Oracle Privacy Security Auditing: Includes Federal Law Compliance with HIPAA, Sarbanes Oxley & The Gramm Leach Bliley Act GLB
暫譯: Oracle 隱私安全審計:包含聯邦法律合規性,涵蓋 HIPAA、薩班斯-奧克斯利法案及格拉姆-利奇-布萊利法案 (GLB)

Arup Nanda, Donald Burleson

  • 出版商: Rampant Tech Press
  • 出版日期: 2003-12-01
  • 售價: $1,980
  • 貴賓價: 9.5$1,881
  • 語言: 英文
  • 頁數: 655
  • 裝訂: Paperback
  • ISBN: 0972751394
  • ISBN-13: 9780972751391
  • 相關分類: Oracle資訊安全
  • 已絕版

買這商品的人也買了...

相關主題

商品描述

Description:

Written by one the world's top developers and author of best-selling Oracle books, Don Burleson and Arup Nanda target their substantial knowledge of Oracle Internals to this important book. With decades of experience installing Oracle auditing, Arup Nanda shares secrets for the effective creation of auditing mechanisms for HIPAA compliant Oracle systems.

The Health/Insurance Portability and Accountability Act of 1996 (HIPAA) was created to ensure privacy for medical patient data. HIPAA requires complete auditing to show everyone who has viewed confidential medical patient information. This permeates from Hospitals, insurance companies, and dozens of healthcare related industries. HIPAA is a framework that provides a complete security access and auditing for Oracle database information.

This book provides complete details for using Oracle auditing features, including auditing from Oracle redo logs, using system-level triggers, and using Oracle9i fine-grained auditing (FGA) for auditing of the retrieval on sensitive information.

Best of all, Burleson & Nanda share dozens of working samples in his online code depot. Examples from all areas of auditing are covered with working scripts and code snippets. Your time savings from a single script is worth the price of this great book.

 

Table of Contents:

Section I - Overview
 
Chapter 1: Introduction to HIPAA
 
Introduction to HIPAA, the law, the requirements and the mandates placed by the new regulation. The chapter stresses that HIPAA consists of two important domains – (i) the mandate to protect data and enforce security and privacy and (ii) the description of several types of EDI/EC transactions; and this book covers the first domain, pertaining to security and data protection.

Chapter 2: Introduction to Oracle Security
 
A detailed overview of the Oracle security mechanisms and their relevance to HIPAA.

  • Grant security
  • Role-based security
  • Profile based security
  • Grant execute security (invoker & definer rights)
  • Virtual private databases (row-level security, fine-grained access control)
  • Application Server Security

Chapter 3: Introduction to Oracle Auditing
 
An overview of the tools and techniques that are used for HIPAA auditing of Oracle databases. 

  • DDL auditing
  • DML auditing
  • SELECT auditing
    o       Oracle audit SQL commands
    o       Fined-grained auditing
    ·        Auditing backup & recovery
    o       Auditing disaster recovery plan
    o       Auditing continuous availability plan
  • Auditing replicated data
  • Auditing sources for materialized views

Section II - Security
 
Chapter 4: General Oracle Security
 
This is a review of the standard relational grant security as expected in the HIPAA requirements.

  • Profile Security
  • Grant security
    o       System privileges
    o       Object privileges
    o       Granting to public
    o       Grants with ADMIN option
  • Role-based security
    o       Views and grant security
    o       Row-level security with views
  • Grant execute security
    o       Definer rights and invoker rights.
  • SQL*Plus Security
    o       The use of product_user_profile
    o       Restricting Logon Attempts

Chapter 5: Virtual Private Database
 
Topics include a detailed description of VPD and how they can be used to enforce security and privacy as per HIPAA requirements.

  • Benefits of FGAC
    o       Dynamic security – Predicates are assigned to users at runtime, and there is no need to maintain complex roles and grants.
    o       Multiple security - Place more than one policy on each object, as well as stack them upon other base policies.
    o       No dictionary view proliferation – Thousands of views are no longer required to manage row-level security
    o       No back-doors - Users no longer bypass security policies embedded in applications, because the security policy is attached to the data.
    o        Complex access rules – Scalar values (e.g. where salary > 50000) can be deployed.
  • Issues with FGAC
    o       Requires a user account for every person accessing Oracle
    o       Difficult to reconcile with other GRANT security
    o       Access rules are stored inside stored procedures, which can be changed.
    o       Foreign key referential integrity can be used to bypass FGAC
    o       Cursor caching in pre 8.1.7 allow bypassing of FGAC
  • Predicate-based security internals
  • Security policies
  • Application contexts
  • Example of FGAC in action

Chapter 6: Data Encryption in Oracle
 
A description of all types of encryption (available in Oracle) to satisfy HIPAA requirements.

  • Types of encryption – DES, 3DES, MD5, etc.
  • Details on using the dbms_obfuscation_toolkit package
  • Using hashing functions to encrypt data
  • Using data compression as encryption

Chapter 7: Oracle Network Security

  • Vulnerabilities and threats in Oracle Networks
  • Listener Buffer Overflow
  • SQL Injection
  • Packet Sniffing
  • IP Filtering with Connection Manager

Section III - Auditing
 
Chapter 8: Oracle Audits

  • Audits in Oracle for various DML statements
  • Managing audit tables
  • Archiving Audit Tables to archival media like CDROM or Tape
  • Various examples describing the auditing functionality in Oracle.

Chapter 9: Oracle Trigger Auditing

  • DDL Auditing
    o       System triggers for DDL auditing
    o       Using Dictionary-based DDL
    o       Auditing source code changes
    o       Auditing DDL versioning
  • DML Auditing
    o       Installing Automatic Auditing Using LogMiner
    o       Usage of Logminer for HIPAA update auditing requirements
    o       Auditing with DML triggers
  • Server Error Auditing
    o       Servererror trigger
    o       Reports

Chapter 10: Auditing Grants Security
 
Overview of data dictionary query scripts to locate faults in grant-based and role-based security to satisfy HIPAA requirements.

  • Auditing for system privileges
  • Auditing for WITH ADMIN option
  • Auditing for synonyms
  • Auditing for PUBLIC objects

Chapter 11: Oracle Fine Grained Auditing
 
The Fine Grained Auditing (FGA) in Oracle 9i provides the hitherto impossible area of auditing the exact statement used by a user to simply select data, not update it, as required by HIPAA.

  • Use of the dbms_fga package
  • Auditing select access as per the HIPAA mandated auditing of Patient Health Information (PHI). 
  • Archiving of audit information to tertiary media (optimal CD-ROM & Tape)
  • Combining FGA and Flashback queries to answer the most important question in addition to who saw the data, what they saw.

Chapter 12: HIPAA Checklists for Security and Auditing
 
A checklist of HIPAA requirements (and the Oracle features described in this book) that can be used to satisfy the requirements.
 
This book covers Oracle security audit.

商品描述(中文翻譯)

**描述:**
本書由全球頂尖開發者之一、暢銷Oracle書籍的作者Don Burleson和Arup Nanda撰寫,他們將對Oracle內部結構的深厚知識集中於這本重要的書籍中。Arup Nanda擁有數十年的Oracle審計安裝經驗,分享了有效創建符合HIPAA要求的Oracle系統審計機制的秘密。

1996年的健康保險可攜性與責任法案(HIPAA)旨在確保醫療病人數據的隱私。HIPAA要求進行全面的審計,以顯示所有查看機密醫療病人信息的人。這涉及到醫院、保險公司以及數十個與醫療保健相關的行業。HIPAA是一個框架,為Oracle數據庫信息提供完整的安全訪問和審計。

本書提供了使用Oracle審計功能的完整細節,包括從Oracle重做日誌進行審計、使用系統級觸發器以及使用Oracle9i的細粒度審計(FGA)來審計對敏感信息的檢索。

最重要的是,Burleson和Nanda在其在線代碼庫中分享了數十個可用的範例。涵蓋了所有審計領域的範例,並附有可運行的腳本和代碼片段。從單個腳本中節省的時間足以彌補這本優秀書籍的價值。

**目錄:**
**第一部分 - 概述**
**第1章:HIPAA介紹**
介紹HIPAA、法律、要求及新法規所施加的命令。本章強調HIPAA由兩個重要領域組成 - (i) 保護數據和強制執行安全與隱私的命令,以及 (ii) 描述幾種類型的EDI/EC交易;本書涵蓋第一個領域,涉及安全和數據保護。

**第2章:Oracle安全性介紹**
對Oracle安全機制及其與HIPAA的相關性進行詳細概述。
- 授權安全
- 基於角色的安全
- 基於配置文件的安全
- 授權執行安全(調用者和定義者權限)
- 虛擬私有數據庫(行級安全,細粒度訪問控制)
- 應用伺服器安全

**第3章:Oracle審計介紹**
對用於HIPAA審計Oracle數據庫的工具和技術進行概述。
- DDL審計
- DML審計
- SELECT審計
- Oracle審計SQL命令
- 細粒度審計
- 審計備份和恢復
- 審計災難恢復計劃
- 審計持續可用性計劃
- 審計複製數據
- 審計物化視圖的來源

**第二部分 - 安全性**
**第4章:一般Oracle安全性**
這是對HIPAA要求中預期的標準關聯授權安全的回顧。
- 配置文件安全
- 授權安全
- 系統權限
- 對象權限
- 授權給公眾
- 帶有ADMIN選項的授權
- 基於角色的安全
- 視圖和授權安全
- 使用視圖的行級安全
- 授權執行安全
- 定義者權限和調用者權限。
- SQL*Plus安全
- 使用product_user_profile
- 限制登錄嘗試

**第5章:虛擬私有數據庫**
主題包括對VPD的詳細描述,以及如何根據HIPAA要求使用它們來強制執行安全和隱私。
- FGAC的好處
- 動態安全 - 在運行時將謂詞分配給用戶,無需維護複雜的角色和授權。
- 多重安全 - 在每個對象上放置多個策略,並將其堆疊在其他基本策略之上。
- 無字典視圖擴散 - 不再需要數千個視圖來管理行級安全
- 無後門 - 用戶不再繞過嵌入在應用程序中的安全策略,因為安全策略附加在數據上。
- 複雜的訪問規則 - 可以部署標量值(例如,where salary > 50000)。

- FGAC的問題
- 每個訪問Oracle的人都需要一個用戶帳戶
- 與其他授權安全難以調和
- 訪問規則存儲在存儲過程中,可能會被更改。
- 外鍵參考完整性可用於繞過FGAC
- 在8.1.7之前的游標緩存允許繞過FGAC

- 基於謂詞的安全內部
- 安全策略
- 應用上下文
- FGAC實際運作的範例

**第6章:Oracle中的數據加密**
描述所有類型的加密(在Oracle中可用)以滿足HIPAA要求。
- 加密類型 - DES、3DES、MD5等。
- 使用dbms_obfuscation_toolkit包的詳細信息
- 使用哈希函數加密數據
- 使用數據壓縮作為加密

**第7章:Oracle網絡安全**
- Oracle網絡中的漏洞和威脅
- 監聽器緩衝區溢出
- SQL注入
- 封包嗅探
- 使用連接管理器的IP過濾

**第三部分 - 審計**
**第8章:Oracle審計**
- Oracle中各種DML語句的審計
- 管理審計表
- 將審計表存檔到CDROM或磁帶等存檔媒介
- 描述Oracle中審計功能的各種範例。

**第9章:Oracle觸發器審計**
- DDL審計
- 用於DDL審計的系統觸發器
- 使用基於字典的DDL
- 審計源代碼變更
- 審計DDL版本控制
- DML審計
- 使用LogMiner安裝自動審計
- 使用LogMiner滿足HIPAA更新審計要求
- 使用DML觸發器進行審計
- 伺服器錯誤審計
- 伺服器錯誤觸發器
- 報告

**第10章:審計授權安全**
概述數據字典查詢腳本,以查找授權基於和基於角色的安全中的缺陷,以滿足HIPAA要求。
- 系統權限的審計
- WITH ADMIN選項的審計
- 同義詞的審計
- 公共對象的審計

**第11章:Oracle細粒度審計**
Oracle 9i中的細粒度審計(FGA)提供了前所未有的審計用戶用來簡單選擇數據的確切語句的能力,而不是更新它,這是HIPAA所要求的。
- 使用dbms_fga包
- 根據HIPAA要求審計病人健康信息(PHI)的選擇訪問。
- 將審計信息存檔到第三媒介(最佳CD-ROM和磁帶)
- 結合FGA和Flashback查詢來回答除了誰看過數據之外的最重要問題,即他們看到了什麼。

**第12章:HIPAA安全和審計檢查清單**
HIPAA要求的檢查清單(以及本書中描述的Oracle功能),可用於滿足要求。
本書涵蓋Oracle安全性。