Oracle Database Audit Scripts, Privacy & Security considerations - - PowerPoint PPT Presentation

oracle database audit scripts privacy amp security
SMART_READER_LITE
LIVE PREVIEW

Oracle Database Audit Scripts, Privacy & Security considerations - - PowerPoint PPT Presentation

Oracle Database Audit Scripts, Privacy & Security considerations Challenge: Forensic analysis of license French case law concluded that that Oracle's scripts are scripting much more data than what is legally relevant usage on Oracle


slide-1
SLIDE 1

Oracle Database Audit Scripts, Privacy & Security considerations

  • French case law concluded that that Oracle's scripts are

scripting much more data than what is legally relevant to determine license compliance

  • Licenseaudit.com is the first independent automated

tool to analyse Oracle's system tables for determining compliance

  • The only tool to provide end-to-end encryption for

security, company- and privacy sensitive data

Challenge: Forensic analysis of license usage on Oracle databases requires extraction of hostnames, database names, usernames and other privacy & security sensitive information.

1

slide-2
SLIDE 2

Encryption Feature Overview

Method: AES-256 Secret key: Minimum 32 characters Initialization vector: Minimum 16 characters Encryption script in Perl Encrypted by the client at the client's site

slide-3
SLIDE 3

Raw data output example

Amongst others, database and Host Names are visible in the normal / raw output format

slide-4
SLIDE 4

Encryption Process

The Perl tool will encrypt all the output files on your local machine:

slide-5
SLIDE 5

Encrypted output example

db-204 = 324543d02b2277b106f4f36e61f165ce Host-204 = bc9db7f432518ff6550b71306dfe38f3

slide-6
SLIDE 6

The Perl script generate a translation table for your internal use

slide-7
SLIDE 7

What data is encrypted?

  • Database names
  • Usernames
  • Hostnames
  • Connection strings
  • OEM Target names
  • OEM Target hosts
  • RAC Instance names
  • And other…

Sensitive information

slide-8
SLIDE 8

On-Demand Decryption

  • 1. View the de-crypted information online using your security information.
  • This works only for your browser session, to easily browse or download decrypted data online
  • 2. OR, download all encrypted output and de-crypt locally using the translation table created during encryption.
slide-9
SLIDE 9

We ensure your privacy

www.licenseaudit.com