TAILIEUCHUNG - Applied Oracle Security: Developing Secure Database and Middleware Environments- P12
Applied Oracle Security: Developing Secure Database and Middleware Environments- P12:Computer security is a field of study that continues to undergo significant changes at an extremely fast pace. As a result of research combined with increases in computing capacity, computer security has reached what many consider to be “early adulthood.” From advances in encryption and encryption devices to identity management and enterprise auditing, the computer security field is as vast and complex as it is sophisticated and powerful | 84 Part I Oracle Database Security New Features FIGURE 3-7 Alert drill-downs allow auditors to detect and respondquickly to suspicious activity. Customized Alert Handling You can develop your own alert response mechanism into the Audit Vault alert life cycle by developing an Audit Vault alert subscriber based on the Oracle Java Message Service JMS technology. The subscriber can de-queue alerts from the Audit Vault alert queue and respond in a customized manner. This customized response could incorporate existing notification and monitoring capabilities in your organization. The Audit Vault Server installation includes an example Java program that de-queues alerts from the Audit Vault alert queue and sends alert information in an e-mail to a specified user. This example program is described in the file ORACLE_HOME av demo alert of your Av Server installation. Managing Audit Policy for Source Databases The Audit Vault console allows the Audit Vault auditor to retrieve the current audit policy settings for a source database into the Audit Vault warehouse. Once the baseline version of the audit policy is retrieved the Audit Vault auditor can augment and refine the policy for any of the following types of audit areas SQL statements SELECT DML and DDL statements that are not necessarily specific to any individual object in an object-owner account Schema objects SELECT DML AUDIT and privilege management GRANT REVOKE statements that are specific to individual objects in an object-owner account Chapter 3 Applied Auditing and Audit Vault 85 Privileges Audit policy options for the use of system ANY privileges such as UPDATE ANY TABLE or security-relevant system privileges such as ALTER USER Fine-grained auditing Audit policy controls that allow you to define specific conditions that must exist for the audit to occur Capture rules DDL DML or both statements from redo log files that occur for any object in a specific object-owner account or a specific object in the .
đang nạp các trang xem trước