SlideShare a Scribd company logo
Database Security Course
Tarbiat Modares Universisty
Atousa Ahsani, Hanie Zolfi
Professor: Dr.Sadegh Dorri Nogoorani
Fall 2019
2019/12/30
Video Link: https://www.aparat.com/v/AP2NS
SECURITY IN ORACLE
2
OVERVIEW
 Introduction
 PL/SQL
 Pluggable Database
Password Protection
Virtual Private Database
Access Control
 DAC
 MAC (OLS)
Transparent Data Encryption
INTRODUCTION
3
INTRODUCTION
PL/SQL is an extension of Structured Query Language (SQL)
that is used in Oracle.
PL/SQL allows the programmer to write code in a procedural
format.
Similar to other database languages, it gives more control to
the programmers by the use of loops, conditions and object-
oriented concepts.
4
PDB
One or more PDBs together are called
a container database (CDB).
They are completely transparent to the
users and applications.
5
A Pluggable Database (PDB) is a portable collection of schemas, schema objects, and non
schema objects that appear to an Oracle Net client as a separate database.
PASSWORD PROTECTION
6
 In a default installation,
Oracle Database provides
tow password verification
functions to ensure that new
or changed passwords are
sufficiently complex.
 You must manually enable
password complexity
checking.
 You can further customize
the complexity of your
users' passwords
 Passwords are case
sensitive. For example, the
password hPP5620qr fails if
it is entered as hpp5620QR
or hPp5620Qr
 To verify the user's
password and enforce case
sensitivity in password
creation, Oracle Database
uses the 12C password
version, which is based on a
de-optimized algorithm that
involves Password-Based
Key Derivation Function
(PBKDF2) and the SHA-
512 cryptographic hash
functions
7
PASSWORD PROTECTION
Password
encryption
Password
complexity
checking
Enforced case
sensitivity
Password
hashed using
the 12C password
version.
 Oracle Database
automatically and
transparently encrypts
passwords during network
connections using AES.
 You can enabled Advanced
Security Option native
network encryption or
configure Secure Sockets
Layer (SSL) encryption.
VIRTUAL PRIVATE DATABASE
8
Oracle Virtual Private Database (VPD) enables you to dynamically
add a WHERE clause in any SQL statement that a user executes. The
WHERE clause filters the data the user is allowed to access, based on
the identity of a user.
This feature restricts row and column level data access by creating a
policy that enforces a WHERE clause for all SQL statements that
query the database.
9
VIRTUAL PRIVATE DATABASE
ACCESS CONTROL
10
ACCESS CONTROL
 discretionary access control
 Implementations With owner
 GRANT privileges ON object TO
user;
 REVOKE privileges ON object
FROM user;
 Oracle Label Security (OLS) provides
row-level security for your database
tables.
 Can be accomplished by assigning
security labels
 you can use OLS to assign specific users
authorization for specific rows, based on
these labels.
 OLS compares the label of the data row
with the security clearance of the user to
determine whether the user is allowed
access to the data in the row.
11
MAC(OLS)DAC
EMPLOYEESTABLE
Id first_name last_name department salary ols_label
101 Harry Hill IT 600 S
102 Vik Reeves STAFF 300 UC
103 Bob Mortimer SEC 1000 TS
104 Paul Whitehouse EDU 500 C
105 Harry Enfield Staff 350 UC
9
Bill
Security level = S
John
Security level = C
13
OLS VS VPD
Use case: Web based systems or any
application needs to allow user based
access to content
OLS Row Level Security, based on user credentials
VPD Similar to Row Level Security
Without adding extra column to table
Use case
Web based systems or any application needs to allow user based access to content
TRANSPARENT DATA ENCRYPTION
14
15
TRANSPARENT DATA ENCRYPTION
Encrypting data includes the following components:
 An algorithm to encrypt the data
 A key to encrypt and decrypt data
Transparent Data Encryption enables you to encrypt individual table
columns or an entire tablespace.
When a user inserts data into an encrypted column, Transparent Data
Encryption automatically encrypts the data. When authorized users
select the column, then the data is automatically decrypted.
IMPLEMENTATION
16
 PASSWORD PROTECTION
 VIRTUAL PRIVATE DATABASE
 ORACLE LABEL SECURITY(OLS)
 TRANSPARENT DATA ENCRYPTION
RESOURCES AND REFERENCES
17
https://docs.oracle.com/database/121/TDPSG/toc.htm
https://oracle-base.com/articles/9i/oracle-label-security-9i
https://oracle-base.com/articles/8i/virtual-private-databases
https://oracle-base.com/articles/12c/multitenant-transparent-data-encryption-tde-12cr1

More Related Content

Similar to Security in Oracle Database

DB2 Security Model
DB2 Security ModelDB2 Security Model
DB2 Security Model
uniqueYGB
 
DEE 431 Introduction to Mysql Slide 3
DEE 431 Introduction to Mysql Slide 3DEE 431 Introduction to Mysql Slide 3
DEE 431 Introduction to Mysql Slide 3
YOGESH SINGH
 
Database security issues
Database security issuesDatabase security issues
Database security issues
n|u - The Open Security Community
 
Database Systems Security
Database Systems SecurityDatabase Systems Security
Database Systems Security
amiable_indian
 
SQL Injection - Newsletter
SQL Injection - NewsletterSQL Injection - Newsletter
SQL Injection - Newsletter
Smitha Padmanabhan
 
Introduction to Oracle Cloud Infrastructure Services
Introduction to Oracle Cloud Infrastructure ServicesIntroduction to Oracle Cloud Infrastructure Services
Introduction to Oracle Cloud Infrastructure Services
Knoldus Inc.
 
Vault_KT.pptx
Vault_KT.pptxVault_KT.pptx
Vault_KT.pptx
SDPL Technologies
 
Summary python coding
Summary python codingSummary python coding
Summary python coding
Novita Sari
 
DATABASE PRIVATE SECURITY JURISPRUDENCE: A CASE STUDY USING ORACLE
DATABASE PRIVATE SECURITY JURISPRUDENCE: A CASE STUDY USING ORACLEDATABASE PRIVATE SECURITY JURISPRUDENCE: A CASE STUDY USING ORACLE
DATABASE PRIVATE SECURITY JURISPRUDENCE: A CASE STUDY USING ORACLE
ijdms
 
OCI Oracle Foundations Associate (1Z0-1085-23) Exam Dumps 2023.pdf
OCI Oracle Foundations Associate (1Z0-1085-23) Exam Dumps 2023.pdfOCI Oracle Foundations Associate (1Z0-1085-23) Exam Dumps 2023.pdf
OCI Oracle Foundations Associate (1Z0-1085-23) Exam Dumps 2023.pdf
SkillCertProExams
 
8.1.6 newsecurity features
8.1.6 newsecurity features8.1.6 newsecurity features
8.1.6 newsecurity features
Anil Pandey
 
JoTechies - Azure SQL DB
JoTechies - Azure SQL DBJoTechies - Azure SQL DB
JoTechies - Azure SQL DB
JoTechies
 
Database security2 adebiaye
Database security2 adebiayeDatabase security2 adebiaye
Database security2 adebiaye
DR RICHMOND ADEBIAYE
 
Oracle DBA Tutorial for Beginners -Oracle training institute in bangalore
Oracle DBA Tutorial for Beginners -Oracle training institute in bangaloreOracle DBA Tutorial for Beginners -Oracle training institute in bangalore
Oracle DBA Tutorial for Beginners -Oracle training institute in bangalore
TIB Academy
 
Introduction to Oracle Database
Introduction to Oracle DatabaseIntroduction to Oracle Database
Introduction to Oracle Database
puja_dhar
 
SQLSecurity.ppt
SQLSecurity.pptSQLSecurity.ppt
SQLSecurity.ppt
CNSHacking
 
SQLSecurity.ppt
SQLSecurity.pptSQLSecurity.ppt
SQLSecurity.ppt
LokeshK66
 
Access Control Facilities in Oracle Database 11g r2
Access Control Facilities in Oracle Database 11g r2Access Control Facilities in Oracle Database 11g r2
Access Control Facilities in Oracle Database 11g r2
Amin Saqi
 

Similar to Security in Oracle Database (20)

DB2 Security Model
DB2 Security ModelDB2 Security Model
DB2 Security Model
 
DEE 431 Introduction to Mysql Slide 3
DEE 431 Introduction to Mysql Slide 3DEE 431 Introduction to Mysql Slide 3
DEE 431 Introduction to Mysql Slide 3
 
Oracle Database Vault
Oracle Database VaultOracle Database Vault
Oracle Database Vault
 
Database security issues
Database security issuesDatabase security issues
Database security issues
 
Database Systems Security
Database Systems SecurityDatabase Systems Security
Database Systems Security
 
SQL Injection - Newsletter
SQL Injection - NewsletterSQL Injection - Newsletter
SQL Injection - Newsletter
 
Introduction to Oracle Cloud Infrastructure Services
Introduction to Oracle Cloud Infrastructure ServicesIntroduction to Oracle Cloud Infrastructure Services
Introduction to Oracle Cloud Infrastructure Services
 
Vault_KT.pptx
Vault_KT.pptxVault_KT.pptx
Vault_KT.pptx
 
Summary python coding
Summary python codingSummary python coding
Summary python coding
 
DATABASE PRIVATE SECURITY JURISPRUDENCE: A CASE STUDY USING ORACLE
DATABASE PRIVATE SECURITY JURISPRUDENCE: A CASE STUDY USING ORACLEDATABASE PRIVATE SECURITY JURISPRUDENCE: A CASE STUDY USING ORACLE
DATABASE PRIVATE SECURITY JURISPRUDENCE: A CASE STUDY USING ORACLE
 
Sq linjection
Sq linjectionSq linjection
Sq linjection
 
OCI Oracle Foundations Associate (1Z0-1085-23) Exam Dumps 2023.pdf
OCI Oracle Foundations Associate (1Z0-1085-23) Exam Dumps 2023.pdfOCI Oracle Foundations Associate (1Z0-1085-23) Exam Dumps 2023.pdf
OCI Oracle Foundations Associate (1Z0-1085-23) Exam Dumps 2023.pdf
 
8.1.6 newsecurity features
8.1.6 newsecurity features8.1.6 newsecurity features
8.1.6 newsecurity features
 
JoTechies - Azure SQL DB
JoTechies - Azure SQL DBJoTechies - Azure SQL DB
JoTechies - Azure SQL DB
 
Database security2 adebiaye
Database security2 adebiayeDatabase security2 adebiaye
Database security2 adebiaye
 
Oracle DBA Tutorial for Beginners -Oracle training institute in bangalore
Oracle DBA Tutorial for Beginners -Oracle training institute in bangaloreOracle DBA Tutorial for Beginners -Oracle training institute in bangalore
Oracle DBA Tutorial for Beginners -Oracle training institute in bangalore
 
Introduction to Oracle Database
Introduction to Oracle DatabaseIntroduction to Oracle Database
Introduction to Oracle Database
 
SQLSecurity.ppt
SQLSecurity.pptSQLSecurity.ppt
SQLSecurity.ppt
 
SQLSecurity.ppt
SQLSecurity.pptSQLSecurity.ppt
SQLSecurity.ppt
 
Access Control Facilities in Oracle Database 11g r2
Access Control Facilities in Oracle Database 11g r2Access Control Facilities in Oracle Database 11g r2
Access Control Facilities in Oracle Database 11g r2
 

Recently uploaded

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 

Recently uploaded (20)

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 

Security in Oracle Database

  • 1. Database Security Course Tarbiat Modares Universisty Atousa Ahsani, Hanie Zolfi Professor: Dr.Sadegh Dorri Nogoorani Fall 2019 2019/12/30 Video Link: https://www.aparat.com/v/AP2NS SECURITY IN ORACLE
  • 2. 2 OVERVIEW  Introduction  PL/SQL  Pluggable Database Password Protection Virtual Private Database Access Control  DAC  MAC (OLS) Transparent Data Encryption
  • 4. INTRODUCTION PL/SQL is an extension of Structured Query Language (SQL) that is used in Oracle. PL/SQL allows the programmer to write code in a procedural format. Similar to other database languages, it gives more control to the programmers by the use of loops, conditions and object- oriented concepts. 4
  • 5. PDB One or more PDBs together are called a container database (CDB). They are completely transparent to the users and applications. 5 A Pluggable Database (PDB) is a portable collection of schemas, schema objects, and non schema objects that appear to an Oracle Net client as a separate database.
  • 7.  In a default installation, Oracle Database provides tow password verification functions to ensure that new or changed passwords are sufficiently complex.  You must manually enable password complexity checking.  You can further customize the complexity of your users' passwords  Passwords are case sensitive. For example, the password hPP5620qr fails if it is entered as hpp5620QR or hPp5620Qr  To verify the user's password and enforce case sensitivity in password creation, Oracle Database uses the 12C password version, which is based on a de-optimized algorithm that involves Password-Based Key Derivation Function (PBKDF2) and the SHA- 512 cryptographic hash functions 7 PASSWORD PROTECTION Password encryption Password complexity checking Enforced case sensitivity Password hashed using the 12C password version.  Oracle Database automatically and transparently encrypts passwords during network connections using AES.  You can enabled Advanced Security Option native network encryption or configure Secure Sockets Layer (SSL) encryption.
  • 9. Oracle Virtual Private Database (VPD) enables you to dynamically add a WHERE clause in any SQL statement that a user executes. The WHERE clause filters the data the user is allowed to access, based on the identity of a user. This feature restricts row and column level data access by creating a policy that enforces a WHERE clause for all SQL statements that query the database. 9 VIRTUAL PRIVATE DATABASE
  • 11. ACCESS CONTROL  discretionary access control  Implementations With owner  GRANT privileges ON object TO user;  REVOKE privileges ON object FROM user;  Oracle Label Security (OLS) provides row-level security for your database tables.  Can be accomplished by assigning security labels  you can use OLS to assign specific users authorization for specific rows, based on these labels.  OLS compares the label of the data row with the security clearance of the user to determine whether the user is allowed access to the data in the row. 11 MAC(OLS)DAC
  • 12. EMPLOYEESTABLE Id first_name last_name department salary ols_label 101 Harry Hill IT 600 S 102 Vik Reeves STAFF 300 UC 103 Bob Mortimer SEC 1000 TS 104 Paul Whitehouse EDU 500 C 105 Harry Enfield Staff 350 UC 9 Bill Security level = S John Security level = C
  • 13. 13 OLS VS VPD Use case: Web based systems or any application needs to allow user based access to content OLS Row Level Security, based on user credentials VPD Similar to Row Level Security Without adding extra column to table Use case Web based systems or any application needs to allow user based access to content
  • 15. 15 TRANSPARENT DATA ENCRYPTION Encrypting data includes the following components:  An algorithm to encrypt the data  A key to encrypt and decrypt data Transparent Data Encryption enables you to encrypt individual table columns or an entire tablespace. When a user inserts data into an encrypted column, Transparent Data Encryption automatically encrypts the data. When authorized users select the column, then the data is automatically decrypted.
  • 16. IMPLEMENTATION 16  PASSWORD PROTECTION  VIRTUAL PRIVATE DATABASE  ORACLE LABEL SECURITY(OLS)  TRANSPARENT DATA ENCRYPTION