Effective Oracle Database 10g Security by Design

When applications and databases are installed today, they start in a state that is often configured to help the user become productive as quickly as possible. As such, one of the first things you should do to protect yourself is to tighten your configurations against attacks—also referred to as hardening. An important aspect of this process is that everything needs to be hardened. For example, paying attention to just the network security while forsaking the operating system security is not a good idea. Security extends from the infrastructure components to the applications themselves. The old saying is true: a chain is as strong as its weakest link.

The following sections suggest ways to harden your systems. It’s important to understand the hardening process for the operating system, the network, and application server because the database ultimately depends on and interacts with all three of these components.

The Operating System

Operating systems vary in practically every aspect. They not only serve different roles within an organization, they also have different design targets from their respective manufacturers. Depending on the operating system, the version, and the role of the server in which the operating system resides, the actions you must take to harden it will change. The following list is suggestive, not comprehensive, but should nevertheless serve as a guide to some of the most useful practices for hardening an operating system:

The Network

In some ways, the network poses the biggest security challenge. It is the connective tissue linking together the various clients, servers, corporations, partners, and quite frankly everything and everyone. The usefulness of your IT systems is generally based on these vast and varied interconnections, but the connections also introduce risks.

Network security can be simply described as providing data confidentiality and data integrity and preventing data disruption for data in transit. The problem is simple: you are trying to pass sensitive data over an unprotected medium. As data moves through the “ether,” it is susceptible to everything in the great unknown.

Another concern is manifested by what a network is. The network provides a connection path, not just for the authorized people, but the unauthorized as well. Think of networks as the hallways that interconnect the rooms in a big apartment building. Almost anyone can walk the halls. Similarly, almost anyone can traverse the network. The halls lead to the offices. The networks lead to the computers. The offices have valuables. The computers store valuable data. Just as the hallways can allow a thief to gain access to an office, a network can allow hackers to attack your servers from afar. Protecting the network means you are protecting everything that touches the network.

Network security distills into encrypting the data streams, providing data integrity checks, and limiting access into certain networks and servers to authorized people. There are many things that can be done to provide network security. Here are some of the most popular:

The Application Server

Application servers are a critical part of your infrastructure. Here, I am not only referring to the Oracle Application Server, but also to anyone’s application server. Because application servers provide an environment for applications, they are particularly attractive targets. They typically provide access to databases that hold key information and may contain encryption keys, passwords, and other valuable pieces of information. Many of the actions needed to secure application servers are similar to the actions discussed for securing the OS and network.

Категории