‏إظهار الرسائل ذات التسميات Vault. إظهار كافة الرسائل
‏إظهار الرسائل ذات التسميات Vault. إظهار كافة الرسائل

الخميس، 14 مايو 2015

New Oracle Audit Vault and Database Firewall "Training On Demand" Available


Written by James Spiller, Senior Principal Curriculum Developer

Time is at a premium and learning what you need to know has to fit into your busy schedule. Training On Demand courses can help you meet your requirements. You can watch recorded classroom and hands-on sessions in whatever increments fit your schedule.

Oracle Audit Value and Database Firewall (AVDF)

Monitor database activity. Block threats. Audit efficiently across the enterprise.

So I ask you:

How are you managing audit requirements? Are you running reports that no one reviews? Are you unsure if the reports actually provide the information required for regulatory compliance? How would you know if you were a victim of an SQL injection attack? Are the failed SQL harmless user errors, or attempts to retrieve data outside the authorized limits?

The AVDF product provides the tools to answer these and other compliance questions. Furthermore, the AVDF protects your databases from malicious SQL, whether it comes from SQL injection or by passing the application.

The new "Oracle Audit Vault and Database Firewall" is broken into two modules:

1. The Install and Configure module is for the administrators, network, database and system responsible for the installation, network, network configuration and maintenance.

2. The Policies and Reports module is for the auditors and security officers who create the policies, review the reports and respond to the alerts. The AVDF appliances are installed separately. The Audit Vault server may be deployed as a standalone, but the Database Firewall requires at least one Audit Vault server on the same management network.

Get Trained Now

The Oracle Audit Vault and Database Firewall: Install and Configure (AVDF) course explains how to install an Audit Vault appliance and Database Firewall appliance, configure these appliances in your network and perform administrative tasks. This course will help you learn how to set up backup targets, install agents, customize agents, configure high availability firewalls and determine where to place the firewall in the network, which depends on your requirement to monitor or block incoming SQL.

The Oracle Audit Vault and Database Firewall: Policies & Reports (AVDF) course describes the tasks usually expected of an auditor or security officer. In this course, learn how to create and deploy firewall policies, create and implement audit policies, generate, review and attest audit reports and create and review alerts.

Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable{mso-style-name:"Table Normal";mso-tstyle-rowband-size:0;mso-tstyle-colband-size:0;mso-style-noshow:yes;mso-style-priority:99;mso-style-qformat:yes;mso-style-parent:"";mso-padding-alt:0in 5.4pt 0in 5.4pt;mso-para-margin-top:0in;mso-para-margin-right:0in;mso-para-margin-bottom:10.0pt;mso-para-margin-left:0in;line-height:115%;mso-pagination:widow-orphan;font-size:10.0pt;font-family:"Times New Roman","serif";mso-fareast-font-family:"Times New Roman";}

Training On Demand - Using Oracle Database Vault with Oracle Database 12c

Written by Maria Billings, SeniorPrincipal Curriculum Developer

Do you want to advance your career, but never know beforehand when you might have time fortraining?

Try Oracle University’s Training On Demand or TOD curriculum. You can watch recordedclassroom and hands-on sessions in smaller or larger increments as it fits intoyour schedule.

For Database Vault

Doyou sometimes need to prove that you couldn't possibly have seen confidentialinformation, although you are a highly privileged DBA? Didyou know that the Oracle Database 12chas a Database Vault option already installed, ready to be enabled, if yourorganization decides to use it? Whatis Database Vault? DatabaseVault TOD Trainingis composed of several components, including realms, rule sets, command rules,secure application roles and factors that can be highly customized or simplyused out-of-the box.

A realm, for example, is a zone of protection for tables, roles, and packages.A realm protects the objects in it from users exercising system privileges,such as SELECT ANY TABLE. So, any such privileged user must be defined as arealm participant (or have a realm-participating role that is granted to him orher) to access the protected objects.

If you are not a realm participant or owner, you can show that a query of arealm-protected table will result in the "ORA-01031: insufficientprivileges" error. In short, you can prove you couldn't have possiblyseen the confidential content.

The course "UsingOracle Database Vault with Oracle Database 12c" TOD training goes into all the necessary details toshow you:

Howto reduce the attack surface for potential security breaches through limitingprivileges. Howto perform security analysis and report security vulnerabilities. Howto configure and maintain Database Vault elements. Howto implement best practices, which begins by identifying YOUR securityrequirements. You can then see samples of building and documenting security implementations, andyou view or discuss sample use cases, such as the workflow of an applicationDBA, dual key security, dynamic auditing, and so on.

Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable{mso-style-name:"Table Normal";mso-tstyle-rowband-size:0;mso-tstyle-colband-size:0;mso-style-noshow:yes;mso-style-priority:99;mso-style-qformat:yes;mso-style-parent:"";mso-padding-alt:0in 5.4pt 0in 5.4pt;mso-para-margin-top:0in;mso-para-margin-right:0in;mso-para-margin-bottom:10.0pt;mso-para-margin-left:0in;line-height:115%;mso-pagination:widow-orphan;font-size:11.0pt;font-family:"Calibri","sans-serif";mso-ascii-font-family:Calibri;mso-ascii-theme-font:minor-latin;mso-hansi-font-family:Calibri;mso-hansi-theme-font:minor-latin;}

Using Oracle Key Vault


Written by Maria Billings, Senior Principal Curriculum Developer

Security is an ongoing concern in the IT world. It's important to prove that reasonable precautions have been taken to secure data against potential attackers.

Encryption is a common way to do that, resulting in a proliferation of encryption keys, wallets, Java keystores, certificates and so on. To manage this multitude, Oracle Key Vault (OKV) provides a central software appliance. You can check YouTube for videos about which problems are being solved with this appliance.

In the Training On Demand course Using Oracle Key Vault, you'll dive into all the "How to" questions.

Learn To:

• Install and configure the central OKV software.
• Enroll database servers as "endpoints."
• Upload encryption keys for long-term retention.
• Rotate keys.
• Download keys.
• Use the direct connection between OKV and an Oracle Database 12c for TDE master keys.
• Back-up and restore OKV.

You learn this, and more, with the separation of administrative duties in place. Furthermore, you can provide positive proof of your adherence to security requirements with predefined reports and an automatic audit trail.

Preview Course
"Using Oracle Key Vault" TOD Course Description