Securing Data in
Oracle Database 12c
Thomas Kyte
http://asktom.oracle.com/
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |
Safe Harbor Statement
The following is intended to outline our general product direction. It is intended for
information purposes only, and may not be incorporated into any contract. It is not a
commitment to deliver any material, code, or functionality, and should not be relied upon
in making purchasing decisions. The development, release, and timing of any features or
functionality described for Oracle’s products remains at the sole discretion of Oracle.
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |
Security
• Oracle is very secure
• Therefore, we don’t need to be, it just happens
• Besides, it is not as important as having pretty screens after all.
• And if we add it later,
– I’m sure it’ll be non-intrusive
– And very performant
– And easy to do
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |
Apps
Users
Advanced Security
Data Redaction
Data Masking
TDE
Database Vault
Privilege Analysis
Database Vault
Privileged User Controls
OS &
Storage DirectoriesDatabases Custom
Audit Data &
Event Logs
Database Firewall
Oracle Maximum Security Architecture
Core Components
Reports
Alerts
Audit Vault
Policies
Events
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |
Program Agenda
Transparent Data Encryption (TDE), Key Vault
Privilege Analysis
Database Vault
Database Firewall
Data Redaction, Data Masking, Fine Grained Access Control
Audit Vault
1
2
3
4
5
6
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |
Program Agenda
Transparent Data Encryption (TDE), Key Vault
Privilege Analysis
Database Vault
Database Firewall
Data Redaction, Data Masking, Fine Grained Access Control
Audit Vault
1
2
3
4
5
6
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |
• SQL Interface to key management
• *New* FIPS 140-2 mode (dbfips_140)
• Encrypts tablespaces or columns to secure
data at rest
• Requires no application changes
• “Near Zero” overhead with hardware
• Integrated with Oracle DB technologies
– Log files, Compression, ASM, DataPump
Advanced Security
Transparent Data Encryption (TDE)
Preventive Control for Oracle Databases
Disk
Backups
Exports
Off-Site
Facilities
Applications
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | 10
The Challenges of Key Management
Management
• Proliferation of encryption wallets and keys
• Authorized sharing of keys
• Key availability, retention, and recovery
• Custody of keys and key storage files
Regulations
• Physical separation of keys from encrypted data
• Periodic key rotations
• Monitoring and auditing of keys
• Long-term retention of keys and encrypted data
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |
Key Management with Oracle Key Vault
• Centrally manage and share keys, secrets, Oracle wallets, Java keystores, and more
• Optimized for Oracle stack (Database, Middleware, Systems) and Advanced Security TDE
• Robust, secure, and standards compliant (OASIS KMIP) key manager
11
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |
Oracle Key Vault High-Level Architecture
Standby
Administration
Console, Alerts,
Reports
Secure Backups
= Credential File
= Oracle Wallet
= Server Password= Java Keystore
= Certificate
Databases
Servers
Middleware
12
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |
Oracle Wallet Scenarios
Oracle Advanced Security Transparent Data Encryption (TDE)
13
Single
Instance
GoldenGate
Multiple DBs
Same Machine
RAC
Data Guard
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |
Oracle Advanced Security Transparent Data Encryption (TDE)
Direct Connection Scenarios
14
Single
Instance
Multiple DBs
Same Machine
RAC
Data Guard
GoldenGate
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |
Oracle Key Vault Software Appliance Platform
• Turnkey solution based on hardened stack
• Includes Oracle Database and security options
• Open x86-64 hardware to choose from
• Easy to install, configure, deploy, and patch
• Separation of duties for administrative users
• Full auditing, preconfigured reports, and alerts
15
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |
Program Agenda
Transparent Data Encryption (TDE), Key Vault
Privilege Analysis
Database Vault
Database Firewall
Data Redaction, Data Masking, Fine Grained Access Control
Audit Vault
1
2
3
4
5
6
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |
Privilege Analysis
 You want to use the concept of least privileges
 Problem: You don’t know what privileges they really need,
maybe just give them SELECT ANY TABLE
 That is not very secure and hard to justify to an auditor
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |
Privilege Analysis
Discover Use of Privileges and Roles
Administrative Control for Oracle Database 12c
Create…
Drop…
Update…
DBA role
APPADMIN role
 Turn on privilege capture mode
 Report on actual privileges and roles
used in the database
 Helps revoke unnecessary privileges
 Enforce least privilege and reduce risks
 Increase security without disruption
Unused
Update
APPADMIN
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |
Program Agenda
Transparent Data Encryption (TDE), Key Vault
Privilege Analysis
Database Vault
Database Firewall
Data Redaction, Data Masking, Fine Grained Access Control
Audit Vault
1
2
3
4
5
6
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |
Procurement
HR
Finance
• Limit default powers of privileged users
• Enforce policy rules inside the database
• Violations audited, secured and sent to Oracle Audit Vault
• No application changes required
Application
DBA
select * from
finance.customers
Oracle Database Vault
Privileged User and Operational Controls
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |
Program Agenda
Transparent Data Encryption (TDE), Key Vault
Privilege Analysis
Database Vault
Database Firewall
Data Redaction, Data Masking, Fine Grained Access Control
Audit Vault
1
2
3
4
5
6
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |
Oracle Audit Vault and Database
Firewall
Database Activity Monitoring and Firewall
Detective Control for Oracle and non-Oracle Databases
 Monitors and logs database network traffic
 Detects and blocks unauthorized database
activity including SQL injection attacks
 Highly accurate SQL grammar analysis
 Whitelist approach to enforce activity
 Blacklists for managing high risk activity
 Scalable secure software appliance
Block
Log
Allow
Alert
SubstituteApps
Whitelist Blacklist
SQL
Analysis Policy
Factors
Users
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |
Program Agenda
Transparent Data Encryption (TDE), Key Vault
Privilege Analysis
Database Vault
Database Firewall
Data Redaction, Data Masking, Fine Grained Access Control
Audit Vault
1
2
3
4
5
6
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |
Oracle Data Redaction
• On-the-fly redaction based upon user name, IP address,
application context, and other factors
• Transparent, consistent enforcement in the database
• Minimal impact on production work loads
Redacting Sensitive Data for Applications
Credit Card #
4451-2172-9841-4368
5106-6342-4881-5211
4891-3311-0090-5055
Policy
Call Centers
Decision Support Systems
Systems with PII, PHI, PCI data
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |
Supported Transformations
Original  Redacted
Full
Redaction
05/24/75  01/01/01
11 Rock Bluff Dr.  XXXXXXX
Partial
Redaction
068-35-2299  ***-**-2299
D1L86YZV8K  D1******8K
RegExp
Redaction jim.lee@acme.com  [redacted]@acme.com
94025-2450  94025-[hidden]
Random
Redaction
4022-5231-5531-9855  4943-6344-0547-0110
09/30/73  11/14/85
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |
01001011001010100100
10010010010010010010
01001000100101010010
Introducing Oracle Data Masking and Subsetting Pack
Reduces Risk in Sharing by Obfuscating or Removing Sensitive Data
26
NAME SALARY
AGUILAR 50135.56
BENSON 35789.89
CHANDRA 60765.23
DONNER 103456.82
NAME SALARY
AGUILAR 35676.24
CHANDRA 76546.89
Discover Sensitive Data
Mask Data Using Format Library
Subset Based on Conditions/Goal
Mask/Subset in Export or on Staging
Retain Application Integrity
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |
Program Agenda
Transparent Data Encryption (TDE), Key Vault
Privilege Analysis
Database Vault
Database Firewall
Data Redaction, Data Masking, Fine Grained Access Control
Audit Vault
1
2
3
4
5
6
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |
Conditional Auditing Framework
Detective Control for Oracle Database 12c
 New policy- and condition-based syntax
 What: CREATE, ALTER, ALL, …
 Where: Set of Privileges, Roles, objects
 When: IP_ADDRESS !=“10.288.241.88”
 Exceptions: Except HR
 Group audit settings for manageability
 New roles: Audit Viewer and Audit Admin
 Out-of-box audit policies
 Single unified database audit trail
Database Auditing
IF
ACTIONS CREATE
AND
IP_ADDRESS =
THEN
AND
THEN
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |
Built-in Reports
Alerts
Custom Reports
!
Policies
Oracle Audit Vault
AUDIT
DATA
AUDIT VAULT
Firewall Events
Database Firewall
Detective Control for Databases, Operating Systems, …
Custom
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |
Program Agenda
Transparent Data Encryption (TDE), Key Vault
Privilege Analysis
Database Vault
Database Firewall
Data Redaction, Data Masking, Fine Grained Access Control
Audit Vault
1
2
3
4
5
6
Securing data in Oracle Database 12c - 2015

Securing data in Oracle Database 12c - 2015

  • 2.
    Securing Data in OracleDatabase 12c Thomas Kyte http://asktom.oracle.com/ Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |
  • 3.
    Copyright © 2014,Oracle and/or its affiliates. All rights reserved. | Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle.
  • 4.
    Copyright © 2014,Oracle and/or its affiliates. All rights reserved. | Security • Oracle is very secure • Therefore, we don’t need to be, it just happens • Besides, it is not as important as having pretty screens after all. • And if we add it later, – I’m sure it’ll be non-intrusive – And very performant – And easy to do
  • 5.
    Copyright © 2014,Oracle and/or its affiliates. All rights reserved. |
  • 6.
    Copyright © 2014,Oracle and/or its affiliates. All rights reserved. | Apps Users Advanced Security Data Redaction Data Masking TDE Database Vault Privilege Analysis Database Vault Privileged User Controls OS & Storage DirectoriesDatabases Custom Audit Data & Event Logs Database Firewall Oracle Maximum Security Architecture Core Components Reports Alerts Audit Vault Policies Events
  • 7.
    Copyright © 2014,Oracle and/or its affiliates. All rights reserved. | Program Agenda Transparent Data Encryption (TDE), Key Vault Privilege Analysis Database Vault Database Firewall Data Redaction, Data Masking, Fine Grained Access Control Audit Vault 1 2 3 4 5 6
  • 8.
    Copyright © 2014,Oracle and/or its affiliates. All rights reserved. | Program Agenda Transparent Data Encryption (TDE), Key Vault Privilege Analysis Database Vault Database Firewall Data Redaction, Data Masking, Fine Grained Access Control Audit Vault 1 2 3 4 5 6
  • 9.
    Copyright © 2014,Oracle and/or its affiliates. All rights reserved. | • SQL Interface to key management • *New* FIPS 140-2 mode (dbfips_140) • Encrypts tablespaces or columns to secure data at rest • Requires no application changes • “Near Zero” overhead with hardware • Integrated with Oracle DB technologies – Log files, Compression, ASM, DataPump Advanced Security Transparent Data Encryption (TDE) Preventive Control for Oracle Databases Disk Backups Exports Off-Site Facilities Applications
  • 10.
    Copyright © 2014,Oracle and/or its affiliates. All rights reserved. | 10 The Challenges of Key Management Management • Proliferation of encryption wallets and keys • Authorized sharing of keys • Key availability, retention, and recovery • Custody of keys and key storage files Regulations • Physical separation of keys from encrypted data • Periodic key rotations • Monitoring and auditing of keys • Long-term retention of keys and encrypted data
  • 11.
    Copyright © 2014,Oracle and/or its affiliates. All rights reserved. | Key Management with Oracle Key Vault • Centrally manage and share keys, secrets, Oracle wallets, Java keystores, and more • Optimized for Oracle stack (Database, Middleware, Systems) and Advanced Security TDE • Robust, secure, and standards compliant (OASIS KMIP) key manager 11
  • 12.
    Copyright © 2014,Oracle and/or its affiliates. All rights reserved. | Oracle Key Vault High-Level Architecture Standby Administration Console, Alerts, Reports Secure Backups = Credential File = Oracle Wallet = Server Password= Java Keystore = Certificate Databases Servers Middleware 12
  • 13.
    Copyright © 2014,Oracle and/or its affiliates. All rights reserved. | Oracle Wallet Scenarios Oracle Advanced Security Transparent Data Encryption (TDE) 13 Single Instance GoldenGate Multiple DBs Same Machine RAC Data Guard
  • 14.
    Copyright © 2014,Oracle and/or its affiliates. All rights reserved. | Oracle Advanced Security Transparent Data Encryption (TDE) Direct Connection Scenarios 14 Single Instance Multiple DBs Same Machine RAC Data Guard GoldenGate
  • 15.
    Copyright © 2014,Oracle and/or its affiliates. All rights reserved. | Oracle Key Vault Software Appliance Platform • Turnkey solution based on hardened stack • Includes Oracle Database and security options • Open x86-64 hardware to choose from • Easy to install, configure, deploy, and patch • Separation of duties for administrative users • Full auditing, preconfigured reports, and alerts 15
  • 16.
    Copyright © 2014,Oracle and/or its affiliates. All rights reserved. | Program Agenda Transparent Data Encryption (TDE), Key Vault Privilege Analysis Database Vault Database Firewall Data Redaction, Data Masking, Fine Grained Access Control Audit Vault 1 2 3 4 5 6
  • 17.
    Copyright © 2014,Oracle and/or its affiliates. All rights reserved. | Privilege Analysis  You want to use the concept of least privileges  Problem: You don’t know what privileges they really need, maybe just give them SELECT ANY TABLE  That is not very secure and hard to justify to an auditor
  • 18.
    Copyright © 2014,Oracle and/or its affiliates. All rights reserved. | Privilege Analysis Discover Use of Privileges and Roles Administrative Control for Oracle Database 12c Create… Drop… Update… DBA role APPADMIN role  Turn on privilege capture mode  Report on actual privileges and roles used in the database  Helps revoke unnecessary privileges  Enforce least privilege and reduce risks  Increase security without disruption Unused Update APPADMIN
  • 19.
    Copyright © 2014,Oracle and/or its affiliates. All rights reserved. | Program Agenda Transparent Data Encryption (TDE), Key Vault Privilege Analysis Database Vault Database Firewall Data Redaction, Data Masking, Fine Grained Access Control Audit Vault 1 2 3 4 5 6
  • 20.
    Copyright © 2014,Oracle and/or its affiliates. All rights reserved. | Procurement HR Finance • Limit default powers of privileged users • Enforce policy rules inside the database • Violations audited, secured and sent to Oracle Audit Vault • No application changes required Application DBA select * from finance.customers Oracle Database Vault Privileged User and Operational Controls
  • 21.
    Copyright © 2014,Oracle and/or its affiliates. All rights reserved. | Program Agenda Transparent Data Encryption (TDE), Key Vault Privilege Analysis Database Vault Database Firewall Data Redaction, Data Masking, Fine Grained Access Control Audit Vault 1 2 3 4 5 6
  • 22.
    Copyright © 2014,Oracle and/or its affiliates. All rights reserved. | Oracle Audit Vault and Database Firewall Database Activity Monitoring and Firewall Detective Control for Oracle and non-Oracle Databases  Monitors and logs database network traffic  Detects and blocks unauthorized database activity including SQL injection attacks  Highly accurate SQL grammar analysis  Whitelist approach to enforce activity  Blacklists for managing high risk activity  Scalable secure software appliance Block Log Allow Alert SubstituteApps Whitelist Blacklist SQL Analysis Policy Factors Users
  • 23.
    Copyright © 2014,Oracle and/or its affiliates. All rights reserved. | Program Agenda Transparent Data Encryption (TDE), Key Vault Privilege Analysis Database Vault Database Firewall Data Redaction, Data Masking, Fine Grained Access Control Audit Vault 1 2 3 4 5 6
  • 24.
    Copyright © 2014,Oracle and/or its affiliates. All rights reserved. | Oracle Data Redaction • On-the-fly redaction based upon user name, IP address, application context, and other factors • Transparent, consistent enforcement in the database • Minimal impact on production work loads Redacting Sensitive Data for Applications Credit Card # 4451-2172-9841-4368 5106-6342-4881-5211 4891-3311-0090-5055 Policy Call Centers Decision Support Systems Systems with PII, PHI, PCI data
  • 25.
    Copyright © 2014,Oracle and/or its affiliates. All rights reserved. | Supported Transformations Original  Redacted Full Redaction 05/24/75  01/01/01 11 Rock Bluff Dr.  XXXXXXX Partial Redaction 068-35-2299  ***-**-2299 D1L86YZV8K  D1******8K RegExp Redaction jim.lee@acme.com  [redacted]@acme.com 94025-2450  94025-[hidden] Random Redaction 4022-5231-5531-9855  4943-6344-0547-0110 09/30/73  11/14/85
  • 26.
    Copyright © 2014,Oracle and/or its affiliates. All rights reserved. | 01001011001010100100 10010010010010010010 01001000100101010010 Introducing Oracle Data Masking and Subsetting Pack Reduces Risk in Sharing by Obfuscating or Removing Sensitive Data 26 NAME SALARY AGUILAR 50135.56 BENSON 35789.89 CHANDRA 60765.23 DONNER 103456.82 NAME SALARY AGUILAR 35676.24 CHANDRA 76546.89 Discover Sensitive Data Mask Data Using Format Library Subset Based on Conditions/Goal Mask/Subset in Export or on Staging Retain Application Integrity
  • 27.
    Copyright © 2014,Oracle and/or its affiliates. All rights reserved. | Program Agenda Transparent Data Encryption (TDE), Key Vault Privilege Analysis Database Vault Database Firewall Data Redaction, Data Masking, Fine Grained Access Control Audit Vault 1 2 3 4 5 6
  • 28.
    Copyright © 2014,Oracle and/or its affiliates. All rights reserved. | Conditional Auditing Framework Detective Control for Oracle Database 12c  New policy- and condition-based syntax  What: CREATE, ALTER, ALL, …  Where: Set of Privileges, Roles, objects  When: IP_ADDRESS !=“10.288.241.88”  Exceptions: Except HR  Group audit settings for manageability  New roles: Audit Viewer and Audit Admin  Out-of-box audit policies  Single unified database audit trail Database Auditing IF ACTIONS CREATE AND IP_ADDRESS = THEN AND THEN
  • 29.
    Copyright © 2014,Oracle and/or its affiliates. All rights reserved. | Built-in Reports Alerts Custom Reports ! Policies Oracle Audit Vault AUDIT DATA AUDIT VAULT Firewall Events Database Firewall Detective Control for Databases, Operating Systems, … Custom
  • 30.
    Copyright © 2014,Oracle and/or its affiliates. All rights reserved. | Program Agenda Transparent Data Encryption (TDE), Key Vault Privilege Analysis Database Vault Database Firewall Data Redaction, Data Masking, Fine Grained Access Control Audit Vault 1 2 3 4 5 6