39
Oracle Database Security Mythbusting Don’t Be Afraid to Use Something You Already Own, or Try Something New February 2011 Bob Bocchino, CISA ERM Don Shepherd, CISSP Security and Compliance Business Advisor Security Solution Specialist IBU T h l Gl b lB i U it N th A i T h l O i ti 1 Industries Business Unit, Technology Global Business Unit IBU T echnology Global Business Unit North American T echnology Organization

Oracle Database Security Mythbusting

  • Upload
    others

  • View
    16

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Oracle Database Security Mythbusting

Oracle Database Security MythbustingDon’t Be Afraid to Use Something You Already Own, or Try Something New g y , y gFebruary 2011

Bob Bocchino, CISA ERM Don Shepherd, CISSPSecurity and Compliance Business Advisor Security Solution Specialist IBU T h l Gl b l B i U it N th A i T h l O i ti

1Industries Business Unit, Technology Global Business Unit

IBU Technology Global Business Unit North American Technology Organization

Page 2: Oracle Database Security Mythbusting

2Industries Business Unit, Technology Global Business Unit

Page 3: Oracle Database Security Mythbusting

3Industries Business Unit, Technology Global Business Unit

Page 4: Oracle Database Security Mythbusting

Budget

Availability

Performance

Security

4Industries Business Unit, Technology Global Business Unit

y

Page 5: Oracle Database Security Mythbusting

Myth #1Network & Application Security

Protects My DataProtects My Data

5Industries Business Unit, Technology Global Business Unit

Page 6: Oracle Database Security Mythbusting

Information Security Focus

Network Application Identity Database

6Industries Business Unit, Technology Global Business Unit

Network Application Identity Database

Page 7: Oracle Database Security Mythbusting

Willie Sutton – Bank Robber$2 million stolen between 1920’s and 1952$2 million stolen between 1920’s and 1952

“Because that’s where the money is.”

Willie’s response to a question “Why do you rob banks?”

7Industries Business Unit, Technology Global Business Unit

Willie’s response to a question “Why do you rob banks?”

Page 8: Oracle Database Security Mythbusting

In other wordsIn other words ….

8Industries Business Unit, Technology Global Business Unit

Page 9: Oracle Database Security Mythbusting

9

Page 10: Oracle Database Security Mythbusting

10

Page 11: Oracle Database Security Mythbusting

What are the High Value Target S ?Systems?

11From a study conducted by the Verizon RISK team in conjunction with the US Secret Service

Page 12: Oracle Database Security Mythbusting

Concentrate on the Greatest Risk

T f H ki / P t f B h d R d

12From a study conducted by the Verizon RISK team in conjunction with the US Secret Service

Types of Hacking / Percent of Breached Records

Page 13: Oracle Database Security Mythbusting

13

Page 14: Oracle Database Security Mythbusting

Address the REAL Threat

Lock the DatabaseLock the Databaseat different levels

14

Page 15: Oracle Database Security Mythbusting

Myth #2I Have to Buy Something Extra to Protect My Oracle Databaseto Protect My Oracle Database

15Industries Business Unit, Technology Global Business Unit

Page 16: Oracle Database Security Mythbusting

16Industries Business Unit, Technology Global Business Unit

Page 17: Oracle Database Security Mythbusting

Security Access ControlsSecurity Access Controls

Encryption Toolkit

Standard and Fine Grained Auditing

Virtual Private Database

17

Page 18: Oracle Database Security Mythbusting

Encryption Myths

18Industries Business Unit, Technology Global Business Unit

Page 19: Oracle Database Security Mythbusting

Myth #3Encrypting Data Makes

Databases UnusableDatabases Unusable

19Industries Business Unit, Technology Global Business Unit

Page 20: Oracle Database Security Mythbusting

RealityReality

20Industries Business Unit, Technology Global Business Unit

Page 21: Oracle Database Security Mythbusting

Myth #4Encryption Requires Application ChangesApplication Changes

21Industries Business Unit, Technology Global Business Unit

Page 22: Oracle Database Security Mythbusting

RealityReality

22Industries Business Unit, Technology Global Business Unit

Page 23: Oracle Database Security Mythbusting

Myth #5All Encryption is Created Equal

23Industries Business Unit, Technology Global Business Unit

Page 24: Oracle Database Security Mythbusting

RealityReality

24Industries Business Unit, Technology Global Business Unit

Page 25: Oracle Database Security Mythbusting

Auditing Myths

25Industries Business Unit, Technology Global Business Unit

Page 26: Oracle Database Security Mythbusting

Myth #6Native Auditing Brings My

Database to its KneesDatabase to its Knees

26Industries Business Unit, Technology Global Business Unit

Page 27: Oracle Database Security Mythbusting

RealityReality

27Industries Business Unit, Technology Global Business Unit

Page 28: Oracle Database Security Mythbusting

Access Control Myths

28Industries Business Unit, Technology Global Business Unit

Page 29: Oracle Database Security Mythbusting

Myth #7Database Level Access Control

is Hard to Deployis Hard to Deploy

29Industries Business Unit, Technology Global Business Unit

Page 30: Oracle Database Security Mythbusting

RealityReality

30Industries Business Unit, Technology Global Business Unit

Page 31: Oracle Database Security Mythbusting

Myth #8Privileged User Access Controls

Stop DBAs from Doing Their JobsStop DBAs from Doing Their Jobs

31Industries Business Unit, Technology Global Business Unit

Page 32: Oracle Database Security Mythbusting

RealityReality

32Industries Business Unit, Technology Global Business Unit

Page 33: Oracle Database Security Mythbusting

Mythbusting Summary

Native Options

Encryption Programming Toolkit –DBMS_CRYPTO

Transparent Data Encryption_ yp

Access Control Native Database Access Controlincluding Virtual Private Database

Database Vault

Database

Audit Standard Database Audit and Fine Grained Audit

Audit VaultFine Grained Audit

33

Page 34: Oracle Database Security Mythbusting

34Industries Business Unit, Technology Global Business Unit

Page 35: Oracle Database Security Mythbusting

California Senate Bill 1386California Senate Bill 1386Security Breach Notification

Any agency that owns or licenses computerized data that includes personal information shall disclose any breach of the security of the system following discovery or notification of the breach in the security of the data to any resident of California whose unencrypted personal information was, orCalifornia whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person.

35Industries Business Unit, Technology Global Business Unit

Page 36: Oracle Database Security Mythbusting

HIPAA and HITECHHIPAA and HITECHSecurity Breach Notification

36Industries Business Unit, Technology Global Business Unit

Page 37: Oracle Database Security Mythbusting

37Industries Business Unit, Technology Global Business Unit

Page 38: Oracle Database Security Mythbusting

What Are Encryption and Data Masking?

Data Losses from Production, Back-Up, Development & PartnersDevelopment & Partners

No Disclosure Required

38Industries Business Unit, Technology Global Business Unit

Page 39: Oracle Database Security Mythbusting

Th k YThank You

39Industries Business Unit, Technology Global Business Unit