This guide demonstrates how to secure sensitive data and comply with internal and eternal audit regulations using Oracle 10g and 11g. It provides the hands-on guidance required to understand the complex options provided by Oracle and the know-how to choose the best option for a particular case. The book presents specific sequences of actions that should be taken to enable, configure, or administer security-related features. It includes best practices in securing Oracle and on Oracle security options and products. By providing specific instructions and examples this book bridges the gap between the individuals who install and configure a security feature and those who secure and audit it.
Inhaltsverzeichnis
Introduction
Hardening Oracle 10g and 11g
Securing the Listener
Account Security
Oracle Wallet and PKI
Authentication
Encrypting of Data-in-Transit and Message Integrity
Encrypting Data-at-Rest
Standard Auditing
Administrator Auditing
Fine Grained Auditing (FGA)
Change Auditing and Before/After Values
Oracle Audit Vault
Audit Architectures and Best Practices
Authorization
Virtual Private Database
Oracle Database Vault