The database industry is still plagued with substandard Oracle security according to Oracle security expert and author Don Burleson, who advises database administrators to limit access to their servers
Burleson advises Oracle DBAs to focus on their servers, which are often overlooked, in addition to securing the Oracle DBMS itself.
"This is especially important if your computers are networked together," he said. "If you have an inept Unix administrator, it's easy to hack in, and there's no holding you back at that point."
Burleson, an independent consultant who heads Kittrell, N.C.-based Burleson Oracle Consulting, has authored a host of Oracle Press textbooks and works with companies to break into systems and discover any security leaks.
When it comes to Oracle 9i security, Burleson said, the biggest security mistake Oracle DBAs make is to fail to properly install it, which makes the database vulnerable to hackers and viruses. Oracle has virtually impenetrable security when properly installed, he said.
"What happens is that sometimes DBAs don't completely read the directions and, without meaning to, leave a security hole," he said.
Also, Oracle DBAs may fail to reset the default password and user ID. Keeping default passwords leaves the system wide open to attack, he said.
For starters, Burleson advises companies to allow only trusted IP addresses to access the database server. Second, using random password generators is a bad idea, according to Burleson. It virtually guarantees that users will have a written list of passwords.
To reduce common user passwords, one effective Oracle security approach has been to link the password-changing software with the user's personnel records, so that the names of family members, street addresses and other easily guessed information may not be included in the password.
Oracle security has improved in recent versions, Burleson said, by offering row-level security that is not available in other commercial database management products. With Oracle row-level security, users can only see their own work. DBAs don't have to worry about backdoor attacks, he said.
In Oracle 9i, database administrators can audit virtually every component of the database, including activity, schema changes and access at the column and row levels, he said.
"When dealing with a database as complex as Oracle 9i, writing a working audit script is a formidable challenge, because you must ignore all of the internal grants and roles, and focus on non-system users," he said.
Companies must also develop security systems for the data that feeds the applications, rather than only for the applications themselves, he said. This prevents hackers from bypassing the application and thus the security. Oracle applications can be secured in a variety of ways: through the use of Remote Authentication Dial-In User Service (RADIUS) adapters, authentication servers, and industry standard external authentication and encryption methods, he said.
Burleson, an Oracle devotee, compared Oracle's database security efforts with that of the other leading database vendors and called it superior.
Oracle security features include a number of authentication methods, including Kerberos security, a ticket-based authentication system that sidesteps some security risks. Oracle also uses virtual private databases, which restricts access to selected rows of tables, and "port access security," in which all Oracle applications are directed to listen on a predefined port for incoming connections and generally use a listener daemon process to poll for connections.
Ultimately, securing data in Oracle databases is the responsibility of one person: the DBA.
"It's up to the database administrator to ensure that everyone who accesses the application has the proper credentials," Burleson said.
FOR MORE INFORMATION:
Read more about database security in our Featured Topic