未找到结果

您的搜索操作未匹配到任何结果。

我们建议您尝试以下操作,以帮助您找到所需内容:

  • 检查关键词搜索的拼写。
  • 使用同义词代替键入的关键词,例如,尝试使用“应用”代替“软件”。
  • 请尝试下方显示的热门搜索之一。
  • 重新搜索。
热门问题

Oracle Database Vault

Oracle Database Vault implements data security controls within Oracle Database to restrict access to application data by privileged users. Reduce the risk of insider and outside threats and address compliance requirements, including separation of duties.

Join the Oracle database security monthly community call.

Explore Oracle Database Vault

Database Vault realms

Block unauthorized access to sensitive data by creating restricted application environments within Oracle Database.


Database Vault command rules

Block accidental or malicious changes to production databases attempted outside specific maintenance windows.


Database Vault trusted paths

Use factors like client IP address, program, user name, and time of day to control access to data and data operations.


Separation of duties

Allow only defined security roles to manage users, profiles, and security controls while limiting administrators to managing only the database.


Rakuten logo

Rakuten Securities restricts access to sensitive data with Oracle Database Vault

“Only Oracle could provide a one-stop shop for database security solutions, including access control and data encryption. It also met our requirements to enable a defense-in-depth protection approach by allowing surveillance of not only data in the database, but also the files in the operating system.”

Takamitsu Arano,
Acting Manager, IT Division, CIF System Department, Rakuten Securities, Inc.

 

Oracle Database Vault use cases

  • Protect sensitive data

    Block attackers from accessing sensitive data with stolen privileged user credentials—the most common attack vector today.

  • Prevent inadvertent access

    Block accidental access by database administrators to sensitive data without compromising their ability to perform necessary tasks.

  • Prevent unauthorized database changes

    Block accidental or malicious changes to production databases and restrict authorized changes to defined maintenance periods.

  • Enforce policy-based access control

    Prevent misuse of privileged credentials outside allowed IP address, time of day, client programs, and more.

  • Separation of duties

    Define and separate roles for security and administration so administrators can’t modify security policies or access sensitive data.

You may also be interested in

Technical report

Learn more about Database Vault

Datasheet

Features, benefits and more

Frequently asked questions

Get the answers

Oracle database security

Learn about more security solutions

Get started


Run the Database Security Assessment Tool

Quickly identify your database security posture and get recommendations to mitigate risks.


Try Oracle Autonomous Database

Try Autonomous Database with tools such as Oracle Application Express and Oracle SQL Developer.