Security Technology Center

オラクルは、幅広い製品やプロセス、およびテクノロジを通じてセキュアなインフラストラクチャを提供し、機密情報への未承認のアクセスを防ぎ、ユーザー管理のコストを削減し、プライバシ管理を容易にするサポートを行います。

 View the most recent Critical Patch Update Advisory

What's New

Technical Article: Authorizing Access to Dynamic Spatial-Temporal Data
Authorizing access to individual data objects based on spatial and temporal references is a complex task. Read this case study to learn one feasible approach.

Download: Oracle Authentication Services for Operating Systems
Oracle Authentication Services for Operating Systems, which provides centralized authentication and account management for Unix and Linux platforms, is now available for download.

Tutorial: Defending Against SQL Injection Attacks
By taking this self-study tutorial, you can arm yourself with techniques and tools to strengthen your code and applications against SQL Injection attacks.

Blog: Understanding the Common Vulnerability Scoring System (CVSS)
This official blog entry from the Oracle Security Team explains the details and background about Oracle's implementation of CVSS.

技術文書: Javaアプリケーションにおける行レベル・セキュリティの実装
Learn how to enforce row-level security across your JEE application, from database to cache. From Oracle Fusion Middleware Regional Director Lonneke Dikmans.

Technical Article: Database-Based Authentication for PHP Apps
Learn how to secure PHP-based Web applications via database-based authentication in this two-part tutorial, with sample code included.


ドキュメントおよびベスト・プラクティス

Critical Patch Updateの実装 (PDF)
Database Vault ベスト・プラクティス (PDF)
Oracle Security Overview
Oracle Database Security Guide
Oracle Application Server セキュリティ・ガイド
Oracle Identity Managementによる米国サーベンス・オクスリー(Sarbanes-Oxley, SOX)法への 対応 (PDF)

コミュニティ・コンテンツ

Learn Database Security Best Practices: Project Lockdown
How To Encrypt Data in Oracle Using PHP
Securing a .NET Application on the Oracle Database
Understanding Transparent Data Encryption
Database Security: Beyond the Password
Using VPD in an Oracle HTML DB Application
Encrypt Your Data Assets
Fine-Grained Auditing in Oracle Database 10g (3-part series)
Oracle 10g Virtual Private Database in Action
More Security Articles...