Dear Readers,
My name is Franz Devantier, creator of this blog. I am an Oracle Certified
Professional (OCP DBA 11g) Security DBA.
I will be sharing with you the basic duties of an Oracle DBA, and also
some of the undocumented, and not so well known tasks.
I will make a deal with you: If you refer me to a company that needs
database support, from a few hours per week to full time, and I am able to sign
a contract with them.
Then I will give you 10% of the monthly
contract or deal price every month. When
the contract ends, and we re-sign the contract, I will again give you 10% of
the monthly contract price. This will go
on until the company no longer employs or contracts me or my agents to look
after their databases.
I can do this, because that 10% is my
marketing budget. When we re-sign the
contract, in the future, it may depend on you giving the thumbs up again, and
that is worth 10% of the monthly contract price, to be given to you as
commission.
Security
Policies - Part 7
Auditing Policy
Security administrators should define a policy for the
auditing procedures of each database.
You may for example, elect to have database auditing disabled, unless
questionable activities are suspected.
When auditing is required, you must decide on what level of
detail to audit the database. Usually
general system auditing is followed by more specific types of auditing after
the origins and the areas of the suspicious activity have been determined. In addition to standard database auditing,
Oracle Database server supports fine-grained auditing using policies that can
monitor multiple specific objects, columns, and statements, including INDEX.
A Security Checklist
Security of information and the
privacy and protection of corporate assets and data are of pivotal importance
in any business. Oracle database
addresses the need for information security by by offering features such as
Deep Data Protection, Auditing, Scalable Security, Secure Hosting and Data
Exchange.
The Oracle database server leads
the industry in security. In order to
maximize the security features offered by Oracle, it is very important that the
database itself be well-protected.
Proper use of the security features, plus adherence to the basic
security practices will help protect your data investment from threats and
attacks.
You should adhere to the
recommended industry standard security practices, for operational database
deployments. Consider all the paths that
the data travels and assess the threats that impinge on each path and
node. Take steps to minimize or
eliminate the threats, and to minimize the consequences of a successful breach
of security.
Monitoring and auditing to detect
increased threat levels or successful penetration, increases the overall
security and subsequent losses. Monitor
to find the weak spots, and audit to analyze what happened, so that the weak
spots can be closed, and the damage inflicted by them minimized.
Franz Devantier,
Need a database health check, or a security audit?
devantierf@gmail.com
Classifieds
No comments:
Post a Comment