Join David Yahalom for an in-depth discussion in this video Separating object owners and access, part of Oracle Database 12c: Security.
Wrapping up our chapter on database users and privileges,…let's talk about one database schema design principle…that closely impacts your database security.…As we've learned in this chapter,…users and schemas in the oracle database…are identical; they are the same thing.…If you create a table, while connected…to the Oracle database as a specific database user,…then this table, which the user created,…will be owned by the user and reside in the user's schema.…
As such, that user will have full control over that table.…Let's imagine a CRM application…that contains a lot of tables…with sensitive information about your customers.…The CRM user will have full permissions…on all of the objects that it owns.…That is by design; you create tables inside a CRM schema…so the CRM user will be the owner of these objects.…Nothing surprising here; however, if your applications…will connect to the database using the CRM user,…then each application will essentially…have access to all tables, data, and code…that resides inside your CRM schema.…
Learn how to identify the major risks and security threats, and review general best practices for properly protecting and "hardening" any production database. Then, dive into hands-on demos that show how to set up user accounts, the connection between users and schemas, database object and system permissions, and roles in a multitenant environment, as well as encrypt data, audit user actions, and access to sensitive information. Plus, find out how to enable data-at-rest security via the Oracle Transparent Data Encryption and backup encryption options.
- Core concepts of Oracle database security
- Potential threats to Oracle database security
- Authentication and authorization
- Auditing access
- Data encryption
- Users and permissions
- Database roles
Skill Level Intermediate
Oracle 12c Database: Administrationwith David Yahalom3h 58m Beginner
Database Foundations: Core Conceptswith Adam Wilbert2h 14m Beginner
Database Foundations: Administrationwith Adam Wilbert1h 14m Beginner
1. Database Security Fundementals
2. Advanced Database Security Concepts
3. Download and Set Up the Course VM
4. Users and Permissions
5. Database Roles
Roles with ADMIN OPTION3m 24s
6. Auditing Access to Data
7. Data Encryption
What's next?1m 46s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.