Encrypt Red Hat OS that runs Oracle 11G

Posted on 2014-08-26
Last Modified: 2014-09-10
We currently have an Oracle 11G server that runs on the Red Hat 6 OS.  HIPPA requirements are forcing us to encrypt data at rest so we thought it would be easiest to use the OS encryption in Red Hat.  If the OS is encrypted, how does this affect Oracle?  can the encryption be turned on now or does it need to be enabled before Oracle is installed?
Question by:NytroZ
    LVL 34

    Expert Comment

    by:Seth Simmons
    i've used trucrypt in the past and worked well though i wouldn't suggest it now since work on it ended a few months ago and could be insecure

    dm-crypt/LUKS is also a method of encryption but can't be done with data already on the partition

    not sure if it's an option for you, but you could build a new system, encrypt it with the native RHEL tools (dm-crypt/LUKS), then migrate the oracle database(s) over

    Author Comment

    I think I will eventually need to encrypt certain tables in the database at some point as well so with that in mind does dm-crypt figure into that at all?
    LVL 34

    Accepted Solution

    no, oracle database encryption is completely separate; dm-crypt is for the file system

    Transparent Data Encryption (TDE) Frequently Asked Questions

    i saw this question because it was tagged with linux; i'm not an oracle expert so i'll let someone else speak more about that part
    LVL 76

    Expert Comment

    by:slightwv (䄆 Netminder)
    TDE is a way to protect column data.

    Of course, it has a cost as it is a separate license.

    Advanced Security also has other features that are guaranteed to meet your HIPPA requirements.

    Their main page even mentions HIPPA:
    Helps address regulatory requirements, including PCI DSS and HIPAA HITECH
    LVL 61

    Expert Comment

    Indded dm-crypt is for raw disks (think ASM), that includes filesystems on them
    LVM also has same sort of transparent encryption and a bit more flexibility

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Do You Know the 4 Main Threat Actor Types?

    Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

    Note: this article covers simple compression. Oracle introduced in version 11g release 2 a new feature called Advanced Compression which is not covered here. General principle of Oracle compression Oracle compression is a way of reducing the d…
    I remember the day when someone asked me to create a user for an application developement. The user should be able to create views and materialized views and, so, I used the following syntax: (CODE) This way, I guessed, I would ensure that use…
    This video explains at a high level with the mandatory Oracle Memory processes are as well as touching on some of the more common optional ones.
    This video shows how to Export data from an Oracle database using the Datapump Export Utility.  The corresponding Datapump Import utility is also discussed and demonstrated.

    760 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    7 Experts available now in Live!

    Get 1:1 Help Now