Principle of Least Privilege for Oracle databases

Principle of Least Privilege for Oracle databases

An important concept in computer security, the principle of least privilege (POLP) is to limit users' access rights to the minimum permissions they need to do their job.

The privilege policy should be given as many privileges as a user needs.?In this way, whatever the user needs to do, he will only have the privileges related to it.

By applying this principle in databases, you can increase security to the next level.

To enforce the policy of least privilege on Oracle databases:

  • Secure the data dictionary.?When the 07_DICTIONARY_ACCESSIBILITY parameter is FALSE, access to data dictionary based tables is restricted for people with ANY TABLE privilege.?The default value of the parameter is FALSE and should not be changed.
  • Get redundant authorizations from PUBLIC schema.?Packages such as UTL_SMTP, UTL_TCP, UTL_HTTP and UTL_FILE have PUBLIC schema execute permission.?These can be taken if not needed.
  • Use an access control list (ACL) to control network access.?Starting from the 11g version, it is necessary to create a Network Access Control List and authorize the relevant user for network access.
  • Restrict access to operating system directories.
  • Restrict administrative privileges on users.?Do not grant DBA privileges to normal user.
  • Restrict remote database authentication.?With the REMOTE_OS_AUTHENT parameter, it is determined whether the remote clients will authenticate with the value of the OS_AUTHENT_PREFIX parameter.?Its default value is FALSE and should be like this.?If TRUE is set, users created as “CREATE USER … IDENTIFIED EXTERNALLY” will be able to log in to the system.
  • Define and monitor audit policies regarding users' critical statements and transactions.?Track SYS transactions in your databases.?For this, the value of the AUDIT_SYS_OPERATIONS parameter must be TRUE.?When the unified auditing feature in version 12.2 is used for monitoring, the monitoring records will be located in the SYS.UNIFIED_AUDIT_TRAIL image.

要查看或添加评论,请登录

Ahmet Duru?z的更多文章

  • Exadata - Disk scrubbing

    Exadata - Disk scrubbing

    Disk scrubbing exists on Exadata cell nodes to automatically repair bad sectors of the disk when the system is idle…

  • How to determine the last modified date of tables in Oracle ?

    How to determine the last modified date of tables in Oracle ?

    For each row in a table, ORA_ROWSCN returns the SCN of the most recent change in the row. This pseudo-column can be…

  • Oracle Data Redaction

    Oracle Data Redaction

    Available with the Oracle Advanced Security license, Oracle Data Redaction allows you to mask (redact) data returned…

  • Active requests on Exadata cell node

    Active requests on Exadata cell node

    An active request represents a client- or application-centric view of I/O requests handled by the cell node. You can…

  • SQL Tuning Health-Check Script (SQLHC)

    SQL Tuning Health-Check Script (SQLHC)

    Also known as SQLHC, this tool is used to check the environment in which a single SQL statement is running, Cost-based…

  • Read Only Table Partitions

    Read Only Table Partitions

    As of Oracle version 12.2, partitions or sub-partitions of a table can be marked as read-only.

  • Hybrid Columnar Compression

    Hybrid Columnar Compression

    Hybrid Columnar Compression (HCC) is a feature that comes with Oracle Database 11g Release 2 and can be used with…

  • Usefully My Oracle Support (MOS) documentation on Oracle Exadata Database Machine

    Usefully My Oracle Support (MOS) documentation on Oracle Exadata Database Machine

    There are MOS documents on many topics related to Exadata. You can find the most useful of these documents in the list…

社区洞察