This section lists security recommendations for managing Oracle Cloud Infrastructure Database instances. Recommendations for securely configuring Oracle databases are available in the Oracle Database Security Guide. In this documentation, "database system" refers to Oracle Database deployments using Base Database service, Exadata Database Service on Dedicated Infrastructure, and Autonomous Database on dedicated Exadata infrastructure. (Note that some topics may not be applicable to Autonomous Database in situations where Oracle manages the functionality described.)
Database Access Control
Users authenticate to the database using their password. Oracle recommends that
these passwords be strong. For guidelines on choosing Oracle database passwords, see
Guidelines for Securing Passwords. In addition, Oracle database provides a
PL/SQL script to verify database password complexity. This script is located at
$ORACLE_HOME/rdbms/admin/UTLPWDMG.SQL. For instructions on running
UTLPWDMG.SQL script to verify password complexity, see Enforcing Password Complexity Verification.
In addition to the database password, you can use VCN network security groups or security lists to enforce network
access control to database instances. Oracle recommends that you configure VCN
network security groups or security lists to allow least privilege access to customer databases in
Oracle Cloud Infrastructure Database.
Database systems created within a public subnet can send outbound traffic
directly to the Internet. Database systems created within a private subnet
do not have internet connectivity, and internet traffic (both egress and
ingress) cannot reach the instance directly. If you try to define a route to
a Database system within a private subnet using an internet gateway, the
route is ignored.
To perform OS patching and backup for a database system on private subnet,
you can use a service gateway or a NAT gateway to connect to your patching
or backup endpoints.
In an virtual cloud network (VCN), you can use security rules along with a
private subnet to restrict access to a database system. In multi-tier
deployments, a private subnet and VCN security rules can be used to restrict
access to the database system from the application tiers.
Data Durability
Oracle recommends that you give database delete permissions
(DATABASE_DELETE, DB_SYSTEM_DELETE) to a minimum
possible set of IAM users and groups. This minimizes loss of data due to inadvertent deletes by an authorized user or
due to malicious deletes. Only give DELETE permissions to
tenancy and compartment administrators.
You can use RMAN to do periodic backups of Database databases, where encrypted
backup copies are stored in local storage (block volumes, for example) or Oracle Cloud Infrastructure Object Storage. RMAN encrypts each backup
of a database with a unique encryption key. In transparent mode, the encryption
key is stored in the Oracle Wallet. RMAN backups to Object Storage require internet gateway (IGW),
and VCN network security groups or security lists need to be configured to allow
secure access to Object Storage. For information
about setting up the VCN for backing up bare metal databases, see Back Up a Database to Object Storage Using RMAN.
For information about backing up and Exadata databases, see Managing Exadata Database Backups by Using
bkup_api.
Database Encryption and Key Management
All databases created in Oracle Cloud Infrastructure are encrypted using
transparent data encryption (TDE). Note that if you migrate an unencrypted
database from on-premise to Oracle Cloud Infrastructure using RMAN, the
migrated database will not be encrypted. Oracle requires encrypting such
databases after migrating them to the cloud.
Note that virtual machine DB systems use Oracle Cloud Infrastructure block storage instead of local storage. Block storage is encrypted by default.
User-created tablespaces are encrypted by default in Oracle Cloud Infrastructure Database. In these databases,
ENCRYPT_NEW_TABLESPACES parameter is set to CLOUD_ONLY
where tablespaces created in a Database Cloud Service (DBCS) database are
transparently encrypted with the AES128 algorithm unless a different algorithm is
specified.
The Database administrator creates a local
Oracle Wallet on a newly created database instance, and initializes the Transparent
Data Encryption (TDE) master key. Then the Oracle Wallet is configured to be
"auto-open". However, a customer can choose to set a password for the Oracle Wallet,
and Oracle recommends that you set a strong password (eight characters or more, with at
least one capital letter, one small letter, one number, and one special
symbol).
Oracle recommends that you periodically rotate the TDE master key. The recommended
rotation period is 90 days or less. You can rotate the TDE master key by using
native database commands ("administer key management" in 12c, for example) or
dbaascli. All previous versions of TDE master key are maintained in the Oracle
Wallet.
Applying Oracle database security patches (Oracle Critical Patch Updates) is imperative
to mitigate known security issues, and Oracle recommends that you keep
patches up-to-date. Patchsets and Patch Set Updates (PSUs) are released on a quarterly basis. These patch releases contain security fixes and additional high-impact/low-risk critical bug fixes.
For information about the latest known security issues and available fixes, see Critical Patch Updates, Security Alerts and Bulletins. If your application does not support the latest patches and needs to use a database system with older patches, you can provision a database system with an older version of the Oracle Database edition you are using. In addition to reviewing the critical patch updates and security alerts for your Oracle Database, Oracle recommends that you analyze and patch the operating system provisioned with the database system.
The Oracle Database Security Assessment Tool (DBSAT) provides automated
security configuration checks of Oracle databases in Oracle Cloud Infrastructure. DBSAT performs security checks for user privilege
analysis, database authorization controls, auditing polices, database listener
configuration, OS file permissions, and sensitive data stored. Oracle database
images in Oracle Cloud Infrastructure Database are scanned with DBSAT
before provisioning. After provisioning, Oracle recommends that you periodically
scan databases with DBSAT, and remediate any issues found. DBSAT is available free
of charge to Oracle customers.
Oracle recommends using the Data Safe service to enhance the security of your database deployments. Oracle Data Safe is a unified control center for your Oracle databases which helps you understand the sensitivity of your data, evaluate risks to data, mask sensitive data, implement and monitor security controls, assess user security, monitor user activity, and address data security compliance requirements. See Get Started for complete information.
Database Backups
Oracle recommends using Managed backups (backups created using the Oracle Cloud Infrastructure Console or the API) whenever possible. When you use managed backups, Oracle manages the object store user and credentials, and rotates these credentials every 3 days. Oracle Cloud Infrastructure encrypts all managed backups in the object store. Oracle uses the Database Transparent Encryption feature by default for encrypting the backups.
If you are not using managed backups, Oracle recommends that you change the object store passwords at regular intervals.
Security Policy Examples 🔗
Prevent Delete of Database Instances
The following example policy allows the group DBUsers to perform all
management actions except delete databases and any artifacts.
Copy
Allow group DBUsers to manage db-systems in tenancy
where request.permission!='DB_SYSTEM_DELETE'
Allow group DBUsers to manage databases in tenancy
where request.permission!='DATABASE_DELETE'
Allow group DBUsers to manage db-homes in tenancy
where request.permission!='DB_HOME_DELETE'