to z for sql azure databases
A to z for sql azure databases
Antonios Chatzipavlis
 
Improving oracle12c security
Improving oracle12c securityImproving oracle12c security
Improving oracle12c security
Laurent Leturgez
 
SQL Server 2016: Just a Few of Our DBA's Favorite Things
SQL Server 2016: Just a Few of Our DBA's Favorite ThingsSQL Server 2016: Just a Few of Our DBA's Favorite Things
SQL Server 2016: Just a Few of Our DBA's Favorite Things
Hostway|HOSTING
 
Centrify Access Manager Presentation.pptx
Centrify Access Manager Presentation.pptxCentrify Access Manager Presentation.pptx
Centrify Access Manager Presentation.pptx
johncenafls
 
Best Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQLBest Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQL
EDB
 
(ATS4-PLAT03) Balancing Security with access for Development
(ATS4-PLAT03) Balancing Security with access for Development(ATS4-PLAT03) Balancing Security with access for Development
(ATS4-PLAT03) Balancing Security with access for Development
BIOVIA
 
Manageability Enhancements of SQL Server 2012
Manageability Enhancements of SQL Server 2012Manageability Enhancements of SQL Server 2012
Manageability Enhancements of SQL Server 2012
Microsoft TechNet - Belgium and Luxembourg
 
Locking the Doors, Securing the Appliances
Locking the Doors, Securing the AppliancesLocking the Doors, Securing the Appliances
Locking the Doors, Securing the Appliances
Dell World
 

Similar to Presentation database security enhancements with oracle (20)

Kangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot EDB Webinar Best Practices in Security with PostgreSQLKangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot EDB Webinar Best Practices in Security with PostgreSQL
 
Presentation database security audit vault & database firewall
Presentation   database security audit vault & database firewallPresentation   database security audit vault & database firewall
Presentation database security audit vault & database firewall
 
Less10 security mb3
Less10 security mb3Less10 security mb3
Less10 security mb3
 
Oracle Enterprise Manager 12c: updates and upgrades.
Oracle Enterprise Manager 12c: updates and upgrades.Oracle Enterprise Manager 12c: updates and upgrades.
Oracle Enterprise Manager 12c: updates and upgrades.
 
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
 
Oracle Database Performance Tuning Advanced Features and Best Practices for DBAs
Oracle Database Performance Tuning Advanced Features and Best Practices for DBAsOracle Database Performance Tuning Advanced Features and Best Practices for DBAs
Oracle Database Performance Tuning Advanced Features and Best Practices for DBAs
 
SOUG Day Oracle 21c New Security Features
SOUG Day Oracle 21c New Security FeaturesSOUG Day Oracle 21c New Security Features
SOUG Day Oracle 21c New Security Features
 
Enterprise-class security with PostgreSQL - 1
Enterprise-class security with PostgreSQL - 1Enterprise-class security with PostgreSQL - 1
Enterprise-class security with PostgreSQL - 1
 
Geek Sync | Handling HIPAA Compliance with Your Data Access
Geek Sync | Handling HIPAA Compliance with Your Data AccessGeek Sync | Handling HIPAA Compliance with Your Data Access
Geek Sync | Handling HIPAA Compliance with Your Data Access
 
2008 Collaborate IOUG Presentation
2008 Collaborate IOUG Presentation2008 Collaborate IOUG Presentation
2008 Collaborate IOUG Presentation
 
Oracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptxOracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptx
 
Improve oracle 12c security
Improve oracle 12c securityImprove oracle 12c security
Improve oracle 12c security
 
A to z for sql azure databases
A to z for sql azure databasesA to z for sql azure databases
A to z for sql azure databases
 
Improving oracle12c security
Improving oracle12c securityImproving oracle12c security
Improving oracle12c security
 
SQL Server 2016: Just a Few of Our DBA's Favorite Things
SQL Server 2016: Just a Few of Our DBA's Favorite ThingsSQL Server 2016: Just a Few of Our DBA's Favorite Things
SQL Server 2016: Just a Few of Our DBA's Favorite Things
 
Centrify Access Manager Presentation.pptx
Centrify Access Manager Presentation.pptxCentrify Access Manager Presentation.pptx
Centrify Access Manager Presentation.pptx
 
Best Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQLBest Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQL
 
(ATS4-PLAT03) Balancing Security with access for Development
(ATS4-PLAT03) Balancing Security with access for Development(ATS4-PLAT03) Balancing Security with access for Development
(ATS4-PLAT03) Balancing Security with access for Development
 
Manageability Enhancements of SQL Server 2012
Manageability Enhancements of SQL Server 2012Manageability Enhancements of SQL Server 2012
Manageability Enhancements of SQL Server 2012
 
Locking the Doors, Securing the Appliances
Locking the Doors, Securing the AppliancesLocking the Doors, Securing the Appliances
Locking the Doors, Securing the Appliances
 

More from xKinAnx

Engage for success ibm spectrum accelerate 2
Engage for success   ibm spectrum accelerate 2Engage for success   ibm spectrum accelerate 2
Engage for success ibm spectrum accelerate 2
xKinAnx
 
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive
Accelerate with ibm storage  ibm spectrum virtualize hyper swap deep diveAccelerate with ibm storage  ibm spectrum virtualize hyper swap deep dive
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive
xKinAnx
 
Software defined storage provisioning using ibm smart cloud
Software defined storage provisioning using ibm smart cloudSoftware defined storage provisioning using ibm smart cloud
Software defined storage provisioning using ibm smart cloud
xKinAnx
 
Ibm spectrum virtualize 101
Ibm spectrum virtualize 101 Ibm spectrum virtualize 101
Ibm spectrum virtualize 101
xKinAnx
 
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive dee...
Accelerate with ibm storage  ibm spectrum virtualize hyper swap deep dive dee...Accelerate with ibm storage  ibm spectrum virtualize hyper swap deep dive dee...
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive dee...
xKinAnx
 
04 empalis -ibm_spectrum_protect_-_strategy_and_directions
04 empalis -ibm_spectrum_protect_-_strategy_and_directions04 empalis -ibm_spectrum_protect_-_strategy_and_directions
04 empalis -ibm_spectrum_protect_-_strategy_and_directions
xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...
Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...
Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...
xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...
xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...
xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...
xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...
Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...
Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...
xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...
xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...
xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...
Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...
Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...
xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
xKinAnx
 
Presentation disaster recovery in virtualization and cloud
Presentation   disaster recovery in virtualization and cloudPresentation   disaster recovery in virtualization and cloud
Presentation disaster recovery in virtualization and cloud
xKinAnx
 
Presentation disaster recovery for oracle fusion middleware with the zfs st...
Presentation   disaster recovery for oracle fusion middleware with the zfs st...Presentation   disaster recovery for oracle fusion middleware with the zfs st...
Presentation disaster recovery for oracle fusion middleware with the zfs st...
xKinAnx
 
Presentation differentiated virtualization for enterprise clouds, large and...
Presentation   differentiated virtualization for enterprise clouds, large and...Presentation   differentiated virtualization for enterprise clouds, large and...
Presentation differentiated virtualization for enterprise clouds, large and...
xKinAnx
 
Presentation desktops for the cloud the view rollout
Presentation   desktops for the cloud the view rolloutPresentation   desktops for the cloud the view rollout
Presentation desktops for the cloud the view rollout
xKinAnx
 

More from xKinAnx (20)

Engage for success ibm spectrum accelerate 2
Engage for success   ibm spectrum accelerate 2Engage for success   ibm spectrum accelerate 2
Engage for success ibm spectrum accelerate 2
 
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive
Accelerate with ibm storage  ibm spectrum virtualize hyper swap deep diveAccelerate with ibm storage  ibm spectrum virtualize hyper swap deep dive
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive
 
Software defined storage provisioning using ibm smart cloud
Software defined storage provisioning using ibm smart cloudSoftware defined storage provisioning using ibm smart cloud
Software defined storage provisioning using ibm smart cloud
 
Ibm spectrum virtualize 101
Ibm spectrum virtualize 101 Ibm spectrum virtualize 101
Ibm spectrum virtualize 101
 
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive dee...
Accelerate with ibm storage  ibm spectrum virtualize hyper swap deep dive dee...Accelerate with ibm storage  ibm spectrum virtualize hyper swap deep dive dee...
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive dee...
 
04 empalis -ibm_spectrum_protect_-_strategy_and_directions
04 empalis -ibm_spectrum_protect_-_strategy_and_directions04 empalis -ibm_spectrum_protect_-_strategy_and_directions
04 empalis -ibm_spectrum_protect_-_strategy_and_directions
 
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
 
Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...
Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...
Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...
 
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...
 
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...
 
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...
 
Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...
Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...
Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...
 
Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...
 
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...
 
Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...
Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...
Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...
 
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
 
Presentation disaster recovery in virtualization and cloud
Presentation   disaster recovery in virtualization and cloudPresentation   disaster recovery in virtualization and cloud
Presentation disaster recovery in virtualization and cloud
 
Presentation disaster recovery for oracle fusion middleware with the zfs st...
Presentation   disaster recovery for oracle fusion middleware with the zfs st...Presentation   disaster recovery for oracle fusion middleware with the zfs st...
Presentation disaster recovery for oracle fusion middleware with the zfs st...
 
Presentation differentiated virtualization for enterprise clouds, large and...
Presentation   differentiated virtualization for enterprise clouds, large and...Presentation   differentiated virtualization for enterprise clouds, large and...
Presentation differentiated virtualization for enterprise clouds, large and...
 
Presentation desktops for the cloud the view rollout
Presentation   desktops for the cloud the view rolloutPresentation   desktops for the cloud the view rollout
Presentation desktops for the cloud the view rollout
 

Recently uploaded

Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 

Recently uploaded (20)

Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 

Presentation database security enhancements with oracle

  • 1. Database Security Enhancements With Oracle Database 11g Daniel Wong Director of Engineering, Database Security Oracle Corporation
  • 2. 2 Agenda • About Oracle Software Security Assurance • Overview of Security Enhancements in 11g • Secure Configuration Enhancements • Other Key Security Enhancements • Q&A
  • 3. 3 Oracle Software Security Assurance All the processes, procedures, and technologies that have been implemented to ensure that Oracle’s products are meeting our customers’ security requirements, while providing for the most cost-effective ownership experience. Product Development Product Definition Ongoing Assurance Secure Coding Standards
  • 4. 4 Oracle Software Security Assurance Secure Configuration • Enhance “out of the box installation” settings to be more secure • Remove default passwords • Disable unneeded services • Reduce proliferation of powerful privileges • Identify and minimize potential effects of enhanced secure configuration settings: • Impacts resulting from version upgrade • Impacts on Oracle and third-party applications • Document and share current security best practices • http://www.oracle.com/security/resource-library.html
  • 5. 5 Oracle Software Security Assurance Secure Configuration • Goals: • Improve security of default configuration • Secure by Default while maintaining upgradability and usability • Inputs: • Internal: Various Oracle Software Security Assurance programs • External: CIS, SANS, DISA • Recent Enhancements: • Locked default accounts, expired passwords • Optional install of demo schemas • Best Practices document • Default password/account scanner
  • 6. 6 Secure Configuration Enhancements with 11g - Overview 1. Default Audit Settings • Preconfigured • Enhanced performance 2. Default Password Management • Enhanced protection against brute force attack • Complexity enforcement procedure • Built-in default password scanner 3. Enhanced Authentication • Case sensitive password authentication • Control authentication version 4. Enhanced Access Control • Improved security for several utl* packages
  • 7. 7 Audit Settings • Key requirement for compliance • 10gR2: OFF by default • 11g: • AUDIT_TRAIL=DB by default in DBCA • security-relevant actions audited • Performance: • Set audit_trail=XML or OS for best performance • In our informal lab environment, we found 1-2% performance degradation for the TPCC benchmark with AUDIT_TRAIL=DB and our default auditing statements
  • 8. 8 Updated Default Audit Settings • Statement Audit option • ROLE • Privilege Audit Options • CREATE USER • ALTER USER • DROP USER • CREATE SESSION • CREATE ANY TABLE • ALTER ANY TABLE • DROP ANY TABLE • CREATE ANY PROCEDURE • ALTER ANY PROCEDURE • DROP ANY PROCEDURE • ALTER PROFILE • DROP PROFILE • GRANT ANY PRIVILEGE • GRANT ANY OBJECT PRIV. • GRANT ANY ROLE • CREATE ANY JOB • CREATE EXTERNAL JOB • CREATE ANY LIBRARY • CREATE PUBLIC DB LINK • EXEMPT ACCESS POLICY • ALTER DATABASE • ALTER SYSTEM • AUDIT SYSTEM
  • 9. 9 Default Profile Password Settings • 10gR2 • FAILED_LOGIN_ATTEMPTS = 10 • all others: unlimited • 11g - more restrictive • FAILED_LOGIN_ATTEMPTS = 10 (no change) • PASSWORD_LOCK_TIME = 1 • PASSWORD_GRACE_TIME = 7 • PASSWORD_LIFE_TIME = 180 • Balanced protection against Denial of Service (DOS) and password attacks while keeping usability
  • 10. 10 Password Complexity • Supports case sensitive passwords • Supports special and multi-byte characters to increase security and usability • Takes effect immediately after password change • Enhanced default password complexity verification • Password Complexity Verification not enabled in default profile; can be enabled via Enterprise Manager or SQL • In utlpwdmg.sql in $ORACLE_HOME/admin directory • SQL to set the password complexity verification • ALTER PROFILE DEFAULT PASSWORD_VERIFY_FUNCTION verify_function_11G • This routine will verify that password • Has minimum length of 8 characters • Has at least one letter and one digit • Is not username, reverse thereof, or username(1-100) • Is not one of a few common passwords (e.g. welcome1) • Must differ from previous password by at least 3 characters
  • 11. 11 Password Complexity Recommendations • Default password profile parameters may not suit everyone • Adjust the password settings to your security needs • Change default password verification routine as per your needs • Define at least two password profiles - one for users and one for mid-tiers and administrators • Password recommendations vary with use cases: • See for example, recommendations for E-Business Suite - MetaLink 189367.1 • See also Visit OTN: otn.oracle.com -> products -> database -> security and compliance for detailed recommendations
  • 12. 12 Default Password View • View DBA_USERS_WITH_DEFPWD will show all accounts still using default passwords • Over 140 default username/passwords collected from the field, including application accounts for Peoplesoft and Ebizs • SQL> desc DBA_USERS_WITH_DEFPWD • Name Null? Type • ----------------------------------------- -------- ---------------------------- • USERNAME NOT NULL VARCHAR2(30) • SQL> select * from DBA_USERS_WITH_DEFPWD • 2 ; • USERNAME • ------------------------------ • JONES
  • 13. 13 Enhanced Authentication • Supports multi-bytes and special characters • Case sensitive passwords always enforced • Use SEC _ CASE _ SENSITIVE _ LOGON to turn it OFF if necessary • Set SQLNET . ALLOWED _ LOGON _ VERSION to highest OCI client version in use: • Use 8 if there are Oracle 8.x clients connecting to the DB • Use 9 if there are Oracle 9.x clients connecting to the DB • Use 11 if there are Oracle 10.x and/or 11.x clients connecting to the DB • Use 8 if there are pre-Oracle 11g JDBC pure Java client connecting to the DB • Use of SHA-1 hashing algorithm to protect password
  • 14. 14 Enhanced Access Control • Improved security for several utl* packages • UTL_TCP, UTL_SMTP, UTL_MAIL, UTL_HTTP, etc. • These packages will no longer allow connections to external network services to non-privileged users by default • SYS and XDB schemas will specifically remain excluded from this kind of restriction • DBAs will be able to specify what network services database users will be allowed to access when using these packages.
  • 15. 15 Enhanced Access Control Recommendations • Open access to external network services only minimally • Specify down to hosts and ports, avoid unnecessary “*” wildcards • Have small number of ACLs for manageability and performance • Share ACLs among network services open to the same users • Consider giving access indirectly through application schemas • Applications can further restrict user interaction with network services
  • 16. 16 Access Control Administration • Administration via DBMS_NETWORK_ACL_ADMIN • Grant access to a network service • create_acl – create an ACL for the first user • assign_acl – assign ACL to network service • Grant access to more users in ACL – add_privilege • Revoke access from users in ACL – delete_privilege • Stop access to network services • unassign_acl – take ACL away from network service • All ACL changes are transactional • Remember to “COMMIT” the transaction !!! • View ACL settings via dictionary views • DBA_NETWORK_ACLS – which network services have ACLs? • DBA_NETWORK_ACL_PRIVILEGES – who are in the ACLs?
  • 17. 17 Access Control Administration Example begin dbms_network_acl_admin.create_acl( acl => 'smtp-access.xml', description => 'ACL for SMTP service', principal => 'MAILAGENT', is_grant => TRUE, privilege => 'connect'); dbms_network_acl_admin.assign_acl( acl => 'smtp-access.xml', host => 'smtp-host.oracle.com', lower_port => 25); end; / commit;
  • 18. 18 Access Control Administration Example SQL> select * from dba_network_acls; HOST LOWER_PORT UPPER_PORT ACL -------------------- ---------- ---------- ------------------------- smtp-host.oracle.com 25 25 /sys/acls/smtp-access.xml SQL> select * from dba_network_acl_privileges; ACL PRINCIPAL PRIVILEGE ------------------------- -------------------- --------- /sys/acls/smtp-access.xml MAILAGENT connect
  • 19. 19 How Do These Changes Impact Installation? • Default new installations will include audit and password profiles • Option during install to retain 10gR2 settings • DBCA screens to: • Revert back to 10gR2 settings for audit and/or password • Apply new default settings • Upgrades will not change the audit and password profile settings
  • 20. 20 Recommendations for Upgrades I • Audit settings • Turn on auditing for security sensitive DDL operations listed • Set to DB or DB_extended for querability • Set to OS or XML for performance • Password Management • Institute password policies by classifying users into a different usage groups and assign dedicated profiles to each group • Check DBA_USERS_WITH_DEFPWD for default passwords
  • 21. 21 Recommendations for Upgrades II • Authentication • Identify sources of connection and set security level to highest possible supported by the client • Ask users to change password as soon as possible for case sensitive password to take effect • Look into EUS for centralized user management • Reminder: we support connect username/password as SYSDBA • Access Control • Identify applications using utl_* packages, and identify and grant appropriate new ACL privileges and confirm applications are running fine • Evaluate current privileges granted, follow least privileged model
  • 22. 22 Other Key Security Enhancements • Tablespace Encryption option in Transparent Data Encryption • Allows bulk encryption at tablespace level • No restriction on data types and indexes • Works with all High Availability offerings • Hardware Security Module and External Key Server support in Transparent Data Encryption • Provides additional option for security and key management services by third party products • Management of SYSDBA and SYSOPER in Enterprise User Security • Identity management of super users in databases • Enhanced Kerberos support • Cross realm and type 4 certificate support • Support Microsoft KDC default encryption modes
  • 23. 23 Oracle Software Security Assurance Conclusion • MAXIMUM SECURITY • Best of breed security features • Secure design from the ground up • Effective vulnerability remediation process • LOWER COST OF OWNERSHIP • Unwavering commitment to maintaining our customer’s security posture • Predictable security patch process • Priority given to quality
  • 24. 24 For More Information • Oracle Software Security Assurance Web Site at http://www.oracle.com/security/software-security-assurance.html • Technical white papers and security guides • Online security seminars and webcasts • Blogs and more • Critical Patch Update & Security Alerts at http://www.oracle.com/technology/deploy/security/alerts.htm • Critical Patch Updates and current security alerts • Patch download • CPU documentation & Risk Matrices http://search.oracle.com Oracle Software Security Assurance