找不到任何結果

您的搜尋未與任何結果相符。

以下操作有助您找到所需內容,建議您不妨一試:

  • 檢查您關鍵字搜尋的拼字是否正確。
  • 改用您所輸入關鍵字的同義詞,例如以「應用軟體」取代「軟體」。“”“”
  • 嘗試下列其中一項熱門搜尋。
  • 開始新的搜尋。
常見問題

Oracle Database Vault

Oracle Database Vault implements data security controls within Oracle Database to restrict access to application data by privileged users. Reduce the risk of insider and outside threats and address compliance requirements, including separation of duties.

Join the Oracle database security monthly community call.

Explore Oracle Database Vault

Database Vault realms

Block unauthorized access to sensitive data by creating restricted application environments within Oracle Database.


Database Vault command rules

Block accidental or malicious changes to production databases attempted outside specific maintenance windows.


Database Vault trusted paths

Use factors like client IP address, program, user name, and time of day to control access to data and data operations.


Separation of duties

Allow only defined security roles to manage users, profiles, and security controls while limiting administrators to managing only the database.


Rakuten logo

Rakuten Securities restricts access to sensitive data with Oracle Database Vault

“Only Oracle could provide a one-stop shop for database security solutions, including access control and data encryption. It also met our requirements to enable a defense-in-depth protection approach by allowing surveillance of not only data in the database, but also the files in the operating system.”

Takamitsu Arano,
Acting Manager, IT Division, CIF System Department, Rakuten Securities, Inc.

 

Oracle Database Vault use cases

  • Protect sensitive data

    Block attackers from accessing sensitive data with stolen privileged user credentials—the most common attack vector today.

  • Prevent inadvertent access

    Block accidental access by database administrators to sensitive data without compromising their ability to perform necessary tasks.

  • Prevent unauthorized database changes

    Block accidental or malicious changes to production databases and restrict authorized changes to defined maintenance periods.

  • Enforce policy-based access control

    Prevent misuse of privileged credentials outside allowed IP address, time of day, client programs, and more.

  • Separation of duties

    Define and separate roles for security and administration so administrators can’t modify security policies or access sensitive data.

You may also be interested in

Technical report

Learn more about Database Vault

Datasheet

Features, benefits and more

Frequently asked questions

Get the answers

Oracle database security

Learn about more security solutions

Get started


Run the Database Security Assessment Tool

Quickly identify your database security posture and get recommendations to mitigate risks.


Try Oracle Autonomous Database

Try Autonomous Database with tools such as Oracle Application Express and Oracle SQL Developer.