The 10 Principles of Security in Modern Cloud Applications

Similar documents
with Oracle IDM Peter Heintzen, Sen. Mgr. Information Security Oracle

Database Centric Information Security. Speaker Name / Title

<Insert Picture Here> Oracle Database Security

Private Clouds: Opportunity to Improve Data Security and Lower Costs. InfoTRAMS Fusion Tematyczny, Bazy Danych, Kariera I Prywatny Sprzęt t W Pracy

Defending Against a Dangerous New World

Security Readiness Assessment

Copyright 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12

Oracle Audit Vault. Trust-but-Verify for Enterprise Databases. Tammy Bednar Sr. Principal Product Manager Oracle Database Security

Oracle Buys Automated Applications Controls Leader LogicalApps

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Security Compliance and Data Governance: Dual problems, single solution CON8015

2-4 April 2019 Taets Art and Event Park, Amsterdam CLICK TO KNOW MORE

Managing Oracle Database 12c with Oracle Enterprise Manager 12c

Oracle Database Auditing

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved.

Oracle Database 18c and Autonomous Database

How to Troubleshoot Databases and Exadata Using Oracle Log Analytics

Oracle Database 11g: Security Release 2

Oracle Database 11g: Security Release 2

Oracle Database Vault and Applications Unlimited Certification Overview

Vendor: Oracle. Exam Code: 1Z Exam Name: Oracle Database 11g Security Essentials. Version: Demo

Security Benefits of Implementing Database Vault. -Arpita Ghatak

Sponsored by Oracle. SANS Institute Product Review: Oracle Audit Vault. March A SANS Whitepaper. Written by: Tanya Baccam

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE

Oracle Database Vault with Oracle Database 12c ORACLE WHITE PAPER MAY 2015

Oracle Fusion Applications Understanding Security. Release 9

Data Management and Security in the GDPR Era

Access Governance in a Cloudy Environment. Nabeel Nizar VP Worldwide Solutions

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle

DBAs can use Oracle Application Express? Why?

IBM services and technology solutions for supporting GDPR program

Holistic Database Security. Robert P. Lockard Oraclewizard, Inc. Glen Burnie, MD USA

MySQL CLOUD SERVICE. Propel Innovation and Time-to-Market

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

MySQL Enterprise Security

ADVALO TRAINING SCHEDULE FOR THE YEAR Exadata Database Machine: 12c Administration Workshop Ed 1

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7

PeopleSoft Finance Access and Security Audit

Moving Databases to Oracle Cloud: Performance Best Practices

Oracle Database Vault

Oracle. Sales Cloud Securing Incentive Compensation. Release 13 (update 17D)

Welcome to the Oracle Enterprise Manager Technical Webcast Series

Survey of Oracle Database

Safe Harbor Statement

idiscover RELATIONSHIPS Next find any documented relationships (database level). Ex., foreign keys

QuickBooks Online Security White Paper July 2017

Oracle Fusion Middleware

Centralized Database User Management Using Active Directory

Javaentwicklung in der Oracle Cloud

An Oracle White Paper June Oracle Audit Vault and Database Firewall

Database access control, activity monitoring and real time protection

Managing Your Privileged Identities: The Choke Point of Advanced Attacks

DreamFactory Security Guide

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. reserved. Insert Information Protection Policy Classification from Slide 8

Create a DBaaS Catalog in an Hour with a PaaS-Ready Infrastructure

IBM Exam 00M-662 Security Systems Sales Mastery Test v2 Version: 7.1 [ Total Questions: 72 ]

SECURING AWS ACCESS WITH MODERN IDENTITY SOLUTIONS

Oracle Project Portfolio Management Cloud Implementing Project Execution Management

CSN38: Tracking Privileged User Access within an ArcSight Logger and SIEM Environment Philip Lieberman, President and CEO

Oracle Risk Management Cloud

MEETING ISO STANDARDS

Oracle Database Security Assessment Tool (DBSAT) Overview

Oracle Audit Vault Implementation

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

Oracle Advanced Security: Enterprise User Management. An Oracle Technical White Paper November 1999

Data Privacy and Protection GDPR Compliance for Databases

Oracle Database Vault

ORACLE MANAGED CLOUD SECURITY SERVICES - SERVICE DESCRIPTIONS. December 1, 2017

SQL Security Whitepaper SECURITY AND COMPLIANCE SOLUTIONS FOR PCI DSS PAYMENT CARD INDUSTRY DATA SECURITY STANDARD

Oracle Fusion Applications

The 3 Pillars of SharePoint Security

Oracle Data Cloud ( ODC ) Inbound Security Policies

W H IT E P A P E R. Salesforce Security for the IT Executive

ebusiness Suite goes SOA

Oracle Data Masking and Subsetting

Google Cloud & the General Data Protection Regulation (GDPR)

Virtual Machine Encryption Security & Compliance in the Cloud

LBI Public Information. Please consider the impact to the environment before printing this.

Oracle Secure Backup 12.1 Technical Overview

Oracle Policy Automation The modern enterprise advice platform

McAfee Database Security

"Charting the Course... Oracle 18c DBA I (3 Day) Course Summary

Teradata and Protegrity High-Value Protection for High-Value Data

Projectplace: A Secure Project Collaboration Solution

You Don t Have Database Vault

Oracle Database 10g Release 2 Database Vault - Restricting the DBA From Accessing Business Data

WORKSHARE SECURITY OVERVIEW

Hyperion Application Access Control Governor Blueprint for Oracle GRC Applications

Copyright 2011, Oracle and/or its affiliates. All rights reserved.

SANS Institute Product Review: Oracle Database Vault

Oracle Enterprise Manager 12c

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Enterprise Manager Snap Clone Snapshot your data without snapping your storage David Wolf Director of Product Management

Copyright 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 13

Latest Innovations in Database as a Service Enabled by Oracle Enterprise Manager

Securing Data in the Cloud: Point of View

<Insert Picture Here> Oracle VM October 20, 2010

OpenIAM Identity and Access Manager Technical Architecture Overview

Governance, Risk, and Compliance: A Practical Guide to Points of Entry

CIAM: Need for Identity Governance & Assurance. Yash Prakash VP of Products

Transcription:

The 10 Principles of Security in Modern Cloud Applications Nigel King, Vice President, Oracle In-Depth Seminars D11 1

Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle s products remains at the sole discretion of Oracle. 2

The Context for Applications 3

The Enterprise HR Generalist CFO Payables Supervisor Marketing Manager Procurement Manager Engineer Applications Admin VP of Sales 4

Functional Footprint Role Based Access Control Fusion Procurement Fusion Financials Fusion Project Portfolio Management Fusion Sales & Marketing Fusion Human Capital Management Fusion Governance, Risk & Compliance Fusion Supply Chain Management 5

Functional Footprint Role Based Access Control Fusion Procurement Buyer Category Manager Procurement Manager Procurement Contracts Administrator Procurement Catalog Administrator Procurement Applications Administrator Supplier Administrator Sourcing Project Collaborator Supplier Bidder Supplier Accounts Receivable Specialist Supplier Customer Service Representative Supplier Demand Planner Supplier Sales Representative Supplier Self Service Administrator Supplier Self Service Clerk 190 Seeded Job Roles across over 83 Applications 6

Clean Access Model Seamless Transition to IDM Faster On boarding SSO Management Approval Workflows Easier Regulatory Compliance Secure Out of The Box Across Tools Across the Info Lifecycle SOD Role Provisioning Transparent Policies Standards Based 7

The 10 Principles 8

Fusion Applications Security 1. Role Based Access 2. Account and Role Provisioning Events & Workflows 3. Enforcement Across Tools and Transformations 4. Pervasive Privacy Protections 5. Integration with Governance Risk and Compliance 6. Transparent Security Policies 7. Complete Audit of Security Changes 8. Secure Across the Information Lifecycle 9. Co-existing with your current Security Infrastructure 10. Comprehensive Extensible Reference Implementation 9

Fusion Applications Security Job Role Data Role Duty Role Entitlement Permission E-Business Suite Top Level Menu Responsibility Sub Menu Form Function Executable PeopleSoft Top Level Menu Employee ID + Role Role(s) Permission Lists Executable 10

A Role is a Job Description 1 3 2 4 4 1 3 4 2 4 A Duty is what you do in that Role. 11

Once a New Employee is inducted, You grant them a Role Employee Joins As Purchasing Manager of Vision Germany Vision Germany Vision Enterprises Vision US Roles not tied to Job but to Employee, such as Employee (ERs) Purchase Requisitioner We call these roles: Abstract Roles Employee is Granted the Purchasing Manager Role with Data Secured by Vision Germany. We call these roles: Data Roles 12

What can the new Employee Do and View? Based on their Role assignment the Employee has duties. Each of these duties provides access to functionality in Fusion Apps. This Access to Functionality is what we call Entitlements 13

Now the New Employee Starts Using the System When the Employee starts using Fusion Apps She will be able to access the Menu Tasks she is entitled to. 14

Menu Items 15

Tasks 16

Buttons, Regions and Actions 17

Fusion Applications Security 1. Role Based Access 2. Account and Role Provisioning Events & Workflows 3. Enforcement Across Tools and Transformations 4. Pervasive Privacy Protections 5. Integration with Governance Risk and Compliance 6. Transparent Security Policies 7. Complete Audit of Security Changes 8. Secure Across the Information Lifecycle 9. Co-existing with your current Security Infrastructure 10. Comprehensive Extensible Reference Implementation 18

Manual Process -No Auto Provisioning 19

Account and Role Provisioning Events & Workflows 20

Secure Out of the Box 1. Role Based Access 2. Account and Role Provisioning Events & Workflows 3. Enforcement Across Tools and Transformations 4. Pervasive Privacy Protections 5. Integration with Governance Risk and Compliance 6. Transparent Security Policies 7. Complete Audit of Security Changes 8. Secure Across the Information Lifecycle 9. Co-existing with your current Security Infrastructure 10. Comprehensive Extensible Reference Implementation 21

Secure OOTB: Enforcement Across Tools Business Intelligence Universal Content Management ADF UI 22 Copyright 2011, Oracle and/or its affiliates. All rights reserved.

Secure OOTB: Enforcement Across Tools Defined Once. Used Everywhere! - ADF - Enterprise Search - Business Intelligence Trasactional UIs Business Intelligence - Reporting - Mobile Universal Content Management - Web Services - Content Management 23 Copyright 2011, Oracle and/or its affiliates. All rights reserved.

Fusion Applications Security 1. Role Based Access 2. Account and Role Provisioning Events & Workflows 3. Enforcement Across Tools and Transformations 4. Pervasive Privacy Protections 5. Integration with Governance Risk and Compliance 6. Transparent Security Policies 7. Complete Audit of Security Changes 8. Secure Across the Information Lifecycle 9. Co-existing with your current Security Infrastructure 10. Comprehensive Extensible Reference Implementation 24

Secure OOTB: Pervasive Privacy Protections Fusion Applications protect personally identifiable information (PII) PII = any piece of information which can potentially be used to uniquely identify, contact, or locate a single person. Social Security Number (SSN) Driver s license number State or National Identifier (Identification Card number) Passport Number Account number, credit card number (CCN) or debit card number Home or Physical address (e.g street address) Email address Telephone number 25 Copyright 2011, Oracle and/or its affiliates. All rights reserved.

Secure OOTB: Pervasive Privacy Protections RBAC Defined once.. A Supplier Manager can maintain supplier tax identifier for the business units in which they are authorized Used in UI Application UI (ADF) Bypasses UI and gets direct access to database Used in VPD policy Table 26 Copyright 2011, Oracle and/or its affiliates. All rights reserved.

Fusion Applications Security 1. Role Based Access 2. Account and Role Provisioning Events & Workflows 3. Enforcement Across Tools and Transformations 4. Pervasive Privacy Protections 5. Integration with Governance Risk and Compliance 6. Transparent Security Policies 7. Complete Audit of Security Changes 8. Secure Across the Information Lifecycle 9. Co-existing with your current Security Infrastructure 10. Comprehensive Extensible Reference Implementation 27

Manage Access & Segregation of Duties Solution Preventive AND Detective Access Controls Simulation for Role Design Preventive Provisioning Pre-built Content and Reports 28

Preventive Provisioning Proc Manager- US Create Pos. Proc Manager- DE Create Invoices Create Payments. GRC Control Name Create Invoices, Create Payments Create Purchase Orders, Create Invoices Enforcement Type Approval Required Prevent 29

Fusion Applications Security 1. Role Based Access 2. Account and Role Provisioning Events & Workflows 3. Enforcement Across Tools and Transformations 4. Pervasive Privacy Protections 5. Integration with Governance Risk and Compliance 6. Transparent Security Policies 7. Complete Audit of Security Changes 8. Secure Across the Information Lifecycle 9. Co-existing with your current Security Infrastructure 10. Comprehensive Extensible Reference Implementation 30

Transparent Security Policies 31

Fusion Applications Security 1. Role Based Access 2. Account and Role Provisioning Events & Workflows 3. Enforcement Across Tools and Transformations 4. Pervasive Privacy Protections 5. Integration with Governance Risk and Compliance 6. Transparent Security Policies 7. Complete Audit of Security Changes 8. Secure Across the Information Lifecycle 9. Co-existing with your current Security Infrastructure 10. Comprehensive Extensible Reference Implementation 32

Audit of Security Changes Who made what changes, and when Audit of Changes in the definition of a role Audit of Changes to the roles assigned to a user Audit of the logins of highly privileged accounts Implementation Consultant Security Manager Payroll Administrator Audit of the use of a highly privileged function Voiding of a Check 33

IT Audit - Security Show User and Roles from Oracle Identity Manager (OIM) 34

IT Audit - Security Show User and Role Change Reporting 35

Fusion Applications Security 1. Role Based Access 2. Account and Role Provisioning Events & Workflows 3. Enforcement Across Tools and Transformations 4. Pervasive Privacy Protections 5. Integration with Governance Risk and Compliance 6. Transparent Security Policies 7. Complete Audit of Security Changes 8. Secure Across the Information Lifecycle 9. Co-existing with your current Security Infrastructure 10. Comprehensive Extensible Reference Implementation 36

Secure OOTB: Secure Across Info Lifecycle Sensitive data in file system and backups (data-atrest) protected using Transparent Data Encryption Sensitive data in cloned, non-production databases protected using Oracle Data Masking Sensitive data protected from database administrators and other privileged users using Oracle Database Vault 37 Copyright 2011, Oracle and/or its affiliates. All rights reserved.

Secure OOTB: Secure Across Info Lifecycle Protect Data in Motion with Network Encryption using Advanced Security Option uthenti^( Protect Data from View and Alteration as well as Insider Threat using Database Vault Database Vault Select SALARY from users; Alter system. Alter table.. Operational DBA X * Example roles and privs Data DBA / Manager X Alter table. Operational DBA Protect User and Sensitive Data at Rest by Encrypting Database Columns using Transparent Data Encryption LNAME SSN SALARY KING 123-45-6789 A0d$Gb)c $125,000 (_f@em SCOTT 987-65-4321 A0dubLvc $229,500 Gf&@eP SMITH 345-67-8912 %5#ROB-!9(2 $ D$KfXa 53,700 Select SALARY from USERS; Sensitive Data in cloned instance protected by Data Masking LNAME SSN SALARY KING 111-11-1111 $99,000 SCOTT 222-22-2222 $888,000 SMITH 333-33-3333 $77,000 38 Copyright 2011, Oracle and/or its affiliates. All rights reserved.

Fusion Applications Security 1. Role Based Access 2. Account and Role Provisioning Events & Workflows 3. Enforcement Across Tools and Transformations 4. Pervasive Privacy Protections 5. Integration with Governance Risk and Compliance 6. Transparent Security Policies 7. Complete Audit of Security Changes 8. Secure Across the Information Lifecycle 9. Co-existing with your current Security Infrastructure 10. Comprehensive Extensible Reference Implementation 39

Secure OOTB: Co-existing with your current Security Infrastructure Allows a user to log in once & access all applications authentication Existing Identity Management Infrastructure Service access Identity Provider Custom Applications OID Federation Enabled Service Providers Applications Unlimited 40 Copyright 2011, Oracle and/or its affiliates. All rights reserved.

Fusion Applications Security 1. Role Based Access 2. Account and Role Provisioning Events & Workflows 3. Enforcement Across Tools and Transformations 4. Pervasive Privacy Protections 5. Integration with Governance Risk and Compliance 6. Transparent Security Policies 7. Complete Audit of Security Changes 8. Secure Across the Information Lifecycle 9. Co-existing with your current Security Infrastructure 10. Comprehensive Extensible Reference Implementation 41

Secure OOTB: Reference Implementation OOTB roles you will recognize as jobs hierarchy of duties data security policies SOD Policies Provisioning Events To extend Security Console new jobs new duties 42 Copyright 2011, Oracle and/or its affiliates. All rights reserved.

Configuration Flexibility What if I want to expand what reports the channel directors can see? 43

Configuration Flexibility Add a Duty Role Job Role Channel Director Duty Role + Sales Transaction Analysis Duty 44

45

46

Configuration Flexibility Most business groups have their sales reps do forecasting, but I know of one where the sales managers do that, not the sales reps. What should I do? 47

Configuration Flexibility Remove a Duty Role Job Role Sales Representative Duty Role X Sales Forecasting Duty 48

49

Configuration Flexibility Remove Duty Role and Add Custom Duty Role Job Role Sales Representative Sales Representative Duty Duty Role Opportunity Sales Representative Duty x Custom Opportunity Read Only Duty + Policies Security Policies ADD POLICIES WITH VIEW PRIVILEGES ONLY Security Policies 50

51

52

Securing the Database 53

MAR 14 JAN 14 DEC 13 SEP 13 OCT 13 FEB 14 54 Copyright 2014, 2013, Oracle and/or its affiliates. All rights reserved.

Considerations for Maximum Security Preventive and Detective Controls 55

SECURITY Maximum Security for Critical Infrastructure PREVENTIVE DETECTIVE ADMINISTRATIVE Encryption & Redaction Activity Monitoring Key Management Masking & Subsetting Database Firewall Privilege & Data Discovery Privileged User Controls Auditing & Reporting Configuration Management 56

Oracle Database Security Innovations Privilege Analysis Data Redaction Real Application Security Conditional and Unified Auditing SQL Grammar based Database Firewall Privileged User Controls SQL Command Controls At-source Data Masking Sensitive Data Discovery Transparent Data Encryption Label-based Access Control Virtual Private Database 57

SECURITY Maximum Security for Critical Infrastructure PREVENTIVE DETECTIVE ADMINISTRATIVE Encryption & Redaction Activity Monitoring Key Management Masking & Subsetting Database Firewall Privilege & Data Discovery Privileged User Controls Auditing & Reporting Configuration Management 58

Encryption is the Foundation Preventive Control for Oracle Databases Advanced Security Transparent data encryption Prevents access to data at rest Requires no application changes Built-in two-tier key management Near Zero overhead with hardware Integrations with Oracle technologies e.g. Exadata, Advanced Compression, ASM, GoldenGate, DataPump, etc. Applications Disk Backups Exports Off-Site Facilities 59

Redaction of Sensitive Data Displayed Preventive Control for Oracle Database 12c and 11g (11.2.0.4) Advanced Security Real-time redaction based upon user, IP, app context, session factors, Applies to columns on tables/views Full/partial, random/fixed redaction No impact on operational activities Credit Card Numbers 4451-2172-9841-4368 5106-8395-2095-5938 7830-0032-0294-1827 Redaction Policy xxxx-xxxx-xxxx-4368 4451-2172-9841-4368 Call Center Application Billing Department 60

Masking Data for Non-Production Use Preventive Control for Oracle Databases Data Masking Replace sensitive application data Referential integrity detected/preserved Extensible template library and formats Application templates available Support for masking data in non-oracle databases LAST_NAME SSN SALARY AGUILAR 203-33-3234 40,000 BENSON 323-22-2943 60,000 Production Test Dev Non-Production LAST_NAME SSN SALARY ANSKEKSL 323 23-1111 60,000 BKJHHEIEDK 252-34-1345 40,000 Production 61

Preventive Controls Inside the Oracle Database Preventive Control for Oracle Databases Database Vault Realms around sensitive schemas or objects Restrict DBA access to realm data Support multi-factor SQL command rules Enforce separation of duties Block threats targeting privileged DB accounts Restrict all access unless explicitly authorized with Mandatory Realms (New) Applications Finance HR Procurement Security DBA HR Admin select * from procurement.bids DBA 62

Real Application Security HR Application Business Logic Security Policy Users and Roles CRM Application Business Logic Security Policy Users and Roles Identity/Policy Store Shared, Light-weight All-Powerful Connection Sessions Security enforced on Direct, direct connections Uncontrolled Access 63

SECURITY Maximum Security for Critical Infrastructure PREVENTIVE DETECTIVE ADMINISTRATIVE Encryption & Redaction Activity Monitoring Key Management Masking & Subsetting Database Firewall Privilege & Data Discovery Privileged User Controls Auditing & Reporting Configuration Management 64

New Conditional Auditing Framework Detective Control for Oracle Database 12c Database Auditing New policy and condition-based syntax What: CREATE, ALTER, ALL, Where: Set of Privileges, Roles, objects When: IP_ADDRESS!= 10.288.241.88 Exceptions: Except HR Group audit settings for manageability New roles: Audit Viewer and Audit Admin Out-of-box audit policies Single unified database audit trail 65

66

Audit, Report, and Alert in Real-Time Detective Control for Oracle and non-oracle Databases Audit Vault and Database Firewall Collect and Analyze audit/event data Centralized secure audit repository Consolidated multi-source reporting Out-of-the box and custom reports Conditional real-time alerts Fine-grain separation of duties Secure, scalable software appliance SOC Auditor Security Analyst! Alerts Reports Policies Audit Data & Event Logs Oracle Database Firewall OS & Storage Directories Databases Custom 67

Database Activity Monitoring and Firewall Detective Control for Oracle and non-oracle Databases Audit Vault and Database Firewall Monitor network traffic, detect and block unauthorized database activity Detect/stop SQL injection attacks Highly accurate SQL grammar analysis Allow Log Alert Substitute Block Whitelist approach to enforce activity Blacklists for managing high risk activity Scalable secure software appliance SQL Analysis Whitelist Blacklist Policy Factors 68

Oracle Audit Vault and Database Firewall Detective Controls Users Apps Database Firewall Events Alerts Reports Policies Audit Vault Audit Data & Event Logs Databases OS & Storage Directories Custom 69

SECURITY Maximum Security for Critical Infrastructure PREVENTIVE DETECTIVE ADMINISTRATIVE Encryption & Redaction Activity Monitoring Key Management Masking & Subsetting Database Firewall Privilege & Data Discovery Privileged User Controls Auditing & Reporting Configuration Management 70

Configuration Management Administrative Control for Oracle Databases Database Lifecycle Management Discover and classify databases Scan for best practices, standards Detect unauthorized changes Patching and provisioning Scan & Monitor Discover Patch 71

Discover Use of Privileges and Roles Administrative Control for Oracle Database 12c Database Vault Capture privileges used per session, across sessions, per specific context, or full database Report on privileges/roles used/unused Help revoke unnecessary privileges Enforce least privilege and reduce risks Increase security without disruption Create Drop Update DBA role APPADMIN role Privilege Analysis Unused Update APPADMIN 72

New Oracle Enterprise Manager Security Menu Oracle Database Vault Create Privilege Analysis policy and enable it 73

SECURITY Maximum Security for Critical Infrastructure PREVENTIVE DETECTIVE ADMINISTRATIVE Encryption & Redaction Activity Monitoring Key Management Masking & Subsetting Database Firewall Privilege & Data Discovery Privileged User Controls Auditing & Reporting Configuration Management 74

Oracle Database Maximum Security Architecture Advanced Security Data Redaction Users Database Vault Privilege Analysis Apps Alerts Database Firewall Events Data Masking Advanced Security TDE Database Vault Privileged User Controls Reports Policies Audit Vault Audit Data & Event Logs Databases OS & Storage Directories Custom 75