售 价:¥
温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印
为你推荐
Oracle Database 12c Security Cookbook
Oracle Database 12c Security Cookbook
Credits
About the Authors
About the Reviewers
www.PacktPub.com
eBooks, discount offers, and more
Why subscribe?
Instant updates on new Packt books
Preface
What this book covers
What you need for this book
Who this book is for
Sections
Getting ready
How to do it…
How it works…
There's more…
See also
Conventions
Reader feedback
Customer support
Downloading the example code
Errata
Piracy
Questions
1. Basic Database Security
Introduction
Creating a password profile
Getting ready
How to do it...
How it works...
There's more...
See also
Creating password-authenticated users
Getting ready
How to do it...
How it works...
There's more...
How to create a user using EM Express
See also
Changing a user's password
Getting ready
How to do it...
How it works...
There's more...
See also
Creating a user with the same credentials on another database
Getting ready
How to do it...
How it works...
There's more...
See also
Locking a user account
Getting ready
How to do it...
How it works...
See also
Expiring a user's password
Getting ready
How to do it...
How it works...
See also
Creating and using OS-authenticated users
Getting ready
How to do it...
How it works...
There's more...
Creating and using proxy users
Getting ready
How to do it...
How it works...
There's more...
Creating and using database roles
Getting ready
How to do it...
How it works...
There's more...
See also
The sysbackup privilege – how, when, and why should you use it?
Getting ready
How to do it...
Database authentication
OS authentication
How it works...
There's more...
See also
The syskm privilege – how, when, and why should you use it?
Getting ready
How to do it...
Database authentication
OS authentication
How it works...
There's more...
See also
The sysdg privilege – how, when, and why should you use it?
Getting ready
How to do it...
Database authentication
OS authentication
How it works...
There's more...
See also
2. Security Considerations in Multitenant Environment
Introduction
Creating a common user
Getting ready
How to do it...
How it works...
Rules/guidelines for creating and managing common users
There's more...
How to create a common user using OEM 12c
Creating a local user
Getting ready
How to do it...
How it works...
Rules/guidelines for creating and managing local users
There's more...
How to create a local user using OEM 12c
Creating a common role
Getting ready
How to do it...
How it works...
There's more...
How to create a common role using OEM 12c
Creating a local role
Getting ready
How to do it...
How it works...
There's more...
How to create a local role using OEM 12c
Granting privileges and roles commonly
Getting ready
How to do it...
How it works...
Granting privileges and roles locally
Getting ready
How to do it...
How it works...
Effects of plugging/unplugging operations on users, roles, and privileges
Getting ready
How to do it...
How it works...
3. PL/SQL Security
Introduction
Creating and using definer's rights procedures
Getting ready
How to do it...
How it works...
Creating and using invoker's right procedures
Getting ready
How to do it...
How it works...
There's more...
Using code-based access control
Getting ready
How to do it...
How it works...
There's more...
Restricting access to program units by using accessible by
Getting ready
How to do it...
How it works...
4. Virtual Private Database
Introduction
Creating different policy functions
Getting ready
How to do it...
How it works...
There's more...
See also
Creating Oracle Virtual Private Database row-level policies
Getting ready
How to do it...
There's more...
See also
Creating column-level policies
Getting ready
How to do it...
How it works...
Creating a driving context
Getting ready
How to do it...
Creating policy groups
Getting ready
How to do it...
Setting context as a driving context
Getting ready
How to do it...
Adding policy to a group
Getting ready
How to do it...
Exempting users from VPD policies
Getting ready
How to do it...
5. Data Redaction
Introduction
Creating a redaction policy when using full redaction
Getting ready
How to do it...
How it works...
There's more...
How to change the default value
See also
Creating a redaction policy when using partial redaction
How to do it...
How it works...
There's more...
Creating a redaction policy when using random redaction
Getting ready
How to do it...
How it works...
Creating a redaction policy when using regular expression redaction
Getting ready
How to do it...
How it works...
Using Oracle Enterprise Manager Cloud Control 12c to manage redaction policies
Getting ready
How to do it...
Changing the function parameters for a specified column
Getting ready
How to do it...
Add a column to the redaction policy
Getting ready
How to do it...
How it works...
See also
Enabling, disabling, and dropping redaction policy
Getting ready
How to do it...
See also
Exempting users from data redaction policies
Getting ready
How to do it...
How it works...
6. Transparent Sensitive Data Protection
Introduction
Creating a sensitive type
Getting ready
How to do it...
How it works...
There's more...
Determining sensitive columns
Getting ready
How to do it...
How it works...
Creating transparent sensitive data protection policy
Getting ready
How to do it...
How it works...
See also
Associating transparent sensitive data protection policy with sensitive type
Getting ready
How to do it...
There's more...
See also
Enabling, disabling, and dropping policy
Getting ready
How to do it...
How it works...
There's more...
Altering transparent sensitive data protection policy
Getting ready
How to do it...
How it works...
See also
7. Privilege Analysis
Introduction
Creating database analysis policy
Getting ready
How to do it...
How it works...
There's more...
See also
Creating role analysis policy
Getting ready
How to do it...
There's more...
See also
Creating context analysis policy
Getting ready
How to do it...
There's more...
See also
Creating combined analysis policy
Getting ready
How to do it...
There's more...
See also
Starting and stopping privilege analysis
Getting ready
How to do it...
How it works...
There's more...
Reporting on used system privileges
Getting ready
How to do it...
There's more...
Reporting on used object privileges
Getting ready
How to do it...
There's more...
Reporting on unused system privileges
Getting ready
How to do it...
There's more...
Reporting on unused object privileges
Getting ready
How to do it...
There's more...
How to revoke unused privileges
How to do it...
There's more...
Dropping the analysis
Getting ready
How to do it...
There's more...
8. Transparent Data Encryption
Introduction
Configuring keystore location in sqlnet.ora
How to do it...
Creating and opening the keystore
Getting ready
How to do it...
How it works...
There's more...
Setting master encryption key in software keystore
Getting ready
How to do it...
There's more...
See also
Column encryption - adding new encrypted column to table
Getting ready
How to do it...
Column encryption - creating new table that has encrypted column(s)
Getting ready
How to do it...
Using salt and MAC
Getting ready
How to do it...
How it works...
There's more...
Column encryption - encrypting existing column
Getting ready
How to do it...
There's more...
Auto-login keystore
Getting ready
How to do it...
How it works...
Encrypting tablespace
Getting ready
How to do it...
How it works...
There's more...
Rekeying
Getting ready
How to do it...
How it works...
Backup and Recovery
How to do it...
There's more...
9. Database Vault
Introduction
Registering Database Vault
Getting ready
How to do it...
How it works...
There's more...
See also
Preventing users from exercising system privileges on schema objects
Getting ready
How to do it...
There's more...
See also
Securing roles
Getting ready
How to do it...
There's more...
See also
Preventing users from executing specific command on specific object
How to do it...
How it works...
Creating a rule set
Getting ready
How to do it...
There's more...
Creating a secure application role
How to do it...
There's more...
See also
Using Database Vault to implement that administrators cannot view data
How to do it...
There's more...
Running Oracle Database Vault reports
How to do it...
Disabling Database Vault
How to do it...
Re-enabling Database Vault
How to do it...
10. Unified Auditing
Introduction
Enabling Unified Auditing mode
Getting ready
How to do it...
How it works...
Predefined unified audit policies
There's more...
See also
Configuring whether loss of audit data is acceptable
Getting ready
How to do it...
How it works...
Which roles do you need to have to be able to create audit policies and to view audit data?
Getting ready
How to do it...
How it works...
There's more...
Auditing RMAN operations
Getting ready
How to do it...
How it works...
See also
Auditing Data Pump operations
Getting ready
How to do it...
See also
Auditing Database Vault operations
Getting ready
How to do it...
How it works...
There's more...
See also
Creating audit policies to audit privileges, actions and roles under specified conditions
Getting ready
How to do it...
How it works...
See also
Enabling audit policy
Getting ready
How to do it...
How it works...
Finding information about audit policies and audited data
Getting ready
How to do it...
Auditing application contexts
Getting ready
How to do it...
How it works...
There's more...
See also
Purging audit trail
Getting ready
How to do it...
How it works...
There's more...
Disabling and dropping audit policies
Getting ready
How to do it...
How it works...
See also
11. Additional Topics
Introduction
Exporting data using Oracle Data Pump in Oracle Database Vault environment
Getting ready
How to do it...
How it works...
There's more...
See also
Creating factors in Oracle Database Vault
Getting ready
How to do it...
How it works...
There's more...
See also
Using TDE in a multitenant environment
Getting ready
How to do it...
How it works...
See also
12. Appendix – Application Contexts
Introduction
Exploring and using built-in contexts
Getting ready
How to do it...
How it works...
There's more...
See also
Creating an application context
Getting ready
How to do it...
How it works...
Setting application context attributes
Getting ready
How to do it...
How it works...
There's more...
See also
Using an application context
Getting ready
How to do it...
How it works...
See also
买过这本书的人还买过
读了这本书的人还在读
同类图书排行榜