Oracle Database 10g Release 2 Defense-In-Depth Security: An Oracle White Paper August 2005
Oracle Database 10g Release 2 Defense-In-Depth Security: An Oracle White Paper August 2005
Defense-In-Depth Security
An Oracle White Paper
August 2005
Oracle Database 10g Release 2 Security
Defense-In-Depth Security
INTRODUCTION
Information theft is big business in the 21st century and the battle between those
who work to protect data and those who wish to steal it is intensifying and the
stakes have never been higher. Over the past ten years numerous regulations have
emerged which attempt to address internal controls and the protection of
personally identifiable information (PII). Examples of such regulations in the
Organizations today
United States include Sarbanes-Oxley, HIPAA and California SB 1386 and the EU
realize the internal threat
can be just as great or
Directive on Privacy and Electronic Communications in Europe. Organizations
greater than the external today realize the internal threat can be just as great or greater than the external
threat. threat. Worse yet, gaining access to a cache of personal data such as social security
numbers is like breaking into Fort Knox for an identity thief. Recent crimes have
targeted organizations whose business model is to collect and maintain personal
information. Preventing and detecting unauthorized usage of data requires far
more security than just good authentication and authorization management. To the
extent possible, administration and maintenance must be delegated and behavior
outside an area of responsibility must be monitored. However, the problem of
abuse within a role or responsibility can be challenging to detect and prevent as
well. While there is no easy answer, applications can be built based upon industry
standard security principles such as defense-in-depth, least privilege and trust but
verify.
DEFENSE-IN-DEPTH
Over the past 25 plus years Oracle has built powerful security solutions into the
Security must be part of the Oracle database enabling customers to deploy a defense in depth strategy and
planning process from day one of enforce the principle of least privilege. There is no single security solution that will
the application development provide absolute protection. Security must be part of the planning process from
process.
day one of the application development process. Security must be taken into
consideration from the web client to middle tier to the backend database. In
addition, it's important to remember that threats to data security from within
should be taken just as seriously as those coming from the outside.
Proxy Authentication
Oracle proxy authentication was introduced in Oracle8i to address the one big user
Traditionally n-tier applications problem in n-tier application models. Traditionally n-tier applications have
have authenticated end users to authenticated end users to the middle tier and then connected to the backend
the middle tier and then connected database as one big user. The problem with this approach is that accountability is
to the backend database as one
lost at the middle tier. Proxy authentication enables a middle tier or client
big user
application to authenticate and then proxy to another account within the database
without re-authenticating.
Oracle Database 10g Release 2 provides significant enhancements to the Oracle
proxy capability by integrating proxy technology with command line tools such as
SQL*Plus and integrating proxy authorization with Oracle enterprise user security.
For example, using the WIDGET application as an example, application DBA's
could be managed within Oracle Identity Management and given the authorization
to proxy to an account within the database that has been assigned the
WIDGET_DBA role while still authenticating with their own credentials to the
Oracle database.
Encryption
Over the past few years a great deal of attention has been given to encryption as a
solution to the problem of identity theft and protection of personally identifiable
Encryption is an important tool
information (PII). Encryption is an important tool in the arsenal to protect
in the arsenal to protect
sensitive information.
sensitive information. However, its not a magic bullet and shouldn't be used in
place of strong access controls and the principle of least privilege. Oracle provides
robust enterprise wide authorization management capabilities with Oracle Identity
Management and strong enforcement within the Oracle database. Remember, just
because it's encrypted doesn't mean access should be granted. When talking about
encryption it's important to distinguish between network encryption and database
Remember, just because encryption. Network encryption refers to the encryption of data traveling between
it's encrypted doesn't computers. Database encryption refers to the encryption of information stored
mean access should be within the database and stored on disk. Oracle Database 10g Release 2 introduces
granted a powerful new feature for database encryption called Transparent Data Encryption
to protect sensitive information on backup media and disk drives.
Database Encryption
Perhaps the most important new feature in Oracle Database 10g Release 2 is the
Transparent data encryption addition of Transparent Data Encryption (TDE) to the Oracle Advanced Security
sets the standard for database option. Oracle can now transparently encrypt data on the network and inside the
encryption by tightly coupling
database. TDE sets the standard for database encryption by tightly coupling
encryption with the database
encryption with the database to provide a highly transparent encryption solution to
to provide a highly
transparent encryption
protect sensitive data written to disk or backup media. Social security numbers,
solution to protect sensitive credit card numbers and other personally identifiable information (PII) can be
data written to disk or backup easily encrypted without breaking the existing application. Most encryption
media. solutions require specific calls to encryption functions within the application code
plus the creation of addition views inside the database. This is expensive and time
consuming because it requires extensive understanding of an application as well as
the ability to write and maintain software. Most organizations don't have the time
or expertise to modify existing applications to make calls to encryption routines. In
addition, the task of retrofitting an existing application with encryption is manual
and error prone. With TDE existing applications and backup routines will
continue to work with the added assurance that sensitive data is encrypted on the
backup tapes.
In addition, it's possible with TDE to have the database up and running for
maintenance and disable access to sensitive data from a DBA. This can be done
In addition, it's possible with
because the master key used to encrypt and decrypt information is stored outside
TDE to have the database up and
running for maintenance and
the Oracle database in an object known as an Oracle Wallet. The Wallet contains
disable access to sensitive data the master key and must be opened before encrypted data can be accessed. The
from a DBA. password for the Wallet can be separate from the system or DBA password.
Therefore the regular DBA may be able to startup the database, but without the
CONCLUSION - DEFENSE-IN-DEPTH
Historically security has been focused on the perimeter and keeping the bad guys
out. However, over the past few years the focus has shifted to the Intranet and
While the vast majority of internal security. While the vast majority of employees are trustworthy and strive to
employees are trustworthy and
contribute to the overall success of an organization, one employee can wreak havoc
strive to contribute to the overall
success of an organization, one
on corporate strategy and image. In addition, there are individuals and companies
employee can wreak havoc on who seek personal gain by to exploiting the information they gain through
corporate strategy and image seemingly legitimate partnerships or business relationships. Oracle Database 10g
Release 2 raises database security technology to a new level. Oracle's decade long
commitment to independent security evaluations, coupled with Oracle's 25 plus
years working with security conscious customers has enabled Oracle to establish
itself as the database security leader. Oracle Transparent Data Encryption makes
the practical application of encryption within a database cost effective. Robust
support for row level security, integrated identity management capabilities, fine-
grained auditing, data classification/label security, proxy authentication, PKI
support, Virtual Private Database are just a few of the technologies available with
Oracle Database 10g Release 2. In addition, the capabilities in the Oracle Database
10g Release 2 are ideally suited for meeting the privacy and compliance challenges
in today's global economy. Oracle Database 10g Release 2 has robust identity
management integration capabilities providing huge cost savings by dramatically
reducing the complexity of managing application users. Oracle is an ideal platform
on which to build and deploy secure applications for today's complex, Internet-
connected world.
Oracle Corporation
World Headquarters
500 Oracle Parkway
Redwood Shores, CA 94065
U.S.A.
Worldwide Inquiries:
Phone: +1.650.506.7000
Fax: +1.650.506.7200
oracle.com