Guerrilla Oracle: The Succinct Windows Perspective

Auditing is normally done for system tuning and performance reasons. However, there are tools that allow you to track the following if you suspect a security problem:

  • SQL statements . You can refine the auditing process to track the statements of just one user .

  • Privileges . An example is the ability to create tables.

  • Schemas . Here the focus is a particular user and all the objects in that user's schema.

These types of auditing actions are usually initiated when a real or potential security breach is suspected. More details can be found in the Oracle documentation. This short section is just meant to let you know that security auditing does exist.

Категории