Re: Security Measures

  • From: Stefano Cislaghi <s.cislaghi@xxxxxxxxx>
  • To: dmarc-noreply@xxxxxxxxxxxxx, "oracle-l@xxxxxxxxxxxxx" <oracle-l@xxxxxxxxxxxxx>
  • Date: Wed, 08 Apr 2015 11:31:01 +0000

Well, depends. A DAM (Database Access Monitoring) solution is what you
need. It monitor any attempt to connection to your db as well as the
command are being issued. Usually they let you to stop connection that
issue select * from customers (for example) or any other type of statement
you like. Obviously, they audit everything so there's an overlap with
database standard audit.

Product names: oracle database firewall, IBM guardium, Imperva
secusphere...

They normally use network TAP (either physical or virtual) or local kernel
TAP, or a combination of both technologies.

Hope it helps

Stefano

On Wed, 8 Apr 2015 11:51 walid kaakati <dmarc-noreply@xxxxxxxxxxxxx> wrote:

Hallo list,

I have rephrased my question :

By database auditing i Know who accessed the database, remains for me to
prevent unauthorized access to the database let us say by
hacking,programs... .

How i can do this ? any ideas that you implement in your production
databases.

Best Wishes

Other related posts: