Record Detail Back
Expert Oracle Practices
To secure an Oracle database, you must modify your mindset to think about securing the data and not about securing the software. To secure the software is literally impossible, because the software is almost infinitely configurable and the software does not know anything about your system (apart from what you
www.it-ebooks.info
CHAPTER 15 ■ SECURING DATA
532
tell it), your applications, or the versions you are running. Relying on checklists alone is also futile; checklists are useful as a general hardening guide but not as a guide for complete security of data. To secure the data completely, you must understand the data; you must understand how the data flows into the database and how the data flows out of the database. You must also understand who has access to the data and where and how. Only with complete information can you form a security policy that will enable you to secure the data. This chapter started with an abnormally naive approach of thinking that the data is simply within a single table; this is wrong. Extending the problem to also include security means that the security is not just the privileges on that single table but it is the privileges of every object that also accesses that table. The problem does not stop there because there are many other ways to get at the same data, and that is why it is important to understand how the data flows into and out of the database. With this knowledge, you will be able to think in a devious manner, in the same manner as someone who wants to steal your data. Learn to think like a hacker. If you can understand the true privilege model and access model to the data within the database, you can secure it. Therefore, you can secure the data and, with it, Oracle. Combine the processes described in this chapter with the knowledge from the preceding chapter around securing users, and then your database will be much harder to break into. If no one who should not be able to access the data can even attempt to enter the database, and you have hardened the privileges on the data to the level of an authorized user, you will be really secure. Good luck!
978-1-4302-2669-2
NONE
Information Technology
English
2010
1-593
LOADING LIST...
LOADING LIST...