舉報

會員
Oracle Database 12c Security Cookbook
Zoran Pavlovi? Maja Veselica 著
更新時間:2021-07-02 16:43:47
開會員,本書免費讀 >
ThisbookisforDBAs,developers,andarchitectswhoarekeentoknowmoreaboutsecurityinOracleDatabase12c.Thisbookisbestsuitedforbeginnersandintermediate-leveldatabasesecuritypractitioners.BasicknowledgeofOracleDatabaseisexpected,butnopriorexperienceofsecuringadatabaseisrequired.
最新章節
- Using an application context
- Setting application context attributes
- Creating an application context
- Exploring and using built-in contexts
- Introduction
- Chapter 12. Appendix – Application Contexts
品牌:中圖公司
上架時間:2021-07-02 16:27:23
出版社:Packt Publishing
本書數字版權由中圖公司提供,并由其授權上海閱文信息技術有限公司制作發行
- Using an application context 更新時間:2021-07-02 16:43:47
- Setting application context attributes
- Creating an application context
- Exploring and using built-in contexts
- Introduction
- Chapter 12. Appendix – Application Contexts
- Using TDE in a multitenant environment
- Creating factors in Oracle Database Vault
- Exporting data using Oracle Data Pump in Oracle Database Vault environment
- Introduction
- Chapter 11. Additional Topics
- Disabling and dropping audit policies
- Purging audit trail
- Auditing application contexts
- Finding information about audit policies and audited data
- Enabling audit policy
- Creating audit policies to audit privileges actions and roles under specified conditions
- Auditing Database Vault operations
- Auditing Data Pump operations
- Auditing RMAN operations
- Which roles do you need to have to be able to create audit policies and to view audit data?
- Configuring whether loss of audit data is acceptable
- Enabling Unified Auditing mode
- Introduction
- Chapter 10. Unified Auditing
- Re-enabling Database Vault
- Disabling Database Vault
- Running Oracle Database Vault reports
- Using Database Vault to implement that administrators cannot view data
- Creating a secure application role
- Creating a rule set
- Preventing users from executing specific command on specific object
- Securing roles
- Preventing users from exercising system privileges on schema objects
- Registering Database Vault
- Introduction
- Chapter 9. Database Vault
- Backup and Recovery
- Rekeying
- Encrypting tablespace
- Auto-login keystore
- Column encryption - encrypting existing column
- Using salt and MAC
- Column encryption - creating new table that has encrypted column(s)
- Column encryption - adding new encrypted column to table
- Setting master encryption key in software keystore
- Creating and opening the keystore
- Configuring keystore location in sqlnet.ora
- Introduction
- Chapter 8. Transparent Data Encryption
- Dropping the analysis
- How to revoke unused privileges
- Reporting on unused object privileges
- Reporting on unused system privileges
- Reporting on used object privileges
- Reporting on used system privileges
- Starting and stopping privilege analysis
- Creating combined analysis policy
- Creating context analysis policy
- Creating role analysis policy
- Creating database analysis policy
- Introduction
- Chapter 7. Privilege Analysis
- Altering transparent sensitive data protection policy
- Enabling disabling and dropping policy
- Associating transparent sensitive data protection policy with sensitive type
- Creating transparent sensitive data protection policy
- Determining sensitive columns
- Creating a sensitive type
- Introduction
- Chapter 6. Transparent Sensitive Data Protection
- Exempting users from data redaction policies
- Enabling disabling and dropping redaction policy
- Add a column to the redaction policy
- Changing the function parameters for a specified column
- Using Oracle Enterprise Manager Cloud Control 12c to manage redaction policies
- Creating a redaction policy when using regular expression redaction
- Creating a redaction policy when using random redaction
- Creating a redaction policy when using partial redaction
- Creating a redaction policy when using full redaction
- Introduction
- Chapter 5. Data Redaction
- Exempting users from VPD policies
- Adding policy to a group
- Setting context as a driving context
- Creating policy groups
- Creating a driving context
- Creating column-level policies
- Creating Oracle Virtual Private Database row-level policies
- Creating different policy functions
- Introduction
- Chapter 4. Virtual Private Database
- Restricting access to program units by using accessible by
- Using code-based access control
- Creating and using invoker's right procedures
- Creating and using definer's rights procedures
- Introduction
- Chapter 3. PL/SQL Security
- Effects of plugging/unplugging operations on users roles and privileges
- Granting privileges and roles locally
- Granting privileges and roles commonly
- Creating a local role
- Creating a common role
- Creating a local user
- Creating a common user
- Introduction
- Chapter 2. Security Considerations in Multitenant Environment
- The sysdg privilege – how when and why should you use it?
- The syskm privilege – how when and why should you use it?
- The sysbackup privilege – how when and why should you use it?
- Creating and using database roles
- Creating and using proxy users
- Creating and using OS-authenticated users
- Expiring a user's password
- Locking a user account
- Creating a user with the same credentials on another database
- Changing a user's password
- Creating password-authenticated users
- Creating a password profile
- Introduction
- Chapter 1. Basic Database Security
- Customer support
- Reader feedback
- Conventions
- Sections
- Who this book is for
- What you need for this book
- What this book covers
- Preface
- eBooks discount offers and more
- www.PacktPub.com
- About the Reviewers
- About the Authors
- Credits
- Oracle Database 12c Security Cookbook
- coverpage
- coverpage
- Oracle Database 12c Security Cookbook
- Credits
- About the Authors
- About the Reviewers
- www.PacktPub.com
- eBooks discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Sections
- Conventions
- Reader feedback
- Customer support
- Chapter 1. Basic Database Security
- Introduction
- Creating a password profile
- Creating password-authenticated users
- Changing a user's password
- Creating a user with the same credentials on another database
- Locking a user account
- Expiring a user's password
- Creating and using OS-authenticated users
- Creating and using proxy users
- Creating and using database roles
- The sysbackup privilege – how when and why should you use it?
- The syskm privilege – how when and why should you use it?
- The sysdg privilege – how when and why should you use it?
- Chapter 2. Security Considerations in Multitenant Environment
- Introduction
- Creating a common user
- Creating a local user
- Creating a common role
- Creating a local role
- Granting privileges and roles commonly
- Granting privileges and roles locally
- Effects of plugging/unplugging operations on users roles and privileges
- Chapter 3. PL/SQL Security
- Introduction
- Creating and using definer's rights procedures
- Creating and using invoker's right procedures
- Using code-based access control
- Restricting access to program units by using accessible by
- Chapter 4. Virtual Private Database
- Introduction
- Creating different policy functions
- Creating Oracle Virtual Private Database row-level policies
- Creating column-level policies
- Creating a driving context
- Creating policy groups
- Setting context as a driving context
- Adding policy to a group
- Exempting users from VPD policies
- Chapter 5. Data Redaction
- Introduction
- Creating a redaction policy when using full redaction
- Creating a redaction policy when using partial redaction
- Creating a redaction policy when using random redaction
- Creating a redaction policy when using regular expression redaction
- Using Oracle Enterprise Manager Cloud Control 12c to manage redaction policies
- Changing the function parameters for a specified column
- Add a column to the redaction policy
- Enabling disabling and dropping redaction policy
- Exempting users from data redaction policies
- Chapter 6. Transparent Sensitive Data Protection
- Introduction
- Creating a sensitive type
- Determining sensitive columns
- Creating transparent sensitive data protection policy
- Associating transparent sensitive data protection policy with sensitive type
- Enabling disabling and dropping policy
- Altering transparent sensitive data protection policy
- Chapter 7. Privilege Analysis
- Introduction
- Creating database analysis policy
- Creating role analysis policy
- Creating context analysis policy
- Creating combined analysis policy
- Starting and stopping privilege analysis
- Reporting on used system privileges
- Reporting on used object privileges
- Reporting on unused system privileges
- Reporting on unused object privileges
- How to revoke unused privileges
- Dropping the analysis
- Chapter 8. Transparent Data Encryption
- Introduction
- Configuring keystore location in sqlnet.ora
- Creating and opening the keystore
- Setting master encryption key in software keystore
- Column encryption - adding new encrypted column to table
- Column encryption - creating new table that has encrypted column(s)
- Using salt and MAC
- Column encryption - encrypting existing column
- Auto-login keystore
- Encrypting tablespace
- Rekeying
- Backup and Recovery
- Chapter 9. Database Vault
- Introduction
- Registering Database Vault
- Preventing users from exercising system privileges on schema objects
- Securing roles
- Preventing users from executing specific command on specific object
- Creating a rule set
- Creating a secure application role
- Using Database Vault to implement that administrators cannot view data
- Running Oracle Database Vault reports
- Disabling Database Vault
- Re-enabling Database Vault
- Chapter 10. Unified Auditing
- Introduction
- Enabling Unified Auditing mode
- Configuring whether loss of audit data is acceptable
- Which roles do you need to have to be able to create audit policies and to view audit data?
- Auditing RMAN operations
- Auditing Data Pump operations
- Auditing Database Vault operations
- Creating audit policies to audit privileges actions and roles under specified conditions
- Enabling audit policy
- Finding information about audit policies and audited data
- Auditing application contexts
- Purging audit trail
- Disabling and dropping audit policies
- Chapter 11. Additional Topics
- Introduction
- Exporting data using Oracle Data Pump in Oracle Database Vault environment
- Creating factors in Oracle Database Vault
- Using TDE in a multitenant environment
- Chapter 12. Appendix – Application Contexts
- Introduction
- Exploring and using built-in contexts
- Creating an application context
- Setting application context attributes
- Using an application context 更新時間:2021-07-02 16:43:47