Oracle Database Security Defense-in-Depth

21 downloads 67 Views 1MB Size Report
2. . Agenda. • Today's Threat Landscape. • Defense-in- Depth Approach. • Oracle Database Security Solutions. • Summary ...
Oracle Database Security Defense-in-Depth Nguyen Quang Huy Senior Solution Consulting Manager

Agenda

• • • •

Today’s Threat Landscape Defense-in-Depth Approach Oracle Database Security Solutions Summary

2

Security Technologies Deployed

End Point Security

Other Security

Employee email Security

Customer

Vulnerability Mgmt

Citizen Network Security

DB Security?

Authentication

Identity Management

3

How Data Gets Compromised? Source: Verizon 2010 Data Breach Investigations Report

4

4

Where Losses Come From?

92% of Records from Compromised Databases

2010 Data Breach Investigations Report

5

Top Attack Techniques % Breaches and % Records

2010 Data Breach Investigations Report

Most records lost through ‘Stolen Credentials” & “SQL Injection” 6

Oracle Database Security Defense-in-Depth Encryption and Masking • Oracle Advanced Security • Oracle Secure Backup • Oracle Data Masking

Access Control • Oracle Database Vault • Oracle Label Security

Auditing and Tracking • Oracle Audit Vault • Oracle Configuration Management • Oracle Total Recall

Monitoring and Blocking • Oracle Database Firewall

7

Oracle Database Security Defense-in-Depth

Encryption and Masking • Oracle Advanced Security • Oracle Secure Backup • Oracle Data Masking

8

8

Oracle Advanced Security End–to–end Encryption Disk

Backups

Exports

Application

Off-Site Facilities

• Efficient encryption of all application data • Built-in key lifecycle management • No application changes required • Works with Exadata and Oracle Advanced Compression

9

Oracle Advanced Security What’s New and Coming?

• Hardware Acceleration Support – Performance already < 10% for most applications – 7-10x performance gain with Intel Advanced Encryption Standard New Instructions (AES-NI) and Oracle SPARC T-3

• Key Management and HSM Support – Certified with SafeNet, Thales, Utimaco using PKCS #11 – Planned support for Oracle’s Key Management System

10

Oracle Data Masking Irreversible De-Identification

Production

Non-Production

LAST_NAME

SSN

SALARY

LAST_NAME

SSN

SALARY

AGUILAR

203-33-3234

40,000

ANSKEKSL

111—23-1111

40,000

BENSON

323-22-2943

60,000

BKJHHEIEDK

222-34-1345

60,000

• Mask sensitive data for test and partner systems • Sophisticated masking: Condition-based, compound, deterministic • Extensible template library and policies for automation • Leverage masking templates for common data types • Integrated masking and cloning • Masking of heterogeneous databases via database gateways New • Command line support for data masking tasks New 11

11

Oracle Data Masking What’s Coming?

• Sensitive data identification based on privacy attributes • Application Masking templates for • E-Business Suite • Fusion Applications 12

Oracle Database Security Defense-in-Depth

Encryption and Masking • Oracle Advanced Security • Oracle Secure Backup • Oracle Data Masking

Access Control • Oracle Database Vault • Oracle Label Security

13

13

Oracle Database Vault Separation of Duties & Privileged User Controls

Procurement

DBA HR

Application Finance select * from finance.customers

• Restricts application data from privileged users • DBA separation of duties • Securely consolidate application data • No application changes required • Works with Oracle Exadata 14

14

Oracle Database Vault Multi-Factor Access Control Policy Enforcement

Procurement HR

Application

Rebates

• Protect application data and prevent application by-pass • Enforce who, where, when, and how using rules and factors • • • •

User Factors: Name, Authentication type, Proxy Enterprise Identity Network Factors: Machine name, IP, Network Protocols Database Factors: IP, Instance, Hostname, SID Runtime Factors: Date, Time

15

15

Oracle Database Vault Out-of-the Box Protections For Applications • Pre-built policies with further possible customization

Oracle E-Business Suite 11i / R12

• Complements application security

PeopleSoft Applications

• Transparent to existing applications • Minimal performance overhead • Certifications Underway:

Siebel, i-Flex, Retek JD Edwards EnterpriseOne

– Oracle Hyperion – Oracle Tax and Utilities

SAP Infosys Finacle

16

16

Oracle Label Security Data Classification for Access Control

Sensitive Transactions

Confidential Report Data

Public Reports

Confidential

Sensitive

• Classify users and data based on business drivers • Database enforced row level access control • Users classification through Oracle Identity Management Suite • Classification labels can be factors in Database Vault

17

17

Oracle Database Security Defense-in-Depth

Encryption and Masking • Oracle Advanced Security • Oracle Secure Backup • Oracle Data Masking

Access Control • Oracle Database Vault • Oracle Label Security

Auditing and Tracking • Oracle Audit Vault • Oracle Configuration Management • Oracle Total Recall

18

18

Oracle Audit Vault Automated Audit Collection and Reporting

!

HR Data

Built-in Reports

CRM Data

ERP Data

Alerts

Audit Data

Custom Reports Policies

Databases

Auditor

• Consolidate audit data into a secure warehouse • Create/customize compliance and entitlement reports • Detect and raise alerts on suspicious activities • Centralized audit policy management • Integrated audit trail cleanup 19

19

Oracle Configuration Management Secure Configuration & Change Tracking Out-of-box Policies

User-defined Policies & Groups

3

3

Real-Time Change Detection

Industry & Regulatory Frameworks

Compliance Dashboard

3

3

3

Optimized for Oracle with Industry Specific Compliance Dashboards

• Continuous scanning against best practices and gold baselines • 200+ out-of-the-box policies spanning host, database, and middleware • Real-time detect changes to processes, files, etc • Violations can trigger emails, and create tickets • Compliance reports mapped to compliance frameworks

20

20

Oracle Database Security Defense-in-Depth Encryption and Masking • Oracle Advanced Security • Oracle Secure Backup • Oracle Data Masking

Access Control • Oracle Database Vault • Oracle Label Security

Auditing and Tracking • Oracle Audit Vault • Oracle Configuration Management • Oracle Total Recall

Monitoring and Blocking • Oracle Database Firewall

21

Oracle Database Firewall First Line of Defense Allow Log Alert Substitute

Applications

Block

Alerts

Built-in Reports

Custom Reports

Policies

• Prevent unauthorized activity, application bypass and SQL injections • Highly accurate SQL grammar based analysis • Flexible enforcement options • Built-in and custom compliance reports

22

Oracle Database Firewall Security Model

White List Allow Applications

Block

• White-list based policies enforce normal or expected behavior • Evaluate factors such as time, day, network, app, etc. • Easily generate white-lists for any application • Log, alert, block or substitute out-of-policy SQL statements • Black lists to stop unwanted SQL commands, user, or schema access • Superior performance and policy scalability based upon clustering

23

Oracle Database Firewall Reporting • Database Firewall log data consolidated into reporting database

Oracle Database Firewall

• Over 130 built in reports that can be modified and customized • Entitlements reporting for database attestation and audit Oracle Database Firewall

Oracle Database Firewall

• Database activity and privileged user reports • Supports demonstrating PCI, SOX, HIPAA/HITECH, etc. controls • Optional database activity masking

24

Oracle Database Security – Big Picture

Audit consolidation

Allow

Procurement Sensitive

Log Alert Substitute

Applications

HR Confidential Rebates Public

Unauthorized Local Activity DB Consolidation Security Local DBA Privilege Mis-Use

Block

Network SQL Monitoring and Blocking

Encrypted Database

Encrypted Encrypted Backups Exports

Data Masking

25

Oracle Database Security Key Differentiators

26

For More Information

search.oracle.com

database security

oracle.com/database/security

27

27