Auditor's Guide
Total Page:16
File Type:pdf, Size:1020Kb
Oracle® Audit Vault and Database Firewall Auditor's Guide Release 12.2 E49586-21 March 2021 Oracle Audit Vault and Database Firewall Auditor's Guide, Release 12.2 E49586-21 Copyright © 2012, 2021, Oracle and/or its affiliates. Primary Authors: Karthik Shetty, Gigi Hanna Contributing Authors: Maitreyee Chaliha, Tanmay Choudhury Contributors: Andrey Brozhko, Marek Dulko, Nithin Gomez, Paul Hackett, William Howard-Jones, Slawek Kilanowski, Shirley Kumamoto, Ravi Kumar, Paul Laws, Sreedhar Madiraju, Vijay Medi, Sidharth Mishra, Sarma Namuduri, Eric Paapanen, Abdulhusain Rahi , Mahesh Rao , Vipin Samar, Gian Sartar, Lok Sheung, Yan Shi, Rajesh Tammana, Tom Taylor, Graham Thwaites This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs) and Oracle computer documentation or other Oracle data delivered to or accessed by U.S. Government end users are "commercial computer software" or "commercial computer software documentation" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, reproduction, duplication, release, display, disclosure, modification, preparation of derivative works, and/or adaptation of i) Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs), ii) Oracle computer documentation and/or iii) other Oracle data, is subject to the rights and limitations specified in the license contained in the applicable contract. The terms governing the U.S. Government’s use of Oracle cloud services are defined by the applicable contract for such services. No other rights are granted to the U.S. Government. This software or hardware is developed for general use in a variety of information management applications. It is not developed or intended for use in any inherently dangerous applications, including applications that may create a risk of personal injury. If you use this software or hardware in dangerous applications, then you shall be responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure its safe use. Oracle Corporation and its affiliates disclaim any liability for any damages caused by use of this software or hardware in dangerous applications. Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. Intel and Intel Inside are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. AMD, Epyc, and the AMD logo are trademarks or registered trademarks of Advanced Micro Devices. UNIX is a registered trademark of The Open Group. This software or hardware and documentation may provide access to or information about content, products, and services from third parties. Oracle Corporation and its affiliates are not responsible for and expressly disclaim all warranties of any kind with respect to third-party content, products, and services unless otherwise set forth in an applicable agreement between you and Oracle. Oracle Corporation and its affiliates will not be responsible for any loss, costs, or damages incurred due to your access to or use of third-party content, products, or services, except as set forth in an applicable agreement between you and Oracle. Contents Preface Audience xviii Documentation Accessibility xviii Related Documents xviii Conventions xix Quick Reference for Common Tasks About this Quick Reference xx Secured Targets xx User Accounts and Access Rights xxi Email Notifications xxi Status and Job Monitoring xxi Audit Policies (for Oracle Databases) xxi Firewall Policies xxii Reports xxii Entitlements xxiii Alerts xxiii Changes In This Document Revision History xxiv 1 Introducing Oracle Audit Vault and Database Firewall 1.1 Downloading the Latest Version of This Manual 1-1 1.2 Learning About Oracle AVDF 1-1 1.3 The Auditor's Role 1-1 1.4 Understanding Secured Targets 1-2 1.5 Understanding Firewall Policies 1-3 1.6 Understanding Audit Policies and Audit Data Collection 1-3 1.6.1 Requirements for Collecting Audit Data from Secured Targets 1-3 1.6.1.1 Requirements for Oracle Database 1-4 iii 1.6.1.2 Requirements for SQL Server, Sybase ASE, and IBM DB2 Databases 1-5 1.7 Configuring Alerts and Notifications 1-5 1.8 Generating Reports 1-5 1.9 Creating Users and Managing Access 1-6 1.10 Logging in and Understanding the Audit Vault Server Console UI 1-6 1.10.1 Logging in to the Audit Vault Server Console 1-6 1.10.2 Understanding the Tabs in the Audit Vault Server Console UI 1-7 1.10.3 Working with Lists of Objects in the UI 1-8 2 Managing Secured Targets 2.1 About Managing Secured Targets 2-1 2.2 Viewing and Changing Settings for a Secured Target 2-2 2.2.1 Viewing Audit Policy Settings for Oracle Databases 2-2 2.2.2 Retrieving User Entitlement Data for Oracle Database Secured Targets 2-3 2.2.3 Activating Stored Procedure Auditing 2-3 2.2.4 Viewing a List of Audit Trails 2-4 2.2.4.1 Viewing a List of Audit Trails for One Secured Target 2-4 2.2.4.2 Viewing a List of Audit Trails for All Your Secured Targets 2-5 2.2.5 Selecting a Firewall Policy 2-5 2.2.6 Viewing a List of Enforcement Points 2-6 2.2.6.1 Viewing a List of Enforcement Points for One Database Secured Target 2-6 2.2.6.2 Viewing a List of Enforcement Points for All Your Secured Target Databases 2-6 2.2.7 Setting a Data Retention (Archiving) Policy 2-7 2.3 Creating and Modifying Secured Target Groups 2-7 2.3.1 About Secured Target Groups 2-8 2.3.2 Creating and Modifying Secured Target Groups 2-8 2.4 Managing Compliance for Secured Target Databases 2-9 2.5 Setting Access Rights for Secured Targets and Groups 2-9 3 Managing Access and Other Settings 3.1 Managing User Accounts and Access 3-1 3.1.1 About Oracle Audit Vault and Database Firewall Auditor Accounts and Passwords 3-1 3.1.2 Creating Auditor Accounts 3-2 3.1.3 Viewing the Status of Auditor User Accounts 3-3 3.1.4 Managing User Access to Secured Targets or Groups 3-3 3.1.4.1 About Managing User Access 3-3 iv 3.1.4.2 Controlling Access by User 3-3 3.1.4.3 Controlling Access by Secured Target or Group 3-4 3.1.5 Changing a User Account Type 3-4 3.1.6 Unlocking a User Account 3-5 3.1.7 Deleting an Auditor Account 3-5 3.1.8 Changing the Auditor Password 3-5 3.2 Creating Templates and Distribution Lists for Email Notifications 3-6 3.2.1 About Email Notifications and Templates 3-6 3.2.2 Creating or Modifying an Email Distribution List 3-7 3.2.3 Creating or Modifying an Email Template 3-8 3.3 Creating Non-Interactive Report Templates 3-10 3.3.1 Creating Non-Interactive Report Template 3-10 3.3.2 Modifying Non-Interactive Report Template 3-14 3.3.3 Generating XML Data File Using SPOOL Command 3-16 3.3.4 Generating Reports Using RTF And XML Sample Templates 3-18 3.4 Creating Alert Syslog Templates 3-21 3.5 Viewing Enforcement Point and Audit Trail Status 3-22 3.5.1 Viewing Enforcement Point Status 3-22 3.5.2 Viewing Audit Trail Status 3-22 3.6 Monitoring Jobs 3-23 4 Creating Audit Policies for Oracle Databases 4.1 About Audit Policies 4-1 4.1.1 General Steps for Creating Audit Policies for Oracle Databases 4-1 4.2 Retrieving and Modifying Audit Settings from an Oracle Database 4-2 4.2.1 Understanding the Columns on the Audit Settings Page 4-2 4.2.2 Retrieving Audit Settings from Multiple Oracle Databases 4-2 4.2.3 Scheduling Retrieval of Audit Settings for a Single Oracle Database 4-3 4.2.4 Specifying Which Audit Settings Are Needed 4-4 4.3 Creating Additional Audit Policy Settings for an Oracle Database 4-5 4.3.1 About Creating Audit Policy Settings 4-5 4.3.2 Creating Audit Policies for SQL Statements 4-5 4.3.2.1 About SQL Statement Auditing 4-5 4.3.2.2 Defining SQL Statement Audit Settings 4-6 4.3.2.3 Understanding the Statement Audit Settings Page 4-7 4.3.3 Creating Audit Policies for Schema Objects 4-8 4.3.3.1 About Schema Object Auditing 4-8 4.3.3.2 Defining Schema Object Audit Settings 4-8 4.3.3.3 Understanding the Object Audit Settings Page 4-10 4.3.4 Creating Audit Policies for Privileges 4-10 v 4.3.4.1 About Privilege Auditing 4-11 4.3.4.2 Defining Privilege Audit Settings 4-11 4.3.4.3 Understanding the Privilege Audit Settings Page 4-12 4.3.5 Creating Audit Policies for Fine-Grained Auditing (FGA) 4-13 4.3.5.1 About Fine-Grained Auditing 4-13 4.3.5.2 Defining Fine-Grained Audit Settings 4-14 4.3.5.3 Understanding the Fine-Grained Audit Settings Page 4-16 4.3.6 Creating