2
Foreword
Having been in the security space for over 25 years, the front seat view has been exhilarating. Twenty-five years ago,
mostly governments and financial institutions were interested in security while everybody else trusted the
administrators, users, and computing environment to keep their data secure. It was only when browsers opened up
new vistas for commerce over the net in the 90s that companies began to understand the vital need for security. This
new perspective led to SSL, network firewalls, and strong cryptography.
Fast forward to the present, and just like before, we find ourselves living in a dramatically different world where every
piece of data is online and available 24/7. To address this new reality, we see many different security technologies
protecting various layers of the IT stack, from the applications down to the chipsets. While the global security spend is
expected to exceed $195 billion in 2025, hacks are becoming bigger and bolder, impacting everything from customer
and citizen databases to vaccine data and Wi-Fi routers.
Hackers have built sophisticated tools along with a thriving underground market to go after everything we have,
whether on mobile devices, laptops, file servers, or databases. For most hackers, the target of choice is not a laptop or
a spreadsheet–the target is most often a database with hundreds of millions of records. The hackers may try to break
in through attacks on the network, applications, operating systems, and databases. They primarily target the users
who have legitimate access to those systems. Sometimes, it’s the insiders with deep knowledge of data and defenses
who attack the systems for nefarious gains.
Why are organizations so vulnerable to attacks? Many might say they don’t know where their sensitive data is, where
they are vulnerable, and what the fixes might be. They might also fear that the fixes may break their applications or
that the insiders may exploit the trust placed in them. Too many stop at securing the perimeter, not recognizing how
easily hackers can bypass the network perimeter, get to the databases, and quietly walk away with their data. It is not
surprising that, on average, it takes the victims six months to even know that they have been breached, and it also
isn’t surprising that they typically learn about the breach from customers or law enforcement.
Many information technology, database, and security leaders now realize that securing databases should be one of
their most important goals. After all, in most companies, it is their databases that contain most of the sensitive data
assets. They also acknowledge that while they would never be able to block every path hackers might take, protecting
databases serves their constituents well since every path eventually leads to one.
During the last twenty years, I’ve seen a significant shift in how hackers go after databases. In response, Oracle has
built multiple security technologies for securing data at the source–within the database. We have focused on all pillars
of security: evaluating the risk posture, preventing the attacks, and detecting/alerting malicious behavior. Industry
analysts and security professionals recognize that the Oracle Database provides the industry’s most comprehensive
security.
This book, authored by my Database Security Product Management team, explains in simple terms the adversaries of
today, how they exploit the weaknesses, and how they access your sensitive data. This book is not meant to be a
prescriptive cookbook or a manual but rather a quick study into what every Database or Security Director/ VP should
know about the security of Oracle databases. You will learn about multiple assessment, preventive, and detective
security controls for databases so that you can provide high-level guidance to your teams on how to shrink the attack
surface and keep your databases secure.
Breaches are coming faster than we can imagine, and we must be prepared! Your data is your asset, but unless you
protect it well, it could fall into the wrong hands and become a liability. Let’s start by securing the source!
Vipin Samar
Senior Vice President, Oracle Database Security Development
September 2023
文档被以下合辑收录
相关文档
评论