Text
Applied oracle security: developing secure database and middleware environtments
Contents
Part I: Oracle Database Security New Features
Chapter 1. Security Blueprints and New Thinking
1.1. About this Book
1.2. Database Security Today
1.3. Security Motivators
1.4. Modeling Secure Schemas
1.5. Getting Started
1.6. Summary
Chapter 2. Transparent Data Encryption
2.1. Encryption 101
2.2. Encrypting Data Stored in the Database
2.3. The Transparent Data Encryption Solution
2.4. Tablespace Encryption: New with Oracle 11g
2.5. Oracle 11g Configuration
2.6. Summary
Chapter 3. Applied Auditing and Audit Vault
3.1. An Era of Governance
3.2. Auditing for Nonsecurity Reasons
3.3. The Audit Data Warehouse
3.4. What to Audit and When to Audit
3.5. The Audit Warehouse Becomes the Audit Vault
3.6. Installation Options
3.7. Summary
Part II: Oracle Database Vault
Chapter 4. Database Vault Introduction
4.1. The Security Gap
4.2. Database Vault Components
4.3. Installing Oracle Database Vault
4.4. Summary
Chapter 5. Database Vault Fundamentals
5.1. Realms
5.2. Command Rules
5.3. Rule Sets
5.4. Factors
5.5. DBV Secure Application Roles
5.6. Summary
Chapter 6. Applied Database Vault for Custom Applications
6.1. Notional Database Application Environment
6.2. From Requirements to Security Profile Design
6.3. Requirements Technique: Use Cases and Scenarios
6.4. Identify Coarse-Grained Security Profile
6.5. Identify Fine-Grained Security Profile
6.6. Identify DBV Factors Based on Business or System Conditions
6.7. Identify DBV Realms and Realm Objects Based on Objects
6.8. Identify Accounts, Roles, and DBV Realm Authorization from Use Case Actors
6.9. Establish DBV Command Rules from Conditions
6.10. Establish DBV Secure Application Roles from Conditions
6.11. Summary
Chapter 7. Applied Database Vault for Existing Applications
7.1. Audit Capture Preparation
7.2. Capturing Audits
7.3. Analyzing the Audit Trail
7.4. Integrating DBV with Oracle Database Features
7.5. Advanced Monitoring and Alerting with a DBV Database
7.6. Summary
Part III: Identify Management
Chapter 8. Architecting Identify Management
8.1. Understanding the Problem with Identify Management
8.2. Architecting Identify Management
8.3. Oracle Identify Management Solutions
8.4. Summary
Chapter 9. Oracle Identify Manager
9.1. The User Provisioning Challenge
9.2. Oracle Identify Manager Overview
9.3. User Provisioning Processes
9.4. User Provisioning Integrations
9.5. Reconciliation Solutions
9.6. Compliance Solutions
9.7. OIM Deployment
9.8. Summary
Chapter 10. Oracle Directory Services
10.1. Identify Management and the LDAP Directory
10.2. Oracle Internet Directory
10.3. Directory Visualization and the Oracle Virtual Directory
10.4. OVD Applied
10.5. Summary
Part IV: Applied Security for Oracle APEX and Oracle Business Intelligence
Chapter 11. Web-centric Security in APEX
11.1. Introducing to the APEX Environment
11.2. Securing an APEX Instance
11.3. Protecting the APEX Database Schemas
11.4. Summary
Chapter 12. Secure Coding Practices in APEX
12.1. Authentication and Authorization
12.2. SQL Injection
12.3. Cross-site Scripting
12.4. Leveraging Database Security Features
12.5. Summary
Chapter 13. Securing Access to Oracle BI
13.1. The Challenge in Securing BI
13.2. What Needs to Be Secured
13.3. Mechanics of Accessing Data with Oracle BI
13.4. Single Sing-On
13.5. Deploying in a Secure Environment
13.6. Securing the BI Chace
13.7. Public-facing Applications
13.8. Summary
Chapter 14. Securing Oracle BI Content and Data
14.1. Securing Web Catalog Content
14.2. Conveying Identity to the Database
14.3. Securing Data Presented by Oracle BI
14.4. Oracle BI and Database Vault
14.5. Auditing
14.6. BI Features with Security Implications
14.7. Summary
A. Using the Oracle BI Examples
1. Users and Groups
2. Database Preparations
3. Oracle BI Setup
4. Recommend Testing
5. Sample Web Catalog Description
6. Sample RPD Description
7. Summary
No other version available