oracle forensics,Data Safe

Get the Details

Data Safe Features

Overview

format,png

Oracle Data Safe helps you manage the day-to-day security of the data you place in your Oracle Databases.

With the Data Safe console you can:

Assess if your database is securely configured

Review and mitigate risks based on GDPR Articles/Recitals, Oracle Database STIG Rules, and CIS Benchmark recommendations

Assess user risk by highlighting critical users, roles and privileges

Configure audit policies and collect user activity to identify unusual behavior

Discover sensitive data and understand where it is located

Remove risk from non-production data sets by masking sensitive data

Database Security Assessment

format,png

Data Safe helps ensure your databases are securely configured. You can create and maintain security baselines for rapid identification of configuration risks and enforce consistent use of security controls across the enterprise.

It offers recommendations for remediation, and helps you comply with regulations such as GDPR, and compliance standards as STIG and CIS. It categorizes and prioritizes these risks so that you can decide which ones to address first.

Data Safe Security Assessment provides:

Comprehensive assessment of security parameters, security controls in use, and user roles and privileges

Actionable reports with prioritized recommendations

User Risk Assessment

format,png

Data Safe identifies which users present the highest risk, reviews privileges granted to those users, and shows you the user activity that has been captured for those users. Users with elevated privileges, who may not have changed passwords in a while or who have password policies that are relatively weak, are a common avenue for database compromise.

User Assessment remediate these risks by evaluating:

Static profile information such as user type and password policies

Dynamic profile information such as last login, IP address, password aging, and audit data

User Activity Auditing and Reporting

format,png

Data Safe can track database user activity and raise alerts on risky actions, a must-have requirement for many regulations. You can select from default audit policies for regular and privileged users, and use one of many out-of-the-box audit reports on various database activities. You can retain the audit data for up to a year for forensics in case something were to go wrong.

User Activity Auditing lets you:

Provision audit, compliance, and alert policies

Collect audit data from databases, and track sensitive operations

View Audit Reports

Interactive reports for forensics

Summary and detailed reports

Download PDF reports for compliance

Sensitive Data Discovery

format,png

Data Safe helps you discover the amount and location of sensitive data across hundreds of columns spanning multiple schemas and tables. Customers can also add their own custom sensitive types easily. Once you know how much sensitive data you have and where it resides, it is easier to assess the risk and protect that data.

Sensitive Data Discovery comes with 125+ pre-defined sensitive data types:

format,png

Data Masking

format,png

Copying production data for non-production purposes proliferates sensitive data, expands the security and compliance boundary, and increases the likelihood of data breaches. If left unprotected non authorized users might access the data and possibly move it across locations.

Data Safe can mask data in your non-production environments while maintaining complex data relationships. Data Safe minimizes the amount of personal data and allows internal test, development, and analytics teams to operate with reduced risk.

Data Masking provides:

Masking of sensitive data identified by Sensitive Data Discovery feature

50+ predefined masking formats

Automated format selection based upon sensitive type

Ability to define custom masking formats

Masking reports

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值