Protecting Oracle Database 12c helps you solve the problem of maximizing the safety, resilience, and security of an Oracle database whilst preserving performance, availability, and integration despite ongoing and new security issues in the software. The book demonstrates, through coded examples, how you can enable the consolidation features of Oracle Database 12c without increasing risk of either internal corruption or external vulnerability. In addition, new protections not publicly available are included, so that you can see how demonstrable risk improvements can be achieved, measured, and reported through Enterprise Manager 12c. Most importantly, the challenge of privileged access control within a consolidation environment will be addressed, thus enabling a safe move to greater efficiency.
Protecting Oracle Database 12c is primarily aimed at Oracle database administrators, DBA managers, and security staff who are working to safely and securely implement Oracle Database 12c in their environment. The book especially targets those using privileged access control to enable consolidation and the new cloud features set, including it’s multi-tenant database capabilities.
Part 1: Security Overview and History
Chapter 1: Oracle Security History
Chapter 2: Current State of the Art
Chapter 3: Extrapolating Current Trends
Part 2: Defense Cookbook
Chapter 4: Managing Users in Oracle
Chapter 5: Oracle Vulnerability Scanning
Chapter 6: Centralized Native Auditing and IPS
Chapter 7: Pluggable Database Primer
Part 3: Security in the 12c Release
Chapter 8: New Security Features in 12C
Chapter 9: Design Flaws, Fixed and Remaining in 12C
Chapter 10: Security Issues in 12c
Chapter 11: Advanced Defense and Forensic Response
Part 4: Security in Consolidation
Chapter 12: Privileged Access Control Foundations
Chapter 13: Privileged Access Control Methods
Chapter 14: Securing Privileged Access Control Systems
Chapter 15: Rootkit Checker and Security Monitoring
Part 5: Architectural Risk Management
Chapter 16: Oracle Security Architecture Foundations
Chapter 17: Enterprise Manager 12C as a Security Tool
Chapter 18: Defending Enterprise Manager 12C
Chapter 19: “The Cloud” and Privileged Access
Chapter 20: Management and Conclusions