Monday, April 29, 2013

Security Policies - Part 7

Dear Readers,

My name is Franz Devantier, creator of this blog.  I am an Oracle Certified Professional (OCP DBA 11g) Security DBA.  I will be sharing with you the basic duties of an Oracle DBA, and also some of the undocumented, and not so well known tasks. 

I will make a deal with you:  If you refer me to a company that needs database support, from a few hours per week to full time, and I am able to sign a contract with them.
Then I will give you 10% of the monthly contract or deal price every month.  When the contract ends, and we re-sign the contract, I will again give you 10% of the monthly contract price.  This will go on until the company no longer employs or contracts me or my agents to look after their databases.
I can do this, because that 10% is my marketing budget.  When we re-sign the contract, in the future, it may depend on you giving the thumbs up again, and that is worth 10% of the monthly contract price, to be given to you as commission.


Security Policies  -  Part 7
Auditing Policy
Security administrators should define a policy for the auditing procedures of each database.  You may for example, elect to have database auditing disabled, unless questionable activities are suspected.

When auditing is required, you must decide on what level of detail to audit the database.  Usually general system auditing is followed by more specific types of auditing after the origins and the areas of the suspicious activity have been determined.  In addition to standard database auditing, Oracle Database server supports fine-grained auditing using policies that can monitor multiple specific objects, columns, and statements, including INDEX.

A Security Checklist
Security of information and the privacy and protection of corporate assets and data are of pivotal importance in any business.  Oracle database addresses the need for information security by by offering features such as Deep Data Protection, Auditing, Scalable Security, Secure Hosting and Data Exchange.

The Oracle database server leads the industry in security.  In order to maximize the security features offered by Oracle, it is very important that the database itself be well-protected.  Proper use of the security features, plus adherence to the basic security practices will help protect your data investment from threats and attacks.

You should adhere to the recommended industry standard security practices, for operational database deployments.  Consider all the paths that the data travels and assess the threats that impinge on each path and node.  Take steps to minimize or eliminate the threats, and to minimize the consequences of a successful breach of security.

Monitoring and auditing to detect increased threat levels or successful penetration, increases the overall security and subsequent losses.  Monitor to find the weak spots, and audit to analyze what happened, so that the weak spots can be closed, and the damage inflicted by them minimized.

Franz Devantier,
Need a database health check, or a security audit?
devantierf@gmail.com

No comments:

Post a Comment