الخميس، 14 مايو 2015

Training On Demand - Using Oracle Database Vault with Oracle Database 12c

Written by Maria Billings, SeniorPrincipal Curriculum Developer

Do you want to advance your career, but never know beforehand when you might have time fortraining?

Try Oracle University’s Training On Demand or TOD curriculum. You can watch recordedclassroom and hands-on sessions in smaller or larger increments as it fits intoyour schedule.

For Database Vault

Doyou sometimes need to prove that you couldn't possibly have seen confidentialinformation, although you are a highly privileged DBA? Didyou know that the Oracle Database 12chas a Database Vault option already installed, ready to be enabled, if yourorganization decides to use it? Whatis Database Vault? DatabaseVault TOD Trainingis composed of several components, including realms, rule sets, command rules,secure application roles and factors that can be highly customized or simplyused out-of-the box.

A realm, for example, is a zone of protection for tables, roles, and packages.A realm protects the objects in it from users exercising system privileges,such as SELECT ANY TABLE. So, any such privileged user must be defined as arealm participant (or have a realm-participating role that is granted to him orher) to access the protected objects.

If you are not a realm participant or owner, you can show that a query of arealm-protected table will result in the "ORA-01031: insufficientprivileges" error. In short, you can prove you couldn't have possiblyseen the confidential content.

The course "UsingOracle Database Vault with Oracle Database 12c" TOD training goes into all the necessary details toshow you:

Howto reduce the attack surface for potential security breaches through limitingprivileges. Howto perform security analysis and report security vulnerabilities. Howto configure and maintain Database Vault elements. Howto implement best practices, which begins by identifying YOUR securityrequirements. You can then see samples of building and documenting security implementations, andyou view or discuss sample use cases, such as the workflow of an applicationDBA, dual key security, dynamic auditing, and so on.

Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable{mso-style-name:"Table Normal";mso-tstyle-rowband-size:0;mso-tstyle-colband-size:0;mso-style-noshow:yes;mso-style-priority:99;mso-style-qformat:yes;mso-style-parent:"";mso-padding-alt:0in 5.4pt 0in 5.4pt;mso-para-margin-top:0in;mso-para-margin-right:0in;mso-para-margin-bottom:10.0pt;mso-para-margin-left:0in;line-height:115%;mso-pagination:widow-orphan;font-size:11.0pt;font-family:"Calibri","sans-serif";mso-ascii-font-family:Calibri;mso-ascii-theme-font:minor-latin;mso-hansi-font-family:Calibri;mso-hansi-theme-font:minor-latin;}

ليست هناك تعليقات:

إرسال تعليق