Security and Compliance
Security and compliance requires a defense in depth, multi-layered security model that includes preventive, detective, and administrative controls that are aligned with the sensitivity of the data, its location, its environment, applicable regulations, and business impact should the data be lost, stolen, or used for unauthorized purposes. Oracle Database 12c combined with Oracle Audit Vault and Database Firewall provides unprecedented controls to help address existing and emerging security and compliance requirements.
Oracle Database 12c Security and Compliance – Oracle Database 12c delivers state of the art capabilities that include conditional auditing, data redaction, transparent data encryption, privilege analysis, privileged user controls, command controls, and support for application users, roles, and privileges.
|Oracle Database Vault provides privileged user controls, command controls, and privilege analysis, helping prevent data breaches resulting from threats, external or internal, that target applications and privileged user accounts.|
|Oracle Advanced Security provides transparent data encryption and data redaction helping prevent database bypass attacks that target operating system files and reduce the exposure of sensitive data in applications.|
|Oracle Data Masking provides end to end automation for provisioning test from production databases in compliance with regulations. Sensitive information such as credit card or social security numbers can be replaced and used for development and testing without expanding the security perimeter.|
|Oracle Label Security provides label based access control enabling multi-level security and restricting access to data based on data classification and user security clearance.|
|Oracle Audit Vault and Database Firewall provides a first line of defense for Oracle and non-Oracle databases, providing controls to block SQL injection threats and enforce the trust-but-verify principle through consolidation of audit data from databases, operating systems, and directories. Dozens of out of the box reports combined with alerting capabilities provide proactive notification of potential threats or unauthorized activity.|