CITATION

Knox, David; Gaetjen, Scott; Jahangir, Hamza; Muth, Tyler; Sack, Patrick; Wark, Richard; and Wise, Bryan. Applied Oracle Security: Developing Secure Database and Middleware Environments. US: McGraw-Hill Osborne Media, 2009.

Applied Oracle Security: Developing Secure Database and Middleware Environments

Published:  September 2009

eISBN: 9780071613712 0071613714 | ISBN: 9780071613705
  • Contents
  • Foreword
  • Acknowledgments
  • Part I: Oracle Database Security New Features
  • 1 Security Blueprints and New Thinking
  • About This Book
  • Database Security Today
  • Security Motivators
  • Modeling Secure Schemas
  • Getting Started
  • Summary
  • 2 Transparent Data Encryption
  • Encryption 101
  • Encrypting Data Stored in the Database
  • The Transparent Data Encryption Solution
  • Tablespace Encryption: New with Oracle 11g
  • Oracle 11g Configuration
  • Summary
  • 3 Applied Auditing and Audit Vault
  • An Era of Governance
  • Auditing for Nonsecurity Reasons
  • The Audit Data Warehouse
  • What to Audit and When to Audit
  • The Audit Warehouse Becomes the Audit Vault
  • Installation Options
  • Summary
  • Part II: Oracle Database Vault
  • 4 Database Vault Introduction
  • The Security Gap
  • Database Vault Components
  • Installing Oracle Database Vault
  • Summary: Database Vault Is Differentiating Security
  • 5 Database Vault Fundamentals
  • Realms
  • Command Rules
  • Rule Sets
  • Factors
  • DBV Secure Application Roles
  • Summary
  • 6 Applied Database Vault for Custom Applications
  • Notional Database Applications Environment
  • From Requirements to Security Profile Design
  • Requirements Technique: Use Cases and Scenarios
  • Identify Coarse-Grained Security Profile
  • Identify Fine-Grained Security Profile
  • Identify DBV Factors Based on Business or System Conditions
  • Identify DBV Realms and Realm Objects Based on Objects
  • Identify Accounts, Roles, and DBV Realm Authorizations from Use Case Actors
  • Establish DBV Command Rules from Conditions
  • Establish DBV Secure Application Roles from Conditions
  • Summary
  • 7 Applied Database Vault for Existing Applications
  • Audit Capture Preparation
  • Capturing Audits
  • Analyzing the Audit Trail
  • Integrating DBV with Oracle Database Features
  • Advanced Monitoring and Alerting with a DBV Database
  • Summary
  • Part III: Identity Management
  • 8 Architecting Identity Management
  • Understanding the Problem with Identity Management
  • Architecting Identity Management
  • Oracle Identity Management Solutions
  • Summary
  • 9 Oracle Identity Manager
  • The User Provisioning Challenge
  • Oracle Identity Manager Overview
  • User Provisioning Processes
  • User Provisioning Integrations
  • Reconciliation Integrations
  • Compliance Solutions
  • OIM Deployment
  • Summary
  • 10 Oracle Directory Services
  • Identity Management and the LDAP Directory
  • Oracle Internet Directory
  • Directory Virtualization and Oracle Virtual Directory
  • OVD Applied
  • Summary
  • Part IV: Applied Security for Oracle APEX and Oracle Business Intelligence
  • 11 Web-centric Security in APEX
  • Introduction to the APEX Environment
  • Securing an APEX Instance
  • Protecting the APEX Database Schemas
  • Summary
  • 12 Secure Coding Practices in APEX
  • Authentication and Authorization
  • SQL Injection
  • Cross-site Scripting
  • Leveraging Database Security Features
  • Summary
  • 13 Securing Access to Oracle BI
  • The Challenge in Securing BI
  • What Needs To Be Secured
  • Mechanics of Accessing Data with Oracle BI
  • Authentication and Authorization
  • Single Sign-On
  • Deploying in a Secure Environment
  • Securing the BI Cache
  • Public-facing Applications
  • Summary
  • 14 Securing Oracle BI Content and Data
  • Securing Web Catalog Content
  • Conveying Identity to the Database
  • Securing Data Presented by Oracle BI
  • Oracle BI and Database Vault
  • Auditing
  • BI Features with Security Implications
  • Summary
  • A: Using the Oracle BI Examples
  • Users and Groups
  • Database Preparations
  • Database Auditing
  • Database Scripts
  • Oracle BI Setup
  • Credential Store
  • BI Publisher Superuser
  • Other BI Publisher Configuration Steps
  • Sample BI Publisher Report
  • Scheduler Configuration
  • Usage Tracking
  • Recommend Testing
  • Oracle BI Tests
  • BI Publisher Tests
  • Oracle Delivers Tests
  • Sample Web Catalog Description
  • SH Dashboard
  • Utilities Dashboard
  • Other Dashboards
  • Sample RPD Descriptions
  • Common to All RPDs
  • Internal Authentication
  • Internal Authentication with Act as Proxy Enabled
  • Column-based Security
  • Table-based Authentication
  • Database Authentication
  • LDAP Authentication
  • SSO Integration
  • Summary
  • Index