Oracle Autonomous Database helps organizations transform IT database operations by automatically patching, updating, securing, and managing itself—reducing the risk of human error and unexpected downtime, and accelerating the pace of innovation while using fewer resources.
Here’s how Oracle Autonomous Database delivers.
Oracle Autonomous Database automates formerly manual security tasks, helping reduce security administration costs by up to 55%.
Proactive security automation, including automated patching, can also reduce the risk of data breaches occurring after common vulnerability and exposure alerts have been issued.
Patches are deployed with zero downtime, enabling organizations to stay safe and productive while removing the risks of human error and administrative neglect.
As in Oracle Cloud Infrastructure, data in Oracle Autonomous Database is always encrypted—whether at rest or in motion.
Each Oracle Autonomous Database service is automatically configured to use industry-standard Transport Layer Security (TLS) 1.2 to encrypt data in transit, while data at rest is encrypted using Oracle Transparent Data Encryption.
Oracle Transparent Data Encryption not only helps simplify compliance with data-privacy regulations like GDPR, CCPA, and PCI, but prevents OS users from abusing their privileges to access sensitive data. It also helps to prevent data theft, data loss, and improper storage and backup decommissioning.
Separation of duties
Oracle Autonomous Database eliminates direct access to the database node and local file system, while isolation between service administrators and service consumers is delivered through Oracle Database Vault.
This separation of duties reduces the risk of administrator wrongdoing and eliminates Oracle service administrators' ability to view or modify enterprise data stored in Oracle Autonomous Database. Security controls within Oracle Database Vault can also help you stay compliant with data privacy laws and standards—such as GDPR—and prevent user-privilege abuse.
Separation of duties also makes it more difficult for cybercriminals to disable security controls, create false users, and access sensitive data.
A popular telecommunications provider has a legally binding obligation to its many global customers that the data with which it is entrusted will not be disclosed.
Unfortunately, a breach does one day occur, and it’s quickly discovered that it could have been prevented had the provider’s database been updated with the latest security requirements. The cause? Human error, resulting in an unpatched system, allowed cybercriminals to take advantage of a short window of vulnerability and access sensitive customer data.
By moving to a self-securing database that automates encryption and patching, the provider not only eliminates chances of future human error, but improves its security hygiene and rebuilds trust among its customer base.