Book Image

Oracle Database 12c Security Cookbook

By : Zoran Pavlovic, Maja Veselica
Book Image

Oracle Database 12c Security Cookbook

By: Zoran Pavlovic, Maja Veselica

Overview of this book

Businesses around the world are paying much greater attention toward database security than they ever have before. Not only does the current regulatory environment require tight security, particularly when dealing with sensitive and personal data, data is also arguably a company’s most valuable asset - why wouldn’t you want to protect it in a secure and reliable database? Oracle Database lets you do exactly that. It’s why it is one of the world’s leading databases – with a rich portfolio of features to protect data from contemporary vulnerabilities, it’s the go-to database for many organizations. Oracle Database 12c Security Cookbook helps DBAs, developers, and architects to better understand database security challenges. Let it guide you through the process of implementing appropriate security mechanisms, helping you to ensure you are taking proactive steps to keep your data safe. Featuring solutions for common security problems in the new Oracle Database 12c, with this book you can be confident about securing your database from a range of different threats and problems.
Table of Contents (18 chapters)
Oracle Database 12c Security Cookbook
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface

Reporting on used system privileges


In this recipe, you'll view collected data about the usage of system privileges during a capture interval.

Getting ready

You'll need an existing user who can create a privilege analysis policy (has the CAPTURE_ADMIN role and the SELECT ANY DICTIONARY privilege), for example, the SYSTEM user.

How to do it...

  1. Connect to the database as system or a user who has appropriate privileges:

    $ sqlplus system
    
  2. View system privileges that the user ALAN used:

    Figure 37 - The used system privileges

  3. View grant path for the used system privileges generated by ALL_PRIV_POL for the user ALAN:

    Figure 38 - The Grant path

There's more...

In EM 12c, after you have generated the report, select the policy and from Actions drop-down menu, select Reports. The Usage Summary report will open (see Figure 39).

Figure 39 - Usage Summary

Click on the tab Used and choose All for Match radio button, Policy: ALL_PRIV_POL, User Name: ALAN, and click on the Search button. Results are shown in Figure...