Book Image

Oracle Autonomous Database in Enterprise Architecture

By : Bal Mukund Sharma, Krishnakumar KM, Rashmi Panda
Book Image

Oracle Autonomous Database in Enterprise Architecture

By: Bal Mukund Sharma, Krishnakumar KM, Rashmi Panda

Overview of this book

Oracle Autonomous Database (ADB) is built on the world’s fastest Oracle Database Platform, Exadata, and is delivered on Oracle Cloud Infrastructure (OCI), customer data center (ExaCC), and Oracle Dedicated Region Cloud. This book is a fast-paced, hands-on introduction to the most important aspects of OCI Autonomous Databases. You'll get to grips with concepts needed for designing disaster recovery using standby database deployment for Autonomous Databases. As you progress, you'll understand how you can take advantage of automatic backup and restore. The concluding chapters will cover topics such as the security aspects of databases to help you learn about managing Autonomous Databases, along with exploring the features of Autonomous Database security such as Data Safe and customer-managed keys for Vaults. By the end of this Oracle book, you’ll be able to build and deploy an Autonomous Database in OCI, migrate databases to ADB, comfortably set up additional high-availability features such as Autonomous Data Guard, and understand end-to-end operations with ADBs.
Table of Contents (13 chapters)
Part 1 – Understanding Autonomous Database in OCI
Part 2 – Migration and High Availability with Autonomous Database
Part 3 – Security and Compliance with Autonomous Database

Security Features in Autonomous Database

Security is always one of the high-priority topics to discuss in terms of the cloud environment. With respect to Autonomous Database, it is very interesting to discuss the security aspects to understand how security is managed automatically. Since an autonomous database is a self-driven database, it’s also exciting to see how it automatically ensures the database is safe from all outside attacks. In this chapter, we are going to discuss Autonomous Database infrastructure security, and then security related to data management such as Data Safe and Activity Auditing. Let’s discuss all the security topics in detail one by one.

The agenda of this chapter includes the following topics:

  • Operating system access restriction
  • Security Assessment
  • Data Discovery
  • Data Masking and Activity Auditing
  • Customer-managed keys with Autonomous Database

Let’s begin!