Oracle Security & Identity Management July 20, 2005

80
Oracle Security & Identity Management July 20, 2005 ael Torres Solutions Architect cinnati, OH -768-6856 [email protected] Gary Quarles Sr. Solutions Archite Columbus, OH 614-280-6500 [email protected]

description

Oracle Security & Identity Management July 20, 2005. Gary Quarles Sr. Solutions Architect Columbus, OH 614-280-6500 [email protected]. Rafael Torres Sr. Solutions Architect Cincinnati, OH 513-768-6856 [email protected]. Agenda. 9am-1015am Identity Management - PowerPoint PPT Presentation

Transcript of Oracle Security & Identity Management July 20, 2005

Page 1: Oracle Security & Identity Management July 20, 2005

Oracle Security & Identity Management

July 20, 2005

Rafael TorresSr. Solutions ArchitectCincinnati, [email protected]

Gary QuarlesSr. Solutions ArchitectColumbus, [email protected]

Page 2: Oracle Security & Identity Management July 20, 2005

Agenda 9am-1015am

– Identity Management OID, User Provisioning, Directory Integration,

Proxy Authentication– Virtual Private Database– Securing Data Access– Secure Application Roles

BREAK (15 mins)

Page 3: Oracle Security & Identity Management July 20, 2005

Agenda (con’t) 1030am-1145am

– Label Security– Fine Grained Auditing– Stored Data Encryption– Detecting Security Breaches– Data Privacy Compliance– Network Encryption– User Security– Oblix Roadmap

1145am-1pm – Buffet Luncheon

1pm-115pm – Raffle

Page 4: Oracle Security & Identity Management July 20, 2005

Security Legislation Sarbanes-Oxley

– Everyone– Financial statements contain no errors

Gramm-Leach-Bliley– Fin Services, Healthcare– Ensure privacy, security, confidentiality

California’s Breach Disclosure Law– Anyone with customers in California– Audit breach of PII, notify those affected

Safe Harbor– Anyone doing business in Europe– Reasonable steps to secure from unauthorized access

Page 5: Oracle Security & Identity Management July 20, 2005

Data Privacy Concerns Customer information

– protecting customer personally identifiable information (PII)

Employee information– majority of privacy regulations provide equal or

greater rights of privacy to employees Third Party information

– protecting PII of third persons provided to you by customers or employees

Page 6: Oracle Security & Identity Management July 20, 2005

25% technical75% policy and procedures

Data Privacy Compliance

www.oracle.com/consulting

Page 7: Oracle Security & Identity Management July 20, 2005

“90% detected computer security breaches in the past year.”

“80% acknowledged financial losses due to computer breaches.”

The Expert View

- CSI/FBI Computer Crime and Security Survey

Page 8: Oracle Security & Identity Management July 20, 2005

“If you spend more on coffee than on IT security, then you will be hacked…what's more, you deserve to be hacked!”

Richard ClarkeSpecial Advisor to the President, Cyberspace Security

Page 9: Oracle Security & Identity Management July 20, 2005

State of Security – United States 90% of respondents* detected computer security

breaches within the last twelve months. 80% of respondents acknowledged financial

losses due to computer breaches. – $455,848,000 in quantifiable losses– $170,827,000 theft of proprietary information– $115,753,000 in financial fraud

74% cited their Internet connection as a frequent point of attack

33% cited internal systems as a frequent point of attack * Source: CSI/FBI Computer Crime and Security Survey

Page 10: Oracle Security & Identity Management July 20, 2005

Why Oracle for Security and Identity Management? 25+ year history

– First Oracle customer was a government customer Information Assurance

– 17 independent security evaluations over past decade– Substantial financial commitment to independent security evaluations– More evaluations than any other major database vendor– Culture of security at Oracle

Robust security features and Identity Management Infrastructure– Row level security– Fine Grained Auditing– Integrated database security and identity management

Web Single Sign-on, Oracle Internet Directory– Strong authentication

Page 11: Oracle Security & Identity Management July 20, 2005

Oracle Database = 25+ years of security leadership

1977 2004

Label Sec + ID Mgmt Column Sec Policies Security Evaluation 17 Identity Mgmt Release

Fine Grained Auditing Common Criteria (EAL4) Oracle9iAS JAAS Oracle9iAS Single Sign-On Oracle Label Security (2000) Virtual Private Database (1998) Enterprise User Security Oracle Internet Directory Database Encryption API Kerberos framework Support for PKI Radius Authentication Network Encryption Oracle Advanced Security introduced First Orange Book B1 evaluation (1993) Trusted Oracle7 Multilevel Secure Database (1992) Government customer

Page 12: Oracle Security & Identity Management July 20, 2005

Oracle Application Server 10g

Page 13: Oracle Security & Identity Management July 20, 2005

Identity Management

Page 14: Oracle Security & Identity Management July 20, 2005

Identity Management process by which the complete security lifecycle

for users and other entities is managed for an organization or community of organizations.

management of an organization's application users, where steps in the security lifecycle include account creation, suspension, privilege modification, and account deletion.

Page 15: Oracle Security & Identity Management July 20, 2005

Identity Management Components

Page 16: Oracle Security & Identity Management July 20, 2005

The Identity Challenge

User Credentials for Authentication and Authorization

Directory Server or Database

Application

User Credentials for Authentication and Authorization

Directory Server or Database

Application

User Credentials for Authentication and Authorization

Directory Server or Database

Application

User Credentials for Authentication and Authorization

Directory Server or Database

Application

End Users

Administrators Administrators Administrators Administrators

Redundant, silo’d application development

Non-uniform access policies

Orphan accounts Audit/Log

information fragmented

Page 17: Oracle Security & Identity Management July 20, 2005

Bring Order to Chaos with Identity

Application Application Application Application

End Users

AdministratorsUser Credentials

for Authentication

and Authorization

Centralized, policy-based management of access & authorization

Faster development and deployment

Centralized audit and logging

Page 18: Oracle Security & Identity Management July 20, 2005

Oracle ID Mgmt:Typical Deployments

Enterprise provisioning – Heterogeneous integration

Telco provisioning – Scalability & HA

Enterprise Portal– Single Sign-on, administrative delegation

Government R&D Organization, Corporate Conglomerates – Centralized Identities with autonomous administration of

departmental applications Multi-hosting with delegated subscriber admin

– Multiple identity realms in one physical infrastructure + HA

Page 19: Oracle Security & Identity Management July 20, 2005

Platform Security Architecture

External Security Services Oracle

Platform Security

Application Security

E-Business Suite

Collaboration Suite

Oracle Internet Directory

Public Key Infrastructure

DirectoryIntegration

RBAC &Web Authorization

Provisioning &Delegated Administration

ISV & CustomApplications

BPEL Prcs Mgr,BI, Portal, ADF

Oracle Database

Oracle Identity Management

Oracle Application Server

Access Management

DirectoryServices

ProvisioningServices

SSO &IdentityFederation

Oracle DatabaseOracle Application Server Oracle DatabaseOracle Application Server

Responsibilities, Roles ….

Secure Mail, Interpersonal Grants …

Authorization, Privacy, audit, ….

Roles, Privilege Groups …

Enterprise users, VPD, Label SecurityEncryption, Audit

JAAS, JACC, WS Security, …

Page 20: Oracle Security & Identity Management July 20, 2005

Internet Directory Scalability

– Millions of users – 1000’s of simultaneous clients

High availability– Multimaster & Fan-out replication– Hot backup/recovery, RAC, etc.

Manageability– Grid Control multi-node monitoring

Security– Comprehensive password policies– Role & policy based access control– Auditability

Extensibility & Virtualization– Plug-in Framework– Attribute and namespace virtualization– External authentication– Custom password policies

LDAPClients

DirectoryAdmin

Console

OID Server

OracleDatabase

Page 21: Oracle Security & Identity Management July 20, 2005

Directory Integration

Connectors

External Directories

SunOne

Active Directory

Oracle HR

Oracle DB

OpenLDAP

eDirectory

OracleInternet

Directory

DirectoryIntegration

Service

Page 22: Oracle Security & Identity Management July 20, 2005

Provisioning Integration

ERP,CRM,… eMail Portal

Partner Provisioning System

Oracle Provisioning Integration Service

Event Notification

Engine

Policy &Workflow

Engine

Self-service (Pswds, preferences)

Corporate HR(Employee Enrollment)

Helpdesk Admin

eMail Admin

OID

Portal Admin

Prov

isio

ning

Con

nect

ors

Page 23: Oracle Security & Identity Management July 20, 2005

OracleAS

Single Sign-on

Single Sign-On

PKI, pwd, Win2K Native Auth…

SecureID, Biokey,

ERP,CRM,…

eMail

Portal

Partner SSO (Netegrity, RSA, Oblix)

Partner SSO Enabled Environment

OracleAS Enabled Environment

OID

Extranet

Federation / Liberty

Integrates Oracle and partner-SSO enabled apps

Transparent access to DB Tier, 3rd party web apps

Multiple AuthN options Different auth modes to match

application security levels

Page 24: Oracle Security & Identity Management July 20, 2005

Demonstration

IdM: SSO

Page 25: Oracle Security & Identity Management July 20, 2005

SSO Benefits 1) Tightly integrated with the Oracle product

stack 2) Easy to deploy, part of Oracle Identity

Management 3) Supports PKI authentication with industry

standard X.509V3 certificates 4) Accepts Microsoft Kerberos tokens for easy

authentication in a windows environment 5) Integrated with Oracle Certificate

Authority (OCA) for easy provisioning of X.509V3 certificates using OCA

Page 26: Oracle Security & Identity Management July 20, 2005

Certificate Authority

Solution for strong authentication / PKI

Easy provisioning of X.509v3 digital certificates for end users

Web Based certificate management and administration

Seamless integration with Oracle Application Server Single Sign-On & OID

User

OracleCertificateAuthority

Metadata Repository

Secure IT Facility

OracleSingle

Sign-On

OracleInternet

Directory

Page 27: Oracle Security & Identity Management July 20, 2005

Future support SAML (Security Assertions Meta Language)

– facilitates interoperation and federation among security services. SPML (Service Provisioning Meta Language)

– XML standard that facilitates integration among provisioning environments by defining the protocol for interaction between provisioning service components and agents representing provisioned services.

DSML– XML standard for exchanging directory data as well as invoke

directory operations over the Internet.

Page 28: Oracle Security & Identity Management July 20, 2005

Future support (con’t) XKMS

– XML Key Management Specification. It is intended to simplify deployment of PKI in a web services environment.

WS-Security – defines a set of SOAP extensions that can be used to provide message

confidentiality, message integrity, and secure token propagation between Web Services and their clients

Liberty Alliance standards define the framework and protocol for network identity based interactions among users and services within a federated identity management environment.

Page 29: Oracle Security & Identity Management July 20, 2005

Delegated Administration Services Admin console w/ role-based

customization– User / group management– End-user vs Admin views– Admin delegation

End-user self-service– Self service provisioning– Set preferences, Org-chart– Pswd reset

Embeddable admin components– For integration with Apps

Extensively configurable– Accommodate new applications– Customize UI views

Page 30: Oracle Security & Identity Management July 20, 2005

Demonstration

IdM: Delegated Admin Svs

Page 31: Oracle Security & Identity Management July 20, 2005

Delegated Admin Benefits 1) Enables self service administration of passwords and

password resets 2) Enables administrative granularity of Identity

Management components 3) Centralized provisioning for web SSO and enterprise

user database access 4) Supports password or PKI based authentication 5) Self Service password management without the

intervention of an administrator 6) Delegated administrators, such as non-technical

managers, to create and manage both users and groups

7) Allows users to search parts of the directory to which they have access

Page 32: Oracle Security & Identity Management July 20, 2005

Client Client AuthenticatesAuthenticatesTo App ServerTo App Server

Securely Proxies User Securely Proxies User Identity to RDBMSIdentity to RDBMS

OIDOIDIIdentities, Rolesdentities, Roles& Authorizations& Authorizations

Grid ComputingEnd-to-End Security

• Retrieve Retrieve Authorizations Authorizations for Usersfor Users

• Connect users Connect users to Application to Application SchemaSchema

Authenticate userAuthenticate user

Application GridApplication Grid Data GridData Grid

Page 33: Oracle Security & Identity Management July 20, 2005

AS10g r2 New 3-tier features Via proxy authentication, including credential

proxy of X.509 certificates or Distinguished Names (DN) to the Oracle Database

Support for Type 2 JDBC driver, connection pooling for ‘application users’ (Type 2 and Type 4 JDBC Drivers, OCI)

Integration with Oracle Identity Management for Enterprise Users (EUS).

Page 34: Oracle Security & Identity Management July 20, 2005

Demonstration

User Security

Page 35: Oracle Security & Identity Management July 20, 2005

User Security Benefits 1) Enables centralized management of traditional

application users in Oracle Identity Management 2) Oracle Identity Management directory

integration services can be used for bi-directional synchronization with existing Identity Management infrastructures (AD, SunOne/iPlanet, Netscape)

3) Optionally map users to shared schemes or retain individual account mappings in database for complete application transparency

4) Optionally manage database roles in Oracle Identity Management infrastructure

5) Optionally can be used with Oracle Label Security to maintain security clearances in Oracle Identity Management

Page 36: Oracle Security & Identity Management July 20, 2005

My.

orac

le.c

omEmployees

Self-registered TechNet users

Oracle Technology Network

IDs, passwords, profiles, prefs

Oracle Files

IDs, passwords, profiles, prefs

Global Mail

IDs, passwords, profiles, prefs

Calendar

IDs, passwords, profiles, prefs

Web Mail / Calendar

IDs, passwords, profiles, prefs

ExtranetDMZ

Employees

Corporate Network

HR

IDs, passwords, profiles, prefs

Web ConferencingIntranet Web

AppsIntranet WebAppsIntranet Web

AppsIntranet WebApps

IDs, passwords, profiles, prefs

E-Business Apps

Oracle IT: Before ID Mgmt

Numerous Ids / Passwords & Sign-On

Partners / Suppliers

Page 37: Oracle Security & Identity Management July 20, 2005

My.

orac

le.c

omEmployee

s

Self-registered TechNet users

Oracle Technology Network

Oracle Files

Global Mail

Calendar

Web Mail / Calendar

Extranet DMZEmployee

s

Corporate Network

HR

Web Conferencing

Intranet WebAppsIntranet Web

AppsIntranet WebAppsIntranet Web

Apps

E-Business Apps

Oracle IT: After ID Mgmt

Partners / Suppliers

Oracle IdM Infrastructure

Single ID/Pswd & SSO

Page 38: Oracle Security & Identity Management July 20, 2005

Oracle IdM Summary Oracle Identity Management is a complete

infrastructure providing – directory services– directory synchronization– user provisioning– delegated administration– web single sign-on– and an X.509v3 certificate authority.

Oracle Identity Management is designed to provide ready, out-of-the-box deployment for Oracle applications, as well as serve as a general-purpose identity management infrastructure for the enterprise and beyond.

Page 39: Oracle Security & Identity Management July 20, 2005

Break

15 minutes

Page 40: Oracle Security & Identity Management July 20, 2005

Privacy & Access Control

Page 41: Oracle Security & Identity Management July 20, 2005

Oracle9i/10g Secure Application Role

• Secure application role is a role enabled by security code

• Application asks database to enable role (can be called transparently)

• Security code performs desired validation before setting role (privileges)

CREATE ROLE SAR identified using SCHEMA_USER.PACKAGE_NAME;

Oracle9i 10g

User A, HR ApplicationUser A, Financials ApplicationUser A, Ad-Hoc Reports

JDBC / Net8 / ODBC

Page 42: Oracle Security & Identity Management July 20, 2005

Secure Application Role Benefits Security policy can

check anything:– time of day– day of week– IP address/domain– Local or remote

connection– user connected through

application– X.509 data, etc.

Database controls whether privileges are enabled

Multiple applications can access database securely

Allows secure handshake between applications and database

Page 43: Oracle Security & Identity Management July 20, 2005

Demonstration

Secure Application Role

Page 44: Oracle Security & Identity Management July 20, 2005

Oracle Database 10g Virtual Private Database

Column Relevant Policies– Policy enforced only if specific columns are

referenced– Increases row level security granularity

Store ID

AX703

B789C

JFS845

SF78SD

Revenue

10200.34

18020.34

12341.34

13243.34

Department

Finance

Engineering

Legal

HR

OK

Select store_id, revenue… (enforce)

Page 45: Oracle Security & Identity Management July 20, 2005

Oracle Database 10g Virtual Private Database Column Filtering

– Optional VPD configuration to return all rows but filter out column values in rows which don’t meet criteria

OKOK

OK

OKStore ID

AX703

B789C

JFS845

SF78SD

Revenue

10200.34

18020.34

12341.34

13243.34

Department

Finance

Engineering

Legal

HR

Select revenue…..(enforce)

Page 46: Oracle Security & Identity Management July 20, 2005

Demonstration

Virtual Private Database

Page 47: Oracle Security & Identity Management July 20, 2005

Object Access Control

DATA TABLE

SELECT

Org ASELECT

Org B

Page 48: Oracle Security & Identity Management July 20, 2005

Oracle9i/10g Label Security

Out-of-the-box, customizable row level security Design based on stringent commercial and

government requirements for row level security

Sensitivity LabelSensitivity Label

PublicPublic

SensitiveSensitive

Highly SensitiveHighly Sensitive

Confidential : EuropeConfidential : Europe

ProjectProject

AX703

B789C

JFS845

SF78SD

LocationLocation

Chicago

Dallas

Chicago

Miami

DepartmentDepartment

Corporate Affairs

Engineering

Legal

Human Resource

Page 49: Oracle Security & Identity Management July 20, 2005

Components of Label Security

Levels– Sensitivity Level (e.g., “Top Secret, Secret,

Unclassified”) Compartments

– (‘X’,’Y’,’Z’), User must possess all Groups for “Need to Know”

– Hierarchical– Supports Organization Infrastructure

Label Components are the encoding within data labels and user labels that determine access.

Page 50: Oracle Security & Identity Management July 20, 2005

Oracle Label Security

Application Table

Oracle Label Security AuthorizationsConfidential : Partners

Sensitivity Label

Public

Confidential: Partners

Company Confidential

Company Confidential

Project

AX703

B789C

JFS845

SF78SD

Location

Boston

Denver

Boston

Miami

Department

Finance

Engineering

Legal

HR

OK

OK

Oracle9Oracle9iiOLSOLS

Page 51: Oracle Security & Identity Management July 20, 2005

Demonstration

Oracle Label Security

Page 52: Oracle Security & Identity Management July 20, 2005

Fine-grained Auditing

Select name, salary from emp where name = ‘KING’, <timestamp>, <username>

Audit Record Shows...

Enforce Audit Policy in Database

Employee Table

...Where Salary > 500000AUDIT COLUMN = Salary

Select name, salary from emp where...

User Queries...

Page 53: Oracle Security & Identity Management July 20, 2005

“ …Companies that properly maintain the security of their

systems will eliminate 90 percent of all potential exploits. Companies that fail to take these precautions should prepare for breaches at an

increasing rate.”- Giga Information

The Expert View

Page 54: Oracle Security & Identity Management July 20, 2005

Stored Data Encryption

DBMS_OBFUSCATION (9i)DBMS_CRYPTO (10g)

Credit Card !3Asjfk234 #k230d23* [email protected] #dkal3j49I3!

FirstDianaPaulJuliaSteven

LastRobertsNelsonPattersonDrake

Store Id100200100300

Oracle9Oracle9iiDatabaseDatabase

Page 55: Oracle Security & Identity Management July 20, 2005

Supported Encryption Standards

AES (128, 192 and 256 Key)RC4 (40, 56, 128, 256 Key)3DES (2 Key and 3 Key)MD5SHA1

Page 56: Oracle Security & Identity Management July 20, 2005

Demonstration

Data Encryption

Page 57: Oracle Security & Identity Management July 20, 2005

Advanced Security Option Encryption for data in motion

– RSA RC4 Public Key Encryption– 40, 56 and 128 bit key lengths– Support for Data Encryption Standard (DES)

algorithm– Support for Message Digest 5 (MD5)

checksumming algorithm

Page 58: Oracle Security & Identity Management July 20, 2005

Advanced Security Option Authentication device support

– RADIUS device– Token cards (securID for example)– Biometric devices

Secure Socket Layer– With X.509 V3 certificate support

Support for Open Software Foundation’s Distributed Computing Environment (DCE)

Page 59: Oracle Security & Identity Management July 20, 2005

Threats to Networks and Internet

1. Data Theft

Eavesdropperscan seeall data

x

2. Data Modification or Replay

x3. Data Disruption Packets can be stolen -- data never arrives

$500 becomes $50,000

Page 60: Oracle Security & Identity Management July 20, 2005

Demonstration

Network Encryption

Page 61: Oracle Security & Identity Management July 20, 2005

OblixBrief Overview and Roadmap

Page 62: Oracle Security & Identity Management July 20, 2005

Oblix: Pure-Play Product Leader

Gartner: “Leader” in Access

Management

Loosely Coupled: “Leader” in Web

Services Management

AbilityTo

Execute

Source Gartner Research(June 2004)

Page 63: Oracle Security & Identity Management July 20, 2005

Oblix COREidCOREid Access

Web Single Sign-On Flexible Authentication Methods Policy-based Authorization

COREid Provisioning

Template-based workflow Agent and Agentless account

provisioning Metadirectory synchronization Password synchronization Cross-platform connectivity

COREid Reporting

Centralized auditing Pre-built identity and security

reports Global View user access Robust logging framework

COREid Integration

Pre-built Connectors – to leading application servers, web servers, portal servers, and directory servers.

“Data Anywhere” Configuration

Benefits

Increased Security Integrated solution Define and enforce security, administrative,

and access control policies consistently across enterprise applications

Increased Compliance Audit events across entire enterprise Who has access to which applications Access control managed per attribute Meet Sarbanes-Oxley, HIPAA, and Gramm-

Leach-Bliley compliance

Increased Governance Centralized policy definition with localized

enforcement

User, Group, and Organization Management

Delegated Administration Self Service and Self

Registration Unified Workflow Identity Web Services Controls Password Management

COREid Identity

Page 64: Oracle Security & Identity Management July 20, 2005

Delegated Admin Service

Meta Directory (DIP)

Directory (OID)

Cert. Authority / PKI(OCA)

OracleAS SSO

Provisioning Integration (DIP)

Federation(Liberty / SAML-2.0)

Web Authorization

Virtual Directory

Provisioningconnectors

COREid Access

COREid Provisioning

COREid Identity

10g / 10.1.3 Oblix

Current Portfolios

Identity Grid Control

COREsv Web Services Management

Oracle / Oblix IdM Integration Roadmap

SHAREidIdentity Federation

Access Control

Integrated Portfolio

Directory (OID)

Identity Provisioning

Meta-Directory

Certificate Authority

SSO

WS Management Gateway

OracleAS Option

Virtual Directory

ID Grid Control

Auditing & Reporting

Oracle Identity Mgmt

Integration Roadmap

COREid Provisioning

COREid Identity &Access

Immediate Availability

Directory (OID)

Delegated Admin Service

Provisioning Integration

Certificate Authority

Oracle AS SSO

WS Management (COREsv)

Oracle-Oblix IdM

Oracle Identity Mgmt

OracleAS Option

COREid Federation

Page 65: Oracle Security & Identity Management July 20, 2005

IdM – What does Oracle offer today?

YesIdentity Integration Directory

Virtual Directory Meta-Directory

Identity & Access Mgmt

PKI Certificate Services

Password Management

Web Authorizations

Identity Federation

Security Monitoring &

Audit Services

Privacy & Compliance

ManagementSSO

DelegatedAdmin

Policy Based Access Ctrl

Role Based Access Ctrl

Non-web & 3rd party SSO

Oracle - Full FunctionalityOracle - Full FunctionalityOracle - Limited FunctionalityOracle - Limited Functionality Planned FunctionalityPlanned Functionality

Partner OfferingPartner Offering

Enterprise Provisionin

gAutomation

Page 66: Oracle Security & Identity Management July 20, 2005

Current offering with Oblix today

YesIdentity Integration Directory

Virtual Directory Meta-Directory

Identity & Access Mgmt

PKI Certificate Services

Password Management

Web Authorizations

Identity Federation

Security Monitoring &

Audit Services

Privacy & Compliance

ManagementSSO

DelegatedAdmin

Policy Based Access Ctrl

Role Based Access Ctrl

Non-web & 3rd party SSO

Oracle - Full FunctionalityOracle - Full FunctionalityOracle - Limited FunctionalityOracle - Limited Functionality Planned FunctionalityPlanned Functionality

Partner OfferingPartner Offering

Enterprise Provisionin

gAutomation

Page 67: Oracle Security & Identity Management July 20, 2005

Thursday, August 11, 20058:00 am - 11:00 am

(Breakfast & Registration at 8:00am)

Oracle Office - Cincinnati 312 Elm Street

Suite 1525Cincinnati, OH 45202

•Oracle COREid Access & Identity

•Oracle COREid Federation

•Oracle COREid Provisioning

•Oracle Single Sign On/Oracle Internet Directory

•Oracle Application Server, Enterprise Edition

•Oracle Web Services Manager

http://www.oracle.com/webapps/events/EventsDetail.jsp?p_eventId=42000&src=3830746&src=3830746&Act=41

Page 68: Oracle Security & Identity Management July 20, 2005

AQ&Q U E S T I O N SQ U E S T I O N SA N S W E R SA N S W E R S

Page 69: Oracle Security & Identity Management July 20, 2005

Additional Slides

Page 70: Oracle Security & Identity Management July 20, 2005

Security Tips 101“Oracle Security Step-by-step”

– By Pete Finnigan– SANS Press

Page 71: Oracle Security & Identity Management July 20, 2005

Security Tips 101 Keep up with security patches!

– Security alerts from Oracle Technology Network site– Security Issues Website

Page 72: Oracle Security & Identity Management July 20, 2005

Security Tips 101 Check your file system privileges If on Windows, use NTFS not FAT or FAT32

Prevent seeing passwords with UNIX “ps” command–Note 136480.1 or 1009091.6

Check privileges on export files in OS

Page 73: Oracle Security & Identity Management July 20, 2005

Security Tips 101 If a full export is done to populate a test

database, immediately change all passwords

No database user except SYS must have:–ALTER SYSTEM–ALTER SESSION

Page 74: Oracle Security & Identity Management July 20, 2005

Security Tips 101 Change default passwords:

– List of default users and passwords– Where to get this list

SYS should not be “CHANGE_ON_INSTALL” !!!!SYSTEM should not be “MANAGER” !!!!

Page 75: Oracle Security & Identity Management July 20, 2005

Security Tips 101 Check scripts that are in the file system that

have embedded passwords! Make sure REMOTE_OS_AUTHENT = FALSE

–(Allows login without password) REMOTE_OS_ROLES = FALSE also Check for all users with DBA role

Check for users or roles with an “ANY” privilege–UPDATE ANY TABLE

–DROP ANY TABLE

Page 76: Oracle Security & Identity Management July 20, 2005

Security Tips 101 Revoke RESOURCE role from normal users

No users or roles should have access to:–dba_users–Sys.link$

–Sys.user$–Sys.user_history$

These have clear text passwords!

Page 77: Oracle Security & Identity Management July 20, 2005

Security Tips 101 Make sure your listener has a password Use “Current User” database links if possible

–“CONNECT TO CURRENT USER” Check database links from Test, Dev and QA instances. Remove any that are not absolutely necessary

Avoid plain text passwords in batch files. Use an encryption utilityAvoid external accounts for batch processes

Page 78: Oracle Security & Identity Management July 20, 2005

Security Tips 101 Use the Oracle Security Checklists:

– 9i R2 Security Checklist– 9iAS Security Checklist

Or third party utilities to check your security Oracle Enterprise Manager 10g includes

Security Checking

Page 79: Oracle Security & Identity Management July 20, 2005

Security Tips 101 1. Only two highly trusted DBAs have sys privileges 2. All other DBAs log in using unique user IDs and those

IDs be granted ONLY the privileges needed to do their job. 3. Partition responsibilities as much as possible between

the DBAs 4. Security administration, not DBAs, have the ability to

grant or change access privileges 5. Employ strong password policies 6. Audit ALL activities the DBAs do 7. Audit ALL activities the two trusted DBAs do both in their

regular login and when connected as sys. (9iR2 and higher)

Page 80: Oracle Security & Identity Management July 20, 2005

Security Tips 101 8. Audit logs are locked out of DBAs reach and

monitored and reviewed by security administration, possibly stored on a separate system

9. Replicate the logs to help identify if a log has been tampered with

10. Audit ALL DML on the audit logs 11. Set up fine grained auditing alerts on key information

when there is attempted access by unauthorized persons. These alerts are sent to the security administrator.

12. If offshore DBA services are employed, track everything they do very closely and restrict what they can see or do.