Security Technology Center

オラクルは、幅広い製品やプロセス、およびテクノロジを通じてセキュアなインフラストラクチャを提供し、機密情報への未承認のアクセスを防ぎ、ユーザー管理のコストを削減し、プライバシ管理を容易にするサポートを行います。


 最新の Critical Patch Update Advisory を見る
 Oracle Software Security Assurance Blog を読む(US)

What's New

Untitled Document
January 2015 Critical Patch Update Released
This Oracle Critical Patch Update provides 169 new fixes for security issues across a wide range of product families.
posted Tue, 20 Jan 2015 22:24:31 +0000
The Future of User Authentication
"The best authentication model is useless if customers or employees find it difficult to use," says Prateek Mishra. "This is the key reason why it has proven so difficult to transition away from passwords."
posted Wed, 14 Jan 2015 16:55:17 +0000
Resilience: Bouncing Back When Bad Things Happen
"From an IT perspective, the next time you design a solution or a system, stop and think about how your solution or system could be designed for greater resilience. You'd be amazed how simple and inexpensive it can be once you invest a little brain power."
posted Mon, 12 Jan 2015 14:51:33 +0000
Minecraft and Identity Management: What an Identity Management guy learned from managing a world populated by tweens and teens
In the span of two years, Oracle Identity Management and Mobile Security product management VP Clayton Donley, has learned a lot about managing a system where the bulk of the users have pre-teen or early teen levels of maturity. He shares lessons learned in this informative and entertaining article.
posted Mon, 05 Jan 2015 18:16:00 +0000
BPM Workspace Login with libOVD and LDAP, Part 2: Login
Part 2 in solution architect Siming Mu's series examines what happens inside libOVD when you actually click on the login button in BPM Workspace.
posted Fri, 19 Dec 2014 15:47:22 +0000
Securing Access with OAuth2: How to deal with OAuth Scopes
Oracle uses OAuth2 to secure access to Web Services exposed by Oracle Public Cloud services. While the standard itself is relatively straightforward, there are a couple of areas that each implementation must address on its own. Vadim Lander's article looks at one such area: OAuth scopes.
posted Wed, 10 Dec 2014 14:27:36 +0000
More...

ドキュメントおよびベスト・プラクティス

Critical Patch Updateの実装 (PDF)
Database Vault ベスト・プラクティス (PDF)
Oracle Security Overview
Oracle Database Security Guide
Oracle Application Server セキュリティ・ガイド
Oracle Identity Managementによる米国サーベンス・オクスリー(Sarbanes-Oxley, SOX)法への 対応 (PDF)

コミュニティ・コンテンツ

Learn Database Security Best Practices: Project Lockdown
How To Encrypt Data in Oracle Using PHP
Securing a .NET Application on the Oracle Database
Understanding Transparent Data Encryption
Database Security: Beyond the Password
Using VPD in an Oracle HTML DB Application
Encrypt Your Data Assets
Fine-Grained Auditing in Oracle Database 10g (3-part series)
Oracle 10g Virtual Private Database in Action
More Security Articles...