万本电子书0元读

万本电子书0元读

顶部广告

Oracle Database 12c Security Cookbook电子书

售       价:¥

5人正在读 | 0人评论 9.8

作       者:Zoran Pavlović,Maja Veselica

出  版  社:Packt Publishing

出版时间:2016-06-01

字       数:114.6万

所属分类: 进口书 > 外文原版书 > 电脑/网络

温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(0条)
  • 读书简介
  • 目录
  • 累计评论(0条)
Secure your Oracle Database 12c with this valuable Oracle support resource, featuring more than 100 solutions to the challenges of protecting your data About This Book Explore and learn the new security features introduced in Oracle Database 12c, to successfully secure your sensitive data Learn how to identify which security strategy is right for your needs – and how to apply it Each ‘recipe’ provides you with a single step-by-step solution, making this book a vital resource, delivering Oracle support in one accessible place Who This Book Is For This book is for DBAs, developers, and architects who are keen to know more about security in Oracle Database 12c. This book is best suited for beginners and intermediate-level database security practitioners. Basic knowledge of Oracle Database is expected, but no prior experience of securing a database is required. What You Will Learn Analyze application privileges and reduce the attack surface Reduce the risk of data exposure by using Oracle Data Redaction and Virtual Private Database Control data access and integrity in your organization using the appropriate database feature or option Learn how to protect your databases against application bypasses Audit user activity using the new auditing architecture Restrict highly privileged users from accessing data Encrypt data in Oracle Database Work in a real-world environment where a multi-layer security strategy is applied In Detail Businesses around the world are paying much greater attention toward database security than they ever have before. Not only does the current regulatory environment require tight security, particularly when dealing with sensitive and personal data, data is also arguably a company’s most valuable asset - why wouldn’t you want to protect it in a secure and reliable databaseOracle Database lets you do exactly that. It’s why it is one of the world’s leading databases – with a rich portfolio of features to protect data from contemporary vulnerabilities, it’s the go-to database for many organizations. Oracle Database 12c Security Cookbook helps DBAs, developers, and architects to better understand database security challenges. Let it guide you through the process of implementing appropriate security mechanisms, helping you to ensure you are taking proactive steps to keep your data safe. Featuring solutions for common security problems in the new Oracle Database 12c, with this book you can be confident about securing your database from a range of different threats and problems. Style and approach Each chapter explains the different aspects of security through a series of recipes. Each recipe presents instructions in a step-by-step manner, supported by explanations of the topic.
目录展开

Oracle Database 12c Security Cookbook

Oracle Database 12c Security Cookbook

Credits

About the Authors

About the Reviewers

www.PacktPub.com

eBooks, discount offers, and more

Why subscribe?

Instant updates on new Packt books

Preface

What this book covers

What you need for this book

Who this book is for

Sections

Getting ready

How to do it…

How it works…

There's more…

See also

Conventions

Reader feedback

Customer support

Downloading the example code

Errata

Piracy

Questions

1. Basic Database Security

Introduction

Creating a password profile

Getting ready

How to do it...

How it works...

There's more...

See also

Creating password-authenticated users

Getting ready

How to do it...

How it works...

There's more...

How to create a user using EM Express

See also

Changing a user's password

Getting ready

How to do it...

How it works...

There's more...

See also

Creating a user with the same credentials on another database

Getting ready

How to do it...

How it works...

There's more...

See also

Locking a user account

Getting ready

How to do it...

How it works...

See also

Expiring a user's password

Getting ready

How to do it...

How it works...

See also

Creating and using OS-authenticated users

Getting ready

How to do it...

How it works...

There's more...

Creating and using proxy users

Getting ready

How to do it...

How it works...

There's more...

Creating and using database roles

Getting ready

How to do it...

How it works...

There's more...

See also

The sysbackup privilege – how, when, and why should you use it?

Getting ready

How to do it...

Database authentication

OS authentication

How it works...

There's more...

See also

The syskm privilege – how, when, and why should you use it?

Getting ready

How to do it...

Database authentication

OS authentication

How it works...

There's more...

See also

The sysdg privilege – how, when, and why should you use it?

Getting ready

How to do it...

Database authentication

OS authentication

How it works...

There's more...

See also

2. Security Considerations in Multitenant Environment

Introduction

Creating a common user

Getting ready

How to do it...

How it works...

Rules/guidelines for creating and managing common users

There's more...

How to create a common user using OEM 12c

Creating a local user

Getting ready

How to do it...

How it works...

Rules/guidelines for creating and managing local users

There's more...

How to create a local user using OEM 12c

Creating a common role

Getting ready

How to do it...

How it works...

There's more...

How to create a common role using OEM 12c

Creating a local role

Getting ready

How to do it...

How it works...

There's more...

How to create a local role using OEM 12c

Granting privileges and roles commonly

Getting ready

How to do it...

How it works...

Granting privileges and roles locally

Getting ready

How to do it...

How it works...

Effects of plugging/unplugging operations on users, roles, and privileges

Getting ready

How to do it...

How it works...

3. PL/SQL Security

Introduction

Creating and using definer's rights procedures

Getting ready

How to do it...

How it works...

Creating and using invoker's right procedures

Getting ready

How to do it...

How it works...

There's more...

Using code-based access control

Getting ready

How to do it...

How it works...

There's more...

Restricting access to program units by using accessible by

Getting ready

How to do it...

How it works...

4. Virtual Private Database

Introduction

Creating different policy functions

Getting ready

How to do it...

How it works...

There's more...

See also

Creating Oracle Virtual Private Database row-level policies

Getting ready

How to do it...

There's more...

See also

Creating column-level policies

Getting ready

How to do it...

How it works...

Creating a driving context

Getting ready

How to do it...

Creating policy groups

Getting ready

How to do it...

Setting context as a driving context

Getting ready

How to do it...

Adding policy to a group

Getting ready

How to do it...

Exempting users from VPD policies

Getting ready

How to do it...

5. Data Redaction

Introduction

Creating a redaction policy when using full redaction

Getting ready

How to do it...

How it works...

There's more...

How to change the default value

See also

Creating a redaction policy when using partial redaction

How to do it...

How it works...

There's more...

Creating a redaction policy when using random redaction

Getting ready

How to do it...

How it works...

Creating a redaction policy when using regular expression redaction

Getting ready

How to do it...

How it works...

Using Oracle Enterprise Manager Cloud Control 12c to manage redaction policies

Getting ready

How to do it...

Changing the function parameters for a specified column

Getting ready

How to do it...

Add a column to the redaction policy

Getting ready

How to do it...

How it works...

See also

Enabling, disabling, and dropping redaction policy

Getting ready

How to do it...

See also

Exempting users from data redaction policies

Getting ready

How to do it...

How it works...

6. Transparent Sensitive Data Protection

Introduction

Creating a sensitive type

Getting ready

How to do it...

How it works...

There's more...

Determining sensitive columns

Getting ready

How to do it...

How it works...

Creating transparent sensitive data protection policy

Getting ready

How to do it...

How it works...

See also

Associating transparent sensitive data protection policy with sensitive type

Getting ready

How to do it...

There's more...

See also

Enabling, disabling, and dropping policy

Getting ready

How to do it...

How it works...

There's more...

Altering transparent sensitive data protection policy

Getting ready

How to do it...

How it works...

See also

7. Privilege Analysis

Introduction

Creating database analysis policy

Getting ready

How to do it...

How it works...

There's more...

See also

Creating role analysis policy

Getting ready

How to do it...

There's more...

See also

Creating context analysis policy

Getting ready

How to do it...

There's more...

See also

Creating combined analysis policy

Getting ready

How to do it...

There's more...

See also

Starting and stopping privilege analysis

Getting ready

How to do it...

How it works...

There's more...

Reporting on used system privileges

Getting ready

How to do it...

There's more...

Reporting on used object privileges

Getting ready

How to do it...

There's more...

Reporting on unused system privileges

Getting ready

How to do it...

There's more...

Reporting on unused object privileges

Getting ready

How to do it...

There's more...

How to revoke unused privileges

How to do it...

There's more...

Dropping the analysis

Getting ready

How to do it...

There's more...

8. Transparent Data Encryption

Introduction

Configuring keystore location in sqlnet.ora

How to do it...

Creating and opening the keystore

Getting ready

How to do it...

How it works...

There's more...

Setting master encryption key in software keystore

Getting ready

How to do it...

There's more...

See also

Column encryption - adding new encrypted column to table

Getting ready

How to do it...

Column encryption - creating new table that has encrypted column(s)

Getting ready

How to do it...

Using salt and MAC

Getting ready

How to do it...

How it works...

There's more...

Column encryption - encrypting existing column

Getting ready

How to do it...

There's more...

Auto-login keystore

Getting ready

How to do it...

How it works...

Encrypting tablespace

Getting ready

How to do it...

How it works...

There's more...

Rekeying

Getting ready

How to do it...

How it works...

Backup and Recovery

How to do it...

There's more...

9. Database Vault

Introduction

Registering Database Vault

Getting ready

How to do it...

How it works...

There's more...

See also

Preventing users from exercising system privileges on schema objects

Getting ready

How to do it...

There's more...

See also

Securing roles

Getting ready

How to do it...

There's more...

See also

Preventing users from executing specific command on specific object

How to do it...

How it works...

Creating a rule set

Getting ready

How to do it...

There's more...

Creating a secure application role

How to do it...

There's more...

See also

Using Database Vault to implement that administrators cannot view data

How to do it...

There's more...

Running Oracle Database Vault reports

How to do it...

Disabling Database Vault

How to do it...

Re-enabling Database Vault

How to do it...

10. Unified Auditing

Introduction

Enabling Unified Auditing mode

Getting ready

How to do it...

How it works...

Predefined unified audit policies

There's more...

See also

Configuring whether loss of audit data is acceptable

Getting ready

How to do it...

How it works...

Which roles do you need to have to be able to create audit policies and to view audit data?

Getting ready

How to do it...

How it works...

There's more...

Auditing RMAN operations

Getting ready

How to do it...

How it works...

See also

Auditing Data Pump operations

Getting ready

How to do it...

See also

Auditing Database Vault operations

Getting ready

How to do it...

How it works...

There's more...

See also

Creating audit policies to audit privileges, actions and roles under specified conditions

Getting ready

How to do it...

How it works...

See also

Enabling audit policy

Getting ready

How to do it...

How it works...

Finding information about audit policies and audited data

Getting ready

How to do it...

Auditing application contexts

Getting ready

How to do it...

How it works...

There's more...

See also

Purging audit trail

Getting ready

How to do it...

How it works...

There's more...

Disabling and dropping audit policies

Getting ready

How to do it...

How it works...

See also

11. Additional Topics

Introduction

Exporting data using Oracle Data Pump in Oracle Database Vault environment

Getting ready

How to do it...

How it works...

There's more...

See also

Creating factors in Oracle Database Vault

Getting ready

How to do it...

How it works...

There's more...

See also

Using TDE in a multitenant environment

Getting ready

How to do it...

How it works...

See also

12. Appendix – Application Contexts

Introduction

Exploring and using built-in contexts

Getting ready

How to do it...

How it works...

There's more...

See also

Creating an application context

Getting ready

How to do it...

How it works...

Setting application context attributes

Getting ready

How to do it...

How it works...

There's more...

See also

Using an application context

Getting ready

How to do it...

How it works...

See also

累计评论(0条) 0个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部