Go to main content

Oracle® SuperCluster M8 and SuperCluster M7 Security Guide

Exit Print View

Updated: August 2019
 
 

Database Activity Monitoring and Auditing

Oracle Database support of fine-grained auditing enables you to establish policies that selectively determine when audit records are generated. This capability helps you focus on other database activities and reduces the overhead that is often associated with audit activities.

Oracle Audit Vault and Database Firewall centralizes the management of database audit settings and automates the consolidation of audit data into a secure repository. This software includes built-in reporting to monitor a wide range of activities, including privileged user activity and changes to database structures. The reports generated by Oracle Audit Vault and Database Firewall provide visibility into various application and administrative database activities, and provide detailed information to support accountability of actions.

Oracle Audit Vault and Database Firewall enables the proactive detection and alerting of activities that might indicate unauthorized access attempts or abuse of system privileges. These alerts can include both system- and user-defined events and conditions, such as the creation of privileged user accounts or the modification of tables containing sensitive information.

Oracle Audit Vault and Database Firewall Remote Monitor can provide real-time database security monitoring. This feature queries database connections to detect malicious traffic, such as application bypass, unauthorized activity, SQL injection, and other threats. Using an accurate SQL grammar-based approach, this software helps you quickly identify suspicious database activity.

For more information, refer to the Oracle Audit Vault and Database Firewall documentation at http://docs.oracle.com/cd/E37100_01/index.htm.