Professional Documents
Culture Documents
Russ Lowenthal
Database Security Product Management
Questions
Questions?
Attack Network
Target Data
Applications Copies
Assess Data
Assess the current state of the In this case, data is stored in a
database database. Your organizations most
valuable asset, but also a source of
significant risk.
Detect Data
Detect attempts to access data, & Users
especially attempts that violate Users
policy
Users and applications connect
to your database to perform
Prevent authorized business functions
Users
Privilege Analysis **
Network Encryption
Network Encryption
Database Security Assessment
Tool (DBSAT)
Database
Password Discipline Auditing Assess Overall Security
Strong Authentication
Applications Data Safe * Identify Users and their
Entitlements
Discover Sensitive Data
*
Included with Database Cloud, additional cost on-premises Database Security Controls
** Assess Prevent Detect
Only available with Enterprise Edition
5 Copyright © 2020, Oracle and/or its affiliates
Maximum Security Architecture
Data Redaction
Users
Database Firewall
Network Encryption
Alerts
Transparent Oracle Test Dev
Reports Data Encryption Key Vault
Data Masking and Subsetting
Audit Data & Event
Data Safe
Policies Logs
Questions?