<h4>Best Practices for Comprehensive Oracle Database Security</h4> <p>Written by renowned experts from Oracle's National Security Group, <i>Oracle Database 12c Security</i> provides proven techniques for designing, implementing, and certifying secure Oracle Database systems in a multitenant archite
Oracle database 12c security
β Scribed by Gaetjen, Scott; Knox, David Christopher; Maroulis, William
- Publisher
- McGraw-Hill Education
- Year
- 2015
- Tongue
- English
- Leaves
- 549
- Series
- Database & ERP - OMG
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Best Practices for Comprehensive Oracle Database Security
Written by renowned experts from Oracle's National Security Group, Oracle Database 12c Security provides proven techniques for designing, implementing, and certifying secure Oracle Database systems in a multitenant architecture. The strategies are also applicable to standalone databases. This Oracle Press guide addresses everything from infrastructure to audit lifecycle and describes how to apply security measures in a holistic manner. The latest security features of Oracle Database 12c are explored in detail with practical and easy-to-understand examples.
- Connect users to databases in a secure manner
- Manage identity, authentication, and access control
- Implement database application security
- Provide security policies across enterprise applications using Real Application Security
- Control data access with Oracle Virtual Private Database
- Control sensitive data using data redaction and transparent sensitive data protection
- Control data access with Oracle Label Security
- Use Oracle Database Vault and Transparent Data Encryption for compliance, cybersecurity, and insider threats
- Implement auditing technologies, including Unified Audit Trail
- Manage security policies and monitor a secure database environment with Oracle Enterprise Manager Cloud Control
β¦ Table of Contents
Content: 1) Database Vault for privileged users/objects/commands 2) Separation of Duties 3) Virtual Private Database for row/column/cell security 4) Label based access control 5) Secure Application Context 6) Sensitive data discovery 7) Least privilege analysis 8) Multi-factor auditing and redaction 9) Real Application Security 10) Code-based access control (CBAC) associates privileges with code 11) Transparent Sensitive Data Protection associates policies with sensitive columns
β¦ Subjects
Oracle (Computer file);Database security
π SIMILAR VOLUMES
Written by Oracle insiders, this indispensable guide distills an enormous amount of information about the Oracle Database into one compact volume. Ideal for novice and experienced DBAs, developers, managers, and users, Oracle Essentials walks you through technologies and features in Oracleβs product
Written by Oracle insiders, this indispensable guide distills an enormous amount of information about the Oracle Database into one compact volume. Ideal for novice and experienced DBAs, developers, managers, and users, Oracle Essentials walks you through technologies and features in Oracleβs product
Protecting Oracle Database 12c helps you solve the problem of maximizing the safety, resilience, and security of an Oracle database whilst preserving performance, availability, and integration. The book demonstrates through coded examples how to enable the consolidation features of Oracle Database 1
Protecting Oracle Database 12c helps you solve the problem of maximizing the safety, resilience, and security of an Oracle database whilst preserving performance, availability, and integration despite ongoing and new security issues in the software. The book demonstrates, through coded examples, how