Thursday, March 21, 2013

Security, Policies and Tips - Part 2

Dear Readers,

My name is Franz Devantier, creator of this blog.  I am an Oracle Certified Professional (OCP DBA 11g) Security DBA.  I will be sharing with you the basic duties of an Oracle DBA, and also some of the undocumented, and not so well known tasks. 

Security, Policies and Tips  -  Part 2
What Information Security Policies Can Include
 Firstly all the requirements that are appropriate for the specific environment must be addressed.  In addition there are technical measures that you can implement to address generic or documented issues.

Issues that Security Policies should address
Security Issue
Recommended Actions
Establishing and maintaining application level Security
Use privileges and roles, that are designed for the specific application and attach these roles and privileges to the application.  Ensure that these roles and privileges will not be abused by users, when they are not logged into the application.  The roles and privileges can be granted to specified users, connecting from a certain IP address or address range, or through a particular middle tier.
Manage system, Object, and User privileges and attributes
Only certain users should be permitted to access, process or alter data.  Only certain users should be allowed to execute a certain type of SQL statement, or to access another schemas objects.  Various limitations should be applied, on a users access to actions on schemas, tables, table rows(columns), and resources such as CPU time, connect time, Idle time etc.
Create, manage and control roles
Create roles, consisting of groups of privileges and other roles, that can be granted to users, preferably dynamically when authorized, and needed.
Fine Grained Access Control
You can securely store user- based attributes like username, employee Number etc, that can be retrieved in a user session to enable fine grained access control.  You can then create security policies and attach them to tables containing sensitive data, that are used by an application.  DML statements on such objects are then modified dynamically, and transparently to the user.  This scenario will prevent inappropriate access to the data.  You can enforce fine grained or label based access to data with policy functions or with data and user labels.  This configuration can quickly limit access to sensitive data with the minimal of programming required.
Establishing and managing encryption
Use SSL connections, preferably with PKI certificates for creitical or sensitive data transmissions, and application communications.
Setting up and maintaining security in 3-tier applications
You need to preserve the identity of the user, through the middle tier, and to the database.  Avoid the overhead of separate database connections, by for example proxying user identities and credentials (password, certificate, etc) through the middle tier and to the database.
Controlling of select / query access, and the misuse of the data.  Controlling intrusions.
You can monitor query access based on specific content or rows, in order to detect data misuse or intrusions.  Use proxy authentication to audit proxied user connections.  Use regular auditing, plus fine grained auditing to detect inappropriate access to the data or actions.



The above mentioned security practices and recommended actins can be implemented using the Oracle features, facilities and products.

Franz Devantier,
Need a database health check, or a security audit?
devantierf@gmail.com

Income stabilizer (win-win opportunity)
Join the carefully selected and tested cash-flow generating program below to potentially create a long-term residual or annuity type income enhancer for yourself.

Traffic Wave - Free Report:  The report will give you all the information you need to start making a nice long-term residual income stream for yourself.


No comments:

Post a Comment