1.08k likes | 2.1k Views
Oracle Audit Vault and Database Firewall: New Centralized Monitoring and Auditing Platform. Frank Yang APAC Database Security Product Manager.
E N D
Oracle Audit Vault and Database Firewall: New Centralized Monitoring and Auditing Platform Frank YangAPAC Database Security Product Manager
The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle.
Program Agenda • Why Database Monitoring and Auditing • Overview of Oracle Audit Vault and Database Firewall • Key Features • Successful Story • Summary • Q&A
Billions of Database Records Breached Globally 97% of Breaches Were Avoidable with Basic Controls 98% records stolen from databases 84% records breached using stolen credentials 71% fell within minutes 92% discovered by third party
Why are Databases so Vulnerable? 80% of IT Security Programs Don’t Address Database Security • Forrester Research “Enterprises are taking on risks that they may not even be aware of. Especially as more and more attacks against databases exploit legitimate access.” ? Database Security
Why Monitor Your Databases? Use Cases • Monitor Database activity without impacting your Database • Detect actions of malicious outsiders and insiders • Protect against SQL injection attacks on applications • Enforce conformance to corporate security policy
Why Audit Your Databases? Use Cases • Collect comprehensive information about all relevant user activity • Who, what, when, where • Before/after values • Full execution and application context • Audit all pathways to the Database • SQL executed by stored procedures • Direct connections • Scheduled jobs • Operational activities
Oracle Database Security Solutions Defense-in-Depth for Maximum Security PREVENTIVE DETECTIVE ADMINISTRATIVE Encryption Activity Monitoring • Privilege Analysis Redaction and Masking Database Firewall Sensitive Data Discovery Privileged User Controls Auditing and Reporting Configuration Management
Oracle Database Security Solutions Detect and Block Threats, Alert, Audit and Report PREVENTIVE DETECTIVE ADMINISTRATIVE Encryption Activity Monitoring • Privilege Analysis Redaction and Masking Database Firewall Sensitive Data Discovery Privileged User Controls Auditing and Reporting Configuration Management
To fill a shape with an image. Use existing picture box, DO NOT delete and create new picture box. Right click on the shape. At the bottom of the submenu select “Format Shape” Select “Fill” at the top of the “Format Shape” dialog box. Select “Picture or Texture fill” from the options. And select “File” under the “Insert from” option. Navigate to the file you want to use and select “Insert” On the “Format” tab, in the Size group, click on “Crop to Fill” in the Crop tool and drag the image bounding box to the desired size DELETE THIS INSTRUCTION NOTE WHEN NOT IN USE IntroducingOracle Audit Vault and Database Firewall
Oracle Audit Vault and Database Firewall Detective/Preventive Control for Oracle and Non-Oracle Databases Users Applications Database Firewall Allow Log Alert Substitute Block Audit Vault Agent Firewall Events Auditor Reports Audit Data Alerts ! Security Manager Policies OS, Directory Services, File system & Custom Audit Logs Audit Vault
Oracle Audit Vault and Database Firewall SQL Injection Protection with Positive Security Model SELECT * from stock where catalog-no='PHE8131' White List Allow Block SELECT * from stock where catalog-no=‘' union select cardNo,0,0 from Orders --’ Applications Databases • “Allowed” behavior can be defined for any user or application • Automated white list generation for any application • Out-of-policy database transaction detected and blocked/alerted
Oracle Audit Vault and Database Firewall Enforcing Database Activity with Negative Security Model SELECT * FROM v$session Black List Block DBA activity from Application? SELECT * FROM v$session Allow + Log DBA activity from Approved Workstation • Stop specific unwanted SQL interactions, user or schema access • Blacklisting can be done on factors such as time of day, day of week, network, application, user name, OS user name etc • Provide flexibility to authorized users while still monitoring activity
Oracle Audit Vault and Database Firewall • Comprehensive Enterprise Audit and Log Consolidation • Databases: Oracle, SQL Server, DB2 LUW, Sybase ASE,MySQL • New Audit Sources • Operating Systems: Microsoft Windows, Solaris ,Linux • Directory Services: Active Directory • File Systems: Oracle ACFS • Audit Collection Plugins for Custom Audit Sources • XML file maps custom audit elements to canonical audit elements • Collect and map data from XML audit file and database tables
Oracle Audit Vault and Database FirewallAudit and Event Repository • Based on proven Oracle Database technology • Includes compression, partitioning, scalability, high availability, etc. • Open schema for flexible reporting • Information lifecycle management for target specific data retention • Centralized web console for easy administration • Command line utility for automation and scripting
Oracle Audit Vault and Database FirewallAudit and Event Data Security • Software appliance based on hardened OS and pre-configured database • Fine-grained administrative groups • Sources can be grouped for access authorization • Individual auditor reports limited to data from the ‘grouped’ sources • Separation of duties • Powerful multi-event alerting with thresholds and group-by
Oracle Audit Vault and Database FirewallPerformance and Scalability • Audit Vault • Supports monitoring and auditing multiple hundreds of heterogeneous database and non-database targets • Supports wide range of hardware to meet load requirements • Database Firewall • Decision time is independent of the number of rules in the policy • Multi-device / multi-process / multi-core scalability • 8 core can handle between 30K – 60K transactions/second
Oracle Audit Vault and Database FirewallSingle Administrator Console
Oracle Audit Vault and Database FirewallOut-of-the Box Compliance Reporting
Oracle Audit Vault and Database FirewallReport with Data from Multiple Source Types
Oracle Audit Vault and Database Firewall Auditing Stored Procedure Calls – Not Visible on the Network
Oracle Audit Vault and Database FirewallExtensive Audit Details
Oracle Audit Vault and Database FirewallBlocking SQL Injection Attacks
Oracle Audit Vault and Database FirewallPowerful Alerting Filter Conditions
Oracle Audit Vault and Database Firewall Flexible Deployment Architectures In-Line Blocking and Monitoring Audit Vault Standby Audit Vault Primary Remote Monitoring Out-of-Band Monitoring Applications and Users HA Mode Inbound SQL Traffic Audit Agents Audit Data Software Appliances
T-Mobile Protecting Customer Data in Oracle and non-Oracle Databases • Provider of wireless voice, messaging, and data services throughout the U.S. • Fourth largest wireless company in the U.S. with more than 35 million subscribers • Industry: Telecom
SquareTwo Financial Addresses Regulatory Compliance, Enables Separation of Duties • Leader in $100 billion asset recovery and management industry • Partner Network used by Fortune 500 companies in banking, credit card, and health care • Industry: Financial Services
Audit Vault and Database Firewall Summary • A comprehensive platform for monitoring and auditing • Supports multiple deployment modes • Powerful out of the box and custom reports • Enterprise scalability and performance • Soft-appliance packaging • Supports Oracle and non-Oracle