You are on page 1of 9

Maximum Security Architecture

Securing data at its source

Russ Lowenthal
Database Security Product Management
Questions

Questions?

Copyright © 2020, Oracle and/or its affiliates


How Do Hackers Attack the Database?

Users Exploit Database


Attack Users

Attack Network

Target Data
Applications Copies

Attack Apps System, Application and


Database Admins NAMES
ADDRESSES
CREDIT CARDS
HEALTH RECORD
OTHER PII
SECRETS

Bypass Database Test Dev


Database Clones
Attack Admins

3 Copyright © 2020, Oracle and/or its affiliates


Security Zones of Control

Assess Data
Assess the current state of the In this case, data is stored in a
database database. Your organizations most
valuable asset, but also a source of
significant risk.
Detect Data
Detect attempts to access data, & Users
especially attempts that violate Users
policy
Users and applications connect
to your database to perform
Prevent authorized business functions

Prevent inappropriate or out of


policy access to data
4 Copyright © 2020, Oracle and/or its affiliates
Centrally Managed Users **
Baseline Security Enterprise User Security **

Users

Privilege Analysis **

Network Encryption
Network Encryption
Database Security Assessment
Tool (DBSAT)
Database
Password Discipline Auditing Assess Overall Security
Strong Authentication
Applications Data Safe * Identify Users and their
Entitlements
Discover Sensitive Data

*
Included with Database Cloud, additional cost on-premises Database Security Controls
** Assess Prevent Detect
Only available with Enterprise Edition
5 Copyright © 2020, Oracle and/or its affiliates
Maximum Security Architecture
Data Redaction

Users
Database Firewall

Network Encryption

Discover Sensitive Data


Applications
Database Vault
Virtual Private Database
Events Label Security
Real Application Security
DF11233 U*1
$5Ha1qui %H1
HSKQ112 A14
FASqw34 £$1
DF@£!1ah HH!
DA45S& DD1

Alerts
Transparent Oracle Test Dev
Reports Data Encryption Key Vault
Data Masking and Subsetting
Audit Data & Event
Data Safe
Policies Logs

Audit Vault Database Security Controls


Data Safe Assess Prevent Detect Data Driven Security

6 Copyright © 2020, Oracle and/or its affiliates


Questions

Questions?

Copyright © 2020, Oracle and/or its affiliates


Thank you
Russ Lowenthal
@RussLowenthal
russ.lowenthal@oracle.com

8 Copyright © 2020, Oracle and/or its affiliates

You might also like