Solved

Top Level Oracle RDBMS Security

Posted on 2013-05-22
2
424 Views
Last Modified: 2013-06-07
1) Aside from:
- applying the latest security patches,
-ensuring you enforce strong passwords and password policies (non default passwords for DB accounts),
- assign only the appropriate permissions to those database accounts,
- ensure the database files are only accessible on the hosting server by the appropriate admin,

What other security best practices are there (specific to the oracle database product not the hosting OS) that should be considered?


2) Where exactly can you see where the RMAN backup is being written to?
0
Comment
Question by:pma111
2 Comments
 
LVL 11

Accepted Solution

by:
mohammadzahid earned 250 total points
Comment Utility
set dictionary accessibility parameter to setting that can only get viewed by DBA.
I think parameter is o7_dictionary_accessibility (look up Oracle documentation on setting parameters)
0
 
LVL 23

Assisted Solution

by:David
David earned 250 total points
Comment Utility
My contribution would be to ensure all personally identifiable information (PII) was identified, and encrypted, wherever the data was at rest:  in a tablespace, file system, dump file, backup file, etc.  Don't forget to protect (or preferably eliminate) storage of reports and data extractions that are in clear text.

Then, secondarily, go after the PII data in motion:  networks, devices, etc.

You would do well to look into the DoD standards and templates for evaluating a system.  There are checklists which can show levels of severity, so that I can persuade my accountant what must be focused upon.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

This article describes some very basic things about SQL Server filegroups.
SQL Command Tool comes with APEX under SQL Workshop. It helps us to make changes on the database directly using a graphical user interface. This helps us writing any SQL/ PLSQL queries and execute it on the database and we can create any database ob…
This video shows setup options and the basic steps and syntax for duplicating (cloning) a database from one instance to another. Examples are given for duplicating to the same machine and to different machines
Via a live example, show how to restore a database from backup after a simulated disk failure using RMAN.

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

6 Experts available now in Live!

Get 1:1 Help Now