Applied Oracle Security: Developing Secure Database and Middleware Environments by David Knox Scott Gaetjen Hamza Jahangir Tyler Muth Patrick Sack Richard Wark Bryan Wise
Author:David Knox, Scott Gaetjen, Hamza Jahangir, Tyler Muth, Patrick Sack, Richard Wark, Bryan Wise
Language: eng
Format: epub, pdf
Published: 2018-10-22T16:00:00+00:00
Audit Capture Preparation
Connect to the database as SYS and identify the location of the database AUDIT_TRAIL:
sys@aos>SHOW PARAMETER audit_trail
NAME TYPE VALUE
------------------------------------ ----------- ------
audit_trail string DB
If the location is DB, DB EXTENDED, XML, or XML,EXTENDED, you are ready to go. If the location is set to NONE, you need to enable auditing by issuing the following command, and then you need to restart the database:
sys@aos>ALTER SYSTEM SET audit_trail = DB SCOPE = spfile;
System altered.
Once the audit location has been verified or configured, you can enable auditing for all database sessions by issuing the following command:
sys@aos>AUDIT ALL BY ACCESS;
Audit succeeded.
If you know beforehand which accounts are object-owner accounts and which accounts are connection pool accounts, you can achieve more targeted results that limit the amount of audit data created using the same approach. For example, if you consider the examples presented in this book, you may specify the object-owner accounts SH, HR, and OE and the application server pool account, OPS$APPSERVER_1, in the AUDIT command as follows:
sys@aos>AUDIT ALL BY sh, hr, oe, ops$appserver_1 BY ACCESS;
Audit succeeded.
Once the audit capture process is complete, you can return the audit policy configuration to the original state by issuing the following command when you’re auditing all database sessions:
sys@aos>NOAUDIT ALL;
Noaudit succeeded.
You can return the audit policy configuration to the original state by issuing the following command when auditing only a subset of accounts:
sys@aos>NOAUDIT ALL BY sh, hr, oe, ops$appserver_1;
Noaudit succeeded.
Download
Applied Oracle Security: Developing Secure Database and Middleware Environments by David Knox Scott Gaetjen Hamza Jahangir Tyler Muth Patrick Sack Richard Wark Bryan Wise.pdf
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Red Hat Certified Specialist in Services Management and Automation EX358 Exam Guide by Eric McLeroy(6484)
The KCNA Book by Nigel Poulton(4412)
Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900 by Dwayne Natwick(3767)
Designing and Implementing Microsoft Azure Networking Solutions by David Okeyode(3673)
Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide by Trevor Stuart and Joe Anich(3632)
Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide by Trevor Stuart & Joe Anich(3555)
TCP IP by Todd Lammle(3012)
Microsoft Power BI Data Analyst Certification Guide by Ed Corcoran Orrin Edenfield(2935)
Unity Certified Programmer: Exam Guide by Philip Walker(2723)
MCSA Windows Server 2016 Study Guide: Exam 70-740 by William Panek(2533)
Networking A Beginner's Guide by Bruce Hallberg(2230)
Microsoft Power Platform Solution Architect's Handbook by Hugo Herrera(2064)
31 Days Before Your CompTIA A+ Exams (Shanette Luellen's Library) by Benjamin Patrick Conry(1878)
CompTIA A+ Practice Tests Core 1 (220-1101) and Core 2 (220-1102) by Ian Neil and Mark Birch(1816)
MCSA Windows Server 2016 Study Guide: Exam 70-741 by William Panek(1679)
PHP 7 Zend Certification Study Guide by Andrew Beak(1661)
Healthcare Information Security and Privacy (All-In-One) by Sean Murphy(1561)
CompTIA A+ Certification Guide (220-901 and 220-902) by Matthew Bennett(1541)
RHCSA & RHCE Red Hat Enterprise Linux 7: Training and Exam Preparation Guide (EX200 and EX300), Third Edition by Asghar Ghori(1499)
