Oracle Database 12c Security Front Cover

Oracle Database 12c Security

Description

Best Practices for Comprehensive Oracle Database Security

Written by renowned experts from Oracle’s National Security Group, Oracle Database 12c Security provides proven techniques for designing, implementing, and certifying secure Oracle Database systems in a multitenant architecture. The strategies are also applicable to standalone databases. This Oracle Press guide addresses everything from infrastructure to audit lifecycle and describes how to apply security measures in a holistic manner. The latest security features of Oracle Database 12c are explored in detail with practical and easy-to-understand examples.

  • Connect users to databases in a secure manner
  • Manage identity, authentication, and access control
  • Implement database application security
  • Provide security policies across enterprise applications using Real Application Security
  • Control data access with Oracle Virtual Private Database
  • Control sensitive data using data redaction and transparent sensitive data protection
  • Control data access with Oracle Label Security
  • Use Oracle Database Vault and Transparent Data Encryption for compliance, cybersecurity, and insider threats
  • Implement auditing technologies, including Unified Audit Trail
  • Manage security policies and monitor a secure database environment with Oracle Enterprise Manager Cloud Control

Table of Contents

PART I Essential Database Security
Chapter 1. Security for Today’s World
Chapter 2. Essential Elements of User Security
Chapter 3. Connection Pools and Enterprise Users
Chapter 4. Foundational Elements for a Secure Database
Chapter 5. Foundational Elements of Database Application Security
Chapter 6. Real Application Security

PART II Advanced Database Security
Chapter 7. Controlled Data Access with Virtual Private Database
Chapter 8. Essential Elements of Sensitive Data Control
Chapter 9. Access Controls with Oracle Label Security
Chapter 10. Oracle Database Vault: Securing for the Compliance Regulations, Cybersecurity, and Insider Threats
Chapter 11. Oracle Transparent Data Encryption: Securing for the Compliance Regulations, Cybersecurity, and Insider Threats

PART III Security and Auditing for the Cloud
Chapter 12. Audit for Accountability
Chapter 13. An Applied Approach to Multitenancy and Cloud Security

Appendix A Sample Preparation Scripts

To access the link, solve the captcha.