Your corporate policy requires that you monitor your databases and retain
audit records. Your developers are asking for copies of
production data for that new application, and you're wondering
what kinds of sensitive information it will contain. Meanwhile,
you need to make sure that recent maintenance activities haven't
left critical security configuration gaps on your production
databases and that staff changes haven't left dormant user
accounts on the databases. Oracle Data Safe assists you with
these tasks and is included with your Exadata Database Service*.
Oracle Data Safe is a unified control center, that helps you to manage
the day-to-day security and compliance requirements of Oracle
Databases no matter if they are running in the Oracle Cloud
Infrastructure, at Cloud@Customer, on-premises or in any other
cloud.
Data Safe supports you to evaluate security controls, assess user
security, monitor user activity, and address data security
compliance requirements for your database by evaluating the
sensitivity of your data as well as masking sensitive data for
non-production databases.
Data Safe provides the following features:
Security Assessment: Configuration errors and
configuration drift are significant contributors to
data breaches. Use security assessment to evaluate
your database's configuration and compare it to
Oracle and industry best practices. Security
assessment reports on areas of risk and notifies you
when configurations change.
User Assessment: Many breaches start with a
compromised user account. User Assessment helps you
spot the riskiest database accounts - those accounts
which, if compromised, could cause the most damage -
and take proactive steps to secure them. User
Assessment Baselines make it easy to know when new
accounts are added, or an account's privileges are
modified. Use OCI events to receive proactive
notifications when a database deviates from its
baseline.
Activity Auditing: Understanding and reporting on
user activity, data access, and changes to database
structures supports regulatory compliance
requirements and can aid in post-incident
investigations. Activity auditing collects audit
records from databases and helps you manage audit
policies. Audit insights make it easy to identify
inefficient audit policies, while alerts based on
audit data proactively notify you of risky
activity.
Sensitive Data Discovery: Knowing what sensitive data
is managed in your applications is critical for
security and privacy. Data discovery scans your
database for over 150 different types of sensitive
data, helping you understand what types and how much
sensitive data you are storing. Use these reports to
formulate audit policies, develop data masking
templates, and create effective access control
policies.
Data Masking: Minimizing the amount of sensitive data
your organization maintains helps you meet
compliance requirements and satisfy data privacy
regulations. Data masking helps you remove risk from
your non-production databases by replacing sensitive
information with masked data. With reusable masking
templates, over 50 included masking formats, and the
ability to easily create custom formats for your
organization's unique requirements, data masking can
streamline your application development and testing
operations.
SQL Firewall Management: Protect against risks such as SQL injection attacks or compromised accounts. Oracle SQL Firewall is a new security capability built into the Oracle Database 23ai kernel and offers best-in-class protection against these risks. The SQL Firewall feature in Oracle Data Safe lets you centrally manage and monitor the SQL Firewall policies for your target databases. Data Safe lets you collect authorized SQL activities of a database user, generate and enable the policy with allowlists of approved SQL statements and database connection paths and provides a comprehensive view of any SQL Firewall violations across the fleet of your target databases.
*Includes 1 million audit records per database per month if using the
audit collection for Activity Auditing
If your database is running in a private virtual cloud network (VCN), you can connect
it to Data Safe via a Data Safe private endpoint.
The private endpoint essentially represents the Oracle Data Safe service in your VCN
with a private IP address in a subnet of your choice.
You can create the private endpoint in the VCN of your database either before the
registration or during the registration process. You can find more details on how to
create the private endpoint under Create an Oracle Data Safe Private
Endpoint.
Once your database is registered in Data Safe, you can leverage all features.
Security Assessment
Security Assessments are automatically scheduled once a week in Data Safe and provide an
overall picture of your database security posture. It analyzes your database configurations,
users and user entitlements, as well as security policies to uncover security risks and
improve the security posture of Oracle Databases within your organization. A security
assessment provides findings with recommendations for remediation activities that follow
best practices to reduce or mitigate risk.
User Assessments are automatically scheduled once a week in Data Safe and help you to
identify highly privileged user accounts that could pose a threat if misused or compromised.
User Assessment reviews information about your users in the data dictionaries on your target
databases and then calculates a potential risk for each user, based on system privileges and
role grants.
Data Discovery searches for sensitive columns in your database. It comes with over 150
pre-defined sensitive types and you can also create your own sensitive types. You tell Data
Discovery if you want to scan your entire database or just certain schemas and what type of
sensitive information to look for, and it finds the sensitive columns that meet your
criteria and stores them in a sensitive data model (SDM).
Data masking, also known as static data masking helps you to replace sensitive or
confidential information in your non-production databases with realistic and fully
functional data with similar characteristics as the original data. Data Safe comes with
pre-defined masking formats for each of the pre-defined sensitive types that can also be
leveraged for your own sensitive types.
Once you know where sensitive data is stored in your database (for instance after running
Data Discovery in Data Safe), you can start by creating a masking policy: Create Masking Policies
Activity Auditing in Oracle Data Safe helps to ensure accountability and improve regulatory
compliance. With Activity Auditing, you can collect and retain audit records per industry
and regulatory compliance requirements and monitor user activities on Oracle databases with
pre-defined reports and alerts. For example, you can audit access to sensitive data,
security-relevant events, administrator and user activities, activities recommended by
compliance regulations like the Center for Internet Security (CIS), and activities defined
by your own organization.
If you are using the audit collection in Data Safe, up to 1 million audit records per
target database per month are included for your Cloud@Customer database.
To use activity auditing, start the audit trail for your target database in Data Safe:
Start an Audit Trail
SQL Firewall in Oracle Data Safe lets you centrally manage the SQL Firewalls and provides a comprehensive view of SQL Firewall violations across the fleet of your target databases. Data Safe lets you collect authorized SQL activities of a database user you wish to protect, monitor the progress of the collection, generate and enable the policy with allowlists of approved SQL statements and database connection paths.
Once you start enforcing the SQL Firewall policy, you can monitor and analyze the violations in the pre-defined violation reports: View and Manage Violations Reports.