oracle security presentation

79
ORACLE SECURITY Francisco Munoz Alvarez Oracle ACE Director President CLOUG, LAOUC & NZOUG IOUC LA Spokesperson 8/9/10g/11g OCP, RAC OCE, AS OCA, E-Business OCP, SQL/PLSQL OCA, Oracle 7 OCM Oracle 7, 11GR2 & OVM 3.1 Beta Tester ITIL Certified 2010 Oracle Ace Director of the year by Oracle Magazine Blog: http://oraclenz.wordpress.com - Email: [email protected] Twitter : fcomunoz Oracle Professional Services Manager Revera www.revera.co.nz

Upload: francisco-munoz-alvarez

Post on 04-Jun-2015

399 views

Category:

Technology


0 download

DESCRIPTION

Some tips and ideas to secure your Oracle Database

TRANSCRIPT

Page 1: Oracle Security Presentation

ORACLE SECURITY

Francisco Munoz Alvarez Oracle ACE Director

President CLOUG, LAOUC & NZOUG

IOUC LA Spokesperson

8/9/10g/11g OCP, RAC OCE, AS OCA, E-Business OCP, SQL/PLSQL OCA, Oracle 7 OCM

Oracle 7, 11GR2 & OVM 3.1 Beta Tester

ITIL Certified

2010 Oracle Ace Director of the year by Oracle Magazine

Blog: http://oraclenz.wordpress.com - Email: [email protected] – Twitter : fcomunoz

Oracle Professional Services Manager

Revera

www.revera.co.nz

Page 2: Oracle Security Presentation

ORACLE SECURITY TIPS

By:

Francisco Munoz Alvarez

APAC OTN Tour 2012

Page 3: Oracle Security Presentation

DBIS - Copyright 2010 3

Born here Grow up here

Got Married Here Mature

here Now Living here

Page 4: Oracle Security Presentation

The Rule:

“The most important rule with respect to data is to never put yourself into an unrecoverable situation.”

The importance of this guideline cannot be stressed enough, but it does not mean that you can never use time saving or performance enhancing options.

Page 5: Oracle Security Presentation

5

Always Try it Before!

When it comes to theory, “NEVER” believe anything you hear

or read until you have tried it yourself.

Page 6: Oracle Security Presentation

6

Page 7: Oracle Security Presentation

7

Backup, Backup &

Backup

Why? Because bad stuff

happens…

Page 8: Oracle Security Presentation

Information Security Has Changed

Page 9: Oracle Security Presentation

Hacking Steps

Page 10: Oracle Security Presentation

OFFICIAL STATISTICS from Secret Service Germany

Page 11: Oracle Security Presentation

SOME SHORT FACTS

Page 12: Oracle Security Presentation

HIGH SCORE LIST

Page 13: Oracle Security Presentation

2007/2008 SHOPPING LIST

Page 14: Oracle Security Presentation

CRISIS SHOPPING LIST 2009

Page 15: Oracle Security Presentation

CONCLUSION

Page 16: Oracle Security Presentation

Oracle Security Solutions

Page 17: Oracle Security Presentation

Oracle Security Solutions

Page 18: Oracle Security Presentation

Oracle Security Components

Page 19: Oracle Security Presentation

DB ENVIRONMENT

Page 20: Oracle Security Presentation

Security Data in Rest/Access Control

Page 21: Oracle Security Presentation

WHAT IS ASO?

Page 22: Oracle Security Presentation

What Security Problems does ASO solve?

Page 23: Oracle Security Presentation

ASO BENEFITS

Page 24: Oracle Security Presentation

TDE – Transparent Data Encryption

Page 25: Oracle Security Presentation

TDE – Transparent Data Encryption

Page 26: Oracle Security Presentation

TDE – Transparent Data Encryption

Page 27: Oracle Security Presentation

SECURING DATA IN MOTION

Page 28: Oracle Security Presentation

NETWORK ENCRYPTION

Page 29: Oracle Security Presentation

SECURING BACKUP

Page 30: Oracle Security Presentation

SECURING BACKUP Examples

Page 31: Oracle Security Presentation

DATAMASKING

Page 32: Oracle Security Presentation

WHAT IS DATAMASKING?

Page 33: Oracle Security Presentation

PREVENT MODIFICATIONS BY UNAUTHORIZED USERS

Page 34: Oracle Security Presentation

WHAT IS DATA VAULT?

Page 35: Oracle Security Presentation

DATA VAULT HELP TO SOLVE:

Page 36: Oracle Security Presentation

DATA VAULT Vs VPD and OLS

Page 37: Oracle Security Presentation

DATABASE VAULT Realms and Rule

Page 38: Oracle Security Presentation

DATA VAULT REPORTS

Page 39: Oracle Security Presentation

DATA VAULT EXAMPLES

Page 40: Oracle Security Presentation

HIGHLY SECURED ENVIROMENTS AUDIT VALT

Page 41: Oracle Security Presentation

AUDIT VAULT EXAMPLES

Page 42: Oracle Security Presentation

AUDIT VAULT REPORTS Who, What, When, Where

Page 43: Oracle Security Presentation

AUDIT VAULT DASHBOARD

Page 44: Oracle Security Presentation

AUDIT VAULT SUMMARY

Page 45: Oracle Security Presentation

27 Security Tips

Page 46: Oracle Security Presentation

Some Oracle Security Tips

1) Grant privileges only to a user or application which requires the privilege to accomplish necessary work. Excessive granting of unnecessary privileges can compromise security.

Page 47: Oracle Security Presentation

Some Oracle Security Tips

2)No administrative functions are to be performed by an application. For example create user, delete user, grant role, grant object privileges, etc.

Page 48: Oracle Security Presentation

Some Oracle Security Tips

3) Privileges for schema or database owner objects should be granted via a role and not explicitly. Do not use the “ALL” option when granting object privileges, instead specify the exact privilege needed, such as select, update, insert, delete.

Page 49: Oracle Security Presentation

Some Oracle Security Tips

4)Password protected roles may be implemented to allow an application to control access to its data. Thereby, end users may not access the application’s data from outside the application.

Page 50: Oracle Security Presentation

Some Oracle Security Tips

5)Access to Administrative or System user accounts should be restricted to authorized DBAs.

Page 51: Oracle Security Presentation

Some Oracle Security Tips

6) Do not grant system supplied database roles. These roles may have administrative privileges and the role privileges may change with new releases of the database.

Page 52: Oracle Security Presentation

Some Oracle Security Tips

7) Database catalog access should be restricted. Example: Use “USER_VIEWS” instead of “DBA_VIEWS” for an Oracle database.

Page 53: Oracle Security Presentation

Some Oracle Security Tips

8) Privileges granted to PUBLIC are accessible to every user and should be granted only when necessary.

Page 54: Oracle Security Presentation

Some Oracle Security Tips

9) Any password stored by applications in the database should be encrypted.

Page 55: Oracle Security Presentation

Some Oracle Security Tips

10) Applications should not “DROP”, “CREATE” or “ALTER” objects within the application.

Page 56: Oracle Security Presentation

Some Oracle Security Tips

11) Utilize the shared database infrastructure to share cost whenever possible.

Page 57: Oracle Security Presentation

Some Oracle Security Tips

12) Applications should not access the database with the same security as the owner of the database objects. For example on SQL Server do not grant the “dbowner” role and on Oracle do not use the Schema userid to connect to the database. Setup another userid with the necessary privileges to run the application.

Page 58: Oracle Security Presentation

Some Oracle Security Tips

13) Database integrity should be enforced on the database using foreign keys not in the application code. This helps prevent code outside the application from creating orphan records and/or invalid data.

Page 59: Oracle Security Presentation

Some Oracle Security Tips

14) Do not hard code username and passwords in the application source code.

• Sqlplus /nolog @myscript

– Create a password file (.password) fmunoz evelyn scott tiger

– Create a shell script getpwd.sh fgrep $1 $HOME/tools/.password | cut –d “ “ –f2 – Use the script and the password file

Getpwd.sh fmunoz | sqlplus –s fmunoz @script

• RMAN rman target /

connect catalog user/pwd@catdb

Page 60: Oracle Security Presentation

Some Oracle Security Tips

15) Protect your Listener :

– LSNRCTL> Set Current Listener <ip_address>

– LSNRCTL> Set rawmode on

– LSNRCTL> Services

– LSNRCTL> Stop

– LSNRCTL> Set startup_waittime 20

– LSNRCTL> Set logfile redo01a

– LSNRCTL> Set log_directory ‘/u01/app/oracle/redo’

Page 61: Oracle Security Presentation

Some Oracle Security Tips

15) Protect your Listener (Cont.):

– Disable online modifications • LSNRCTL> Admin_restrictions _<listener_name>=ON

– Set Password (<= 9i) • LSNRCTL> Change_password

• LSNRCTL> Save_config

– Disable OS Authentication • LOCAL_OS_AUTHENTICATION_<Listener_name>=OFF

Page 62: Oracle Security Presentation

Some Oracle Security Tips

16) Ensure external users have the least privilege possible.

Page 63: Oracle Security Presentation

Some Oracle Security Tips

17) Have a clear and well documented Backup and Recovery Strategy

Page 64: Oracle Security Presentation

Some Oracle Security Tips

18) Implement an strong password policy (user profile) and force all users to change their passwords constantly .

Page 65: Oracle Security Presentation

Some Oracle Security Tips

19) All important passwords need to be saved in a safe and replaced when changed.

Page 66: Oracle Security Presentation

Some Oracle Security Tips

20) Install only what’s really required.

Page 67: Oracle Security Presentation

Some Oracle Security Tips

21) Implement Audit, soon or later you will be ask to tell who changed that. Please, implement a purge strategy.

Page 68: Oracle Security Presentation

Some Oracle Security Tips

22) Create promotion procedures (DEV->TEST->PROD), lock your production environment and test environment. Don’t forget to implement and document a change register.

Page 69: Oracle Security Presentation

Some Oracle Security Tips

23) Implement an Indirect Login Policy

– Each user have their own login account

– Allow connections to oracle account (OS) only thru sudo

– This will leaves an audit trail of actions

#sudo –u oracle sqlplus / as sysdba

Page 70: Oracle Security Presentation

Some Oracle Security Tips

24) Prevent SYSDBA connection – Sqlplus / as sysdba

• Change SQLNET.ORA SQLNET.AUTHENTICATION_SERVICES=(NONE)

Page 71: Oracle Security Presentation

Some Oracle Security Tips

25) Avoid Risk Connections (Ext. Procedures) – Listener.ora

• (ADDRESS_LIST =

(ADDRESS = (PROTOCOL = IPC)

(KEY = EXTPROC))

Remove this lines, or move to a different listener

Page 72: Oracle Security Presentation

Some Oracle Security Tips

26) Enable Data Dictionary Protection

Oracle Recommends that customers implement data dictionary protection to prevent

users who have the “ANY” system privileges to modify or harm the Oracle data dictionary.

Set 07_DICTIONARY_ACCESSIBILITY parameter to FALSE.

Page 73: Oracle Security Presentation

Some Oracle Security Tips

27) Create your own metadata repository.

Use datapump for this

$ expdp user/password content=metadata_only full=y

directory=datapump dumpfile=metadata_24112010.dmp

$ impdp user/password directory=datapump dumpfile=

metadata_24112010.dmp sqlfile=metadata_24112010.sql

Page 74: Oracle Security Presentation

PROGRAM

The Oracle ACE Program is designed to recognize and reward members of the

Oracle Technology and Applications communities for their contributions to those

communities. These individuals are technically proficient (when applicable) and

willingly share their knowledge and experiences.

The program comprises two levels: Oracle ACE and Oracle ACE Director.

The former designation is Oracle's way of saying "thank you" to community

contributors for their efforts; we (and the community) appreciate their

enthusiasm. The latter designation is for community enthusiasts who not only

share their knowledge (usually in extraordinary ways), but also want to increase

their community advocacy and work more proactively with Oracle to find

opportunities for the same. In this sense, Oracle ACE is "backward looking" and

Oracle ACE Director is "forward looking."

Page 75: Oracle Security Presentation

PROGRAM

Page 76: Oracle Security Presentation

PROGRAM

Page 77: Oracle Security Presentation

PROGRAM

Page 78: Oracle Security Presentation

Questions?

Page 79: Oracle Security Presentation

Thank you !