Back to Oracle Database Security homepage

Fine Grained Auditing

Fine Grained Auditing (FGA), introduced with Oracle9i, can be understood as 'policy-based auditing'. As opposed to the standard auditing functionality, FGA lets you specify the conditions necessary for an audit record to be generated:

FGA policies are programatically bound to the object (table, view) by using the 'dbms_fga' package. It allows you to create any desired condition, for example: Audit an event only when the following conditions are true:

  • A table is accessed between 6 p.m. and 6 a.m. and on Saturday and Sunday.
  • An IP address from outside the corporate network is used.
  • A specific column has been selected or updated.
  • A specific value for this column has been used.

This creates more meaningful audit trails, since not each and every access to a table is recorded. Starting with Oracle Database 10g, FGA supports all combinations of 'select', 'insert', 'update' and 'delete' statements in one policy. The fact that the FGA policy is bound to the table simplifies management of audit policies, since it needs only to be changed once in the database, not in each and every application. Additionally, no matter how a user connects to the database (via an application, a Web interface or through SQL*Plus), her actions are recorded.

Audit trail records created by Fine Grained Auditing can be captured and analyzed in Oracle Audit Vault, automatically alerting the security team about possible malicious activity. Click here for more information about Oracle Audit Vault.


Hands-On


 Oracle by Example
 Auditing Tells All: A closer look at FGA

Related Technologies


 Database Firewall
 Audit Vault
 Data Masking (pdf)
 Secure Backup
 Configuration Management
 Identity Management

Discussion Forums


 Security
 Audit Vault
 Database

Security Options


 Oracle Database Vault
 Oracle Advanced Security
 Oracle Label Security

Security Features


 Data Encryption
 Virtual Private Database
 Database Auditing
 Backup Encryption
 Export file encryption
 Proxy Authentication
 Enterprise User Security
 Secure Application Roles
 Fine Grained Auditing
Left Curve
Popular Downloads
Right Curve
Untitled Document
Left Curve
More Database Downloads
Right Curve