www.theplague.fora.pl
WAR
FAQ
Search
Memberlist
Usergroups
Galleries
Register
Profile
Log in to check your private messages
Log in
www.theplague.fora.pl Forum Index
->
The PLague Info
Post a reply
Username
Subject
Message body
Emoticons
View more Emoticons
Font colour:
Default
Dark Red
Red
Orange
Brown
Yellow
Green
Olive
Cyan
Blue
Dark Blue
Indigo
Violet
White
Black
Font size:
Tiny
Small
Normal
Large
Huge
Close Tags
Options
HTML is
ON
BBCode
is
ON
Smilies are
ON
Disable HTML in this post
Disable BBCode in this post
Disable Smilies in this post
Confirmation code: *
All times are GMT + 1 Hour
Jump to:
Select a forum
The PLague
----------------
The PLague Info
Regulamin/Rules
Rekrutacja/Recrutation
Topic review
Author
Message
clkelyqld2
Posted: Sat 12:03, 31 Aug 2013
Post subject: hollister outlet sale The Top Sources Of Oracle Be
As IT auditors with heavy experience auditing databases, we wanted to write a brief overview of some excellent sources of Oracle database best practices.
The two sources are the Center for Internet Security (CIS) 'Security Configuration Benchmark' and the US Defense Information Systems Agency (DISA) 'Database Security Technical Implementation Guide' (STIG).
The following discussion provides a brief overview of each source.
CIS Security Configuration Benchmark. This benchmark for
hollister outlet sale
Oracle Database Server 11g is the consensus of industry consultants, auditors, software developers, compliance professionals and government workers.
This benchmark document offers a 'level-I' configuration where settings and actions can be implemented by system administrators with any level of security experience. The settings will not have a disruptive impact on an existing database. A 'level-II' configuration is more focused on security functionality and network architecture. This level requires a higher level of experience.
The benchmark
woolrich parka
contains separate sections dedicated to system specific settings, installation and patching, directory and file permissions, database startup and shutdown, auditing policy, user
www.msc-sahc.org/moncler.asp
setup and access settings.
This benchmark is aimed at Oracle security against conventional
hollister
threats. The document includes specific guidance for secure setup, installation, configuration and operation of an Oracle 11g database environment. There are also 'best practice' processes and procedures on data backup, archive logs and hardware
hollister sale
security included in the document.
DOD DISA Database Security Technical Implementation Guide (STIG). The STIG was published by
hollister france
the US Defense Information Systems Agency (DISA) for the Department of Defense (DOD). The objective of the STIG is to secure DOD database management systems (DBMS). The document
nike air jordan pas cher
covers known security configuration items, vulnerabilities and issues.
The STIG was created as a detailed and comprehensive configuration standard that includes 'security elements' and 'security requirements'. Although the STIG is a 'generic' document it goes into much more depth than the vendor-specific 'checklists' discussed below.
The 'security elements' section of the
hollister co france
guide (STIG) focuses on the essentials of database security
abercrombie milano
such as authentication, authorization, data integrity, system auditing, backup and recovery. This section of the STIG
hollister uk
discusses the security elements that are most commonly found in a database management system (DBMS) where control
moncler pas cher
resides for security of actual data.
The 'security requirements' section covers the requirements for accessing data and operating the database. There is guidance on identification and authentication, design and
barbour uk outlet
configuration, boundary defense, disaster recovery, vulnerability and incident management, physical and environmental requirements.
DOD DISA Oracle 11 Database Security Checklist. DISA has also published vendor-specific database security checklists for Oracle and Microsoft SQL Server DBMS's. The 'Oracle 11 Database Security Checklist' is the most current checklist as of the date of this writing - published in August 2010. Separate checklists have also been published for the previous Oracle versions 9 and 10. The Oracle 11 checklist includes security review procedures organized into specific security 'items' or 'checks.'
Conclusion. The two documents discussed above emphasized different aspects of database security. The CIS document provides a basic security configuration (Level I) and an advanced security configuration (Level II). The STIG document provides 'security elements' and 'security requirements'. A more detailed and specific document is the Database Security Checklist.
References. Database Security Technical Implementation Guide (STIG), Version 8, Release 1 (September 2007). US Department of Defense, Defense Information Systems Agency.
Oracle 11 Database Security Checklist, Version 8, Release 1.8 (August 2010). US Department of Defense, Defense Information Systems Agency.
Security Confguration Benchmark for Oracle Database Server 11g. Version 1.0.1 (January 2009). The Center for Internet Security.
www.cisecurity.org
相关的主题文章:
giubbotti peuterey How To Camp Hassel Free
giubbotti peuterey Hotels And Travel And Things To
barbour uk Bulldog Sale Online And How To Do It Ea
fora.pl
- załóż własne forum dyskusyjne za darmo
Powered by
phpBB
© 2001, 2005 phpBB Group
Regulamin