SEC509: Securing Oracle Databases
- Contents | Schedule | Additional Info
- Instructor: Tanya Baccam
- 36 CPE/CMU
- Laptop Required
Experts agree that Oracle is one of the most complex software packages available today. Unfortunately, complexity often introduces an increased risk for vulnerabilities. These vulnerabilities are being increasingly targeted by attackers. It is not uncommon for the SANS Internet Storm Center to see hundreds of thousands of hack attempts against Oracle databases each month.
SANS recognizes the need for comprehensive Oracle security training to help organizations protect their most critical information resources. In this course, the student is led through the process of auditing and securing Oracle by defining the risks to data, using techniques for detecting unauthorized access attempts, using Oracle access controls and user management functions, and developing reliable processes to secure the Oracle database, as well as applications.
Throughout the course the student will be exposed to the database as seen through the eyes of an attacker, including public and unreleased techniques that are used to compromise the integrity of the database or escalate a user's privileges. In this fashion, the student gains a better understanding of how an attacker sees a database as a target and how we can configure the database to be resistant to known and unknown attacks.
This course has been updated for versions of Oracle up to and including 11g on Unix and Windows operating systems.
| Course Contents | Instructors | Schedule |
|---|---|---|
| SEC509.1: Securing Oracle Foundations | Tanya Baccam |
Mon Sep 16th, 2013 9:00 AM - 5:00 PM |
OverviewThe student is introduced to various techniques used by an attacker to compromise the database, including buffer overflows, SQL injection attacks, exploiting Oracle stored procedures, and cross-site scripting attacks. We look at the process of installing the database in a secure fashion after hardening the host operating system with strong file system permissions. An overview of all the Oracle offered security features will be covered. CPE/CMU Credits: 6 TopicsSecuring Oracle
Foundations
Oracle attack vectors and security features
Host operating system security
Identifying passwords in the environment
Exercises for day one include
|
||
| SEC509.2: Securing Oracle's Authentication Process | Tanya Baccam |
Tue Sep 17th, 2013 9:00 AM - 5:00 PM |
OverviewOracle's authentication process has some significant weaknesses that need to be understood to secure the environment. Additionally, 11g made some significant changes to the authentication process. We review the authentication process in detail. Oracle default user accounts, roles, and grants will be reviewed, including audit techniques to identify user accounts with weak passwords. Multiple password cracking techniques and tools will be analyzed. Auditing user accounts and application schema accounts is discussed in detail covering third party authentication, shared accounts, and proxy authentication implemented in third party applications. The day concludes with a complete discussion of password management, including enforcing and creating a password management policy and utilizing profiles to control access to database resources. CPE/CMU Credits: 6 TopicsAuthentication methods
Default users and password audits
Schema and application owners
Implementing password management
Exercises for day two include
|
||
| SEC509.3: Oracle Access Controls - Configuration | Tanya Baccam |
Wed Sep 18th, 2013 9:00 AM - 5:00 PM |
OverviewAccess control techniques are used to protect database objects. We cover many of the countless database configuration options with recommendations that make the database more resistant to common attacks, including both intentional and accidental incidents. We also dedicate time to the problems associated with the growing number of PUBLIC privileges including the techniques authenticated users can use to escalate their privilege levels. Tools such as Database Vault and Data Masking are also explored. CPE/CMU Credits: 6 TopicsAccess and output
Roles and users
Configuration
PUBLIC privileges, profiles, packages, and objects
Exercises for day three include
|
||
| SEC509.4: Auditing Oracle | Tanya Baccam |
Thu Sep 19th, 2013 9:00 AM - 5:00 PM |
OverviewSome organizations think auditing within Oracle's environment is difficult, if not impossible. This day delves into auditing the Oracle environment in a manageable and simple way. We examine the built-in Oracle auditing features, including Fine-Grained Auditing. Audit Vault will also be reviewed. Forensic assessment of Oracle databases is also covered in this day, including data recovery and retracing the steps of an attacker. If your organization is encumbered by federal restrictions and legal requirements in information management, this day will provide vital information that you can deploy immediately after completing this course. CPE/CMU Credits: 6 TopicsOracle auditing - myths and facts
Reviewing the audit trail
Forensics
Fine Grained Audit
Securing Exposed Services
Exercises for day four include
|
||
| SEC509.5: Networking, Encryption, and Developer Tools | Tanya Baccam |
Fri Sep 20th, 2013 9:00 AM - 5:00 PM |
OverviewSince the Oracle listener can be the first recipient of attacks from adversaries seeking to compromise the database, we cover topics related to securing the listener. Network design recommendations for the database and administrative workstations are also addressed, including Oracle's Database Firewall. The day continues by discussing the challenges of encryption within the database or outside of the database. Encryption is looked at for both data at rest and data in transit. Finally, we conclude the day by looking at techniques to secure the SQL*Plus and iSQL*Plus tools, including techniques to enforce and restrict the use of specific applications that are allowed to connect to the database. CPE/CMU Credits: 6 TopicsAuditing the Oracle listener
Network Access to Oracle
Encryption
Restricting developer and access tools
Exercises for day five include
|
||
| SEC509.6: Development and Securing Applications | Tanya Baccam |
Sat Sep 21st, 2013 9:00 AM - 5:00 PM |
OverviewEnd-user tools created with PL/SQL and Java can introduce their own security risks. This day covers secure programming for the database including protecting source code confidentiality and integrity and settings resource limits to prevent attacks. Security application roles and other techniques will be explored as options for protecting data. We also look at some of the common Web application vulnerabilities and the affect they can have on the Oracle database. The final module of this intense day covers where we think Oracle security is going, exploring early techniques in the design of viruses and worms specific to Oracle. CPE/CMU Credits: 6 TopicsOracle programming issues
Web application vulnerabilities
Controlling applications and tools
Controlling application internals
Oracle security future
Exercises for day six include
|
||
| Additional Information | ||
| Laptop Required | ||
|
Students need to bring a laptop computer with an Ethernet network card and a CD-ROM. Students should use Windows and have a functional Oracle 11gR2 or later client installed with SQL*Plus. The Oracle client software can be downloaded from Oracle's Web site. Students will also need the capability to set an IP address and install tools on the system. Additional tools such as Oracle Enterprise Manager are not required. If you have additional questions about the laptop specifications, please contact laptop_prep@sans.org. |
||
