You are on page 1of 2

book

review
Security, Audit and Control
Features: Oracle Database
Security, Audit and Control Features: Oracle Assessors must understand the relationship
Database 3rd Edition aims to assist assessors of the operating system, database server and
in reviewing the security of an Oracle database network environment and how they interact
environment. This book is an ideal handbook for with each other to determine whether data are
auditors, database administrators (DBAs) and sufficiently protected. This book explains that
security practitioners who would like detailed insight DBAs need to work with application developers
on Oracle database security. and security architects to develop a database
encryption strategy that meets the security needs
The book covers technical topics such as the of the enterprise. The assessor should review
Oracle database architecture, operating system applications, database design documentation and
controls, auditing and logging, network security, interview management to understand what sensitive
and the new security features covered in data are used by the applications and stored in the
Oracle 10g and 11g. Topics such as automated applications’ database. In addition, the book covers
assessment tools, enterprise resource how encryption can protect highly
planning (ERP), customer relationship confidential information from being
management (CRM) architectures and misused by DBAs and unauthorized
interfaces with legacy systems are persons. The transparent data
covered in this book. It is intended encryption (TDE) feature, for example,
to guide the assessor through a which forms part of Oracle advanced
comprehensive evaluation of security security for the 10g database version,
for an Oracle database based on provides column-based encryption for
business objectives and risk, and it sensitive fields.
equips the reader with the knowledge
and tools to effectively audit the latest Effectively managing security
Oracle database environments. privileges and access controls in
the Oracle database is paramount
The objective of the book is to provide in securing the database. Strong
the reader with a practical, real-world user access control is, therefore, a
approach to auditing Oracle database security fundamental component of a good security model.
in line with the policies, standards and technical Access security must be flexible enough to control
controls of an organization. It recommends a risk- different types of user access, including DBAs. This
based IT audit approach based on the COBIT® book explains DBA secure-access control practices
4.1 framework. The technical features provided from the assessor point of view as the assessor has
by Oracle enforce the COBIT® framework control the “keys to the kingdom,” so it is very important to
objectives in addition to policies, standards, have controls in place.
management commitment, people and processes.
Reviewed by Ravi Ayappa, Ph.D., CISA, CRISC, CISM
The book explains the Oracle database architecture Who is currently a principal security consultant with Cognizant Technology
at a high level and explains the components that Solutions based in the United States. Over the last 25 years of his career, he
exist on a system and the technical risk factors has worked in the domains of governance, risk and compliance consulting;
associated with the system. The audit planning Internet of Things security; infrastructure security; application security;
process includes understanding the business, business continuity planning; disaster recovery; and information and
architecture and technology risk; determining the communications technology security in Asia, Europe and the United States
risk profile; and developing the test plan. across various industries, including the military. He is also a volunteer
instructor for certification courses at the ISACA® Detroit (Michigan, USA)
Chapter.

ISACA JOURNAL VOL 6 1


©2017 ISACA. All rights reserved. www.isaca.org
Vendors managing databases should be bound Key general control environment areas that should
by service-level agreements (SLAs) that address be reviewed to help ensure a protected Oracle
security requirements, which should be reviewed system, including change management,
by the assessors for acceptable use. Security, Audit information classifications, segregation of duties,
and Control Features: Oracle Database 3rd Edition system development life cycle, incident response,
explains the procedure for emergency access, how vulnerability and patch management, and
to handle generic accounts, password controls and monitoring backup and recovery processes are
resource limits. covered in this book.

Auditing helps monitor the database to detect This book discusses in detail the importance
unauthorized activity that may occur. An Oracle of using secure web-facing applications since
database provides the capability to perform vulnerable and insecure applications could be
granular auditing over any database object or action a backdoor entry to data theft despite having a
performed by a user on the system. The various audit secure Oracle configuration. Tools available in
options are explained in detail in the book. the market that can assess the logical security of
the databases are also discussed. An audit plan
This book covers the issue of identifying weak public, and internal control questionnaire developed and
private and global database links. It outlines the risk reviewed with regard to COBIT®, key issues and
associated with insecure links and actions that can components are enumerated in detail in this book.
be taken to mitigate this risk. Network security is an
important component of an overall Oracle security The authors of Security, Audit and Control Features:
strategy. This book has a chapter on network security, Oracle Database 3rd Edition are successful in
and that chapter is designed to help the assessor providing high-level guidance to assess security
understand network risk associated with the Oracle controls in Oracle databases.
database. The Transparent Network Substrate (TNS)
listener authenticates remote clients to the server Editor’s Note
and is the first interface for an attacker wishing to
compromise the Oracle database, so its configuration Security, Audit and Control Features:
needs to be secured. Oracle database servers should Oracle Database 3rd Edition is available from
reside in a protected database tier in the internal the ISACA® Bookstore. For information, visit
network and should never be accessible from the www.isaca.org/bookstore, contact support
public Internet. at https://support.isaca.org/ or
call +1.847.660.5650.
The book explains how Oracle advanced security
can be used for encrypting network traffic among
clients, database servers and application servers.
Oracle Net Manager can be used to manage
Oracle advanced security settings for Oracle
clients and servers, including configuration options
for authentication, integrity, encryption and SSL
security. Centralized user management can be
implemented using OID, which can be configured to
authorize user connections using LDAP-, Kerberos-
or secure sockets layer (SSL)-based authentication.

ISACA JOURNAL VOL 6 2


©2017 ISACA. All rights reserved. www.isaca.org

You might also like