Book Image

Oracle Database 12c Security Cookbook

By : Zoran Pavlovic, Maja Veselica
Book Image

Oracle Database 12c Security Cookbook

By: Zoran Pavlovic, Maja Veselica

Overview of this book

Businesses around the world are paying much greater attention toward database security than they ever have before. Not only does the current regulatory environment require tight security, particularly when dealing with sensitive and personal data, data is also arguably a company’s most valuable asset - why wouldn’t you want to protect it in a secure and reliable database? Oracle Database lets you do exactly that. It’s why it is one of the world’s leading databases – with a rich portfolio of features to protect data from contemporary vulnerabilities, it’s the go-to database for many organizations. Oracle Database 12c Security Cookbook helps DBAs, developers, and architects to better understand database security challenges. Let it guide you through the process of implementing appropriate security mechanisms, helping you to ensure you are taking proactive steps to keep your data safe. Featuring solutions for common security problems in the new Oracle Database 12c, with this book you can be confident about securing your database from a range of different threats and problems.
Table of Contents (18 chapters)
Oracle Database 12c Security Cookbook
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface

Introduction


Privilege analysis is a new security feature, introduced in Oracle Database 12c. It is only available in Oracle Database Enterprise Edition, and from licensing viewpoint, it is part of Oracle Database Vault option.

Privilege analysis is very useful to implement and maintain the least privilege principle by identifying both privileges that users are actually using (used privileges) and those that are only granted to them (unused privileges).

General steps to analyze privileges using this feature are shown in Figure 1.

Figure 1 - The steps to analyzethe used and unused privileges

In this chapter, it is assumed that all users have a create session privilege, and in the following table, other privileges and roles granted to the users and roles are listed:

USER/ROLE

HR.EMPLOYEES

OE.ORDERS

ROLES/SYS.PRIVS.

BARBARA

P1_ROLE

NICK

DBA

ALAN

SELECT, INSERT, UPDATE, DELETE

STEVE

P2_ROLE

P1_ROLE

SELECT

P2_ROLE

SELECT, INSERT, UPDATE, DELETE

SELECT ANY TABLE, CREATE...