8 Oracle Communications Data Model Security

Provides information on Oracle Communications Data Model security.

Oracle Communications Data Model Security Overview

This topic provides an overview of Oracle Communications Data Model security. When dealing with security, Oracle Communications Data Model does not provide specific security features but assumes that you leverage the security features of its dependent Oracle products, including Oracle Database and WebLogic Server.

Oracle Communications Data Model Security

Oracle Communications Data Model has no specific security features enabled by default.

Oracle Communications Data Model is a “normal” data warehouse implemented on top of an Oracle Database (although the data warehouse may only include Communications industry information). Oracle Communications Data Model is an addition to the Oracle Database and includes all the standard, or advanced in some cases, security features of the database that should be leveraged (as for any data warehouse containing sensitive data). Oracle Database provides privileged user controls, multi-factor authorization, transparent data encryption, auditing, configuration scanning, and SQL monitoring, and other industry leading security controls.

Read the following documents and apply the security solutions where relevant:

  • Oracle Database Security Guide
  • Oracle Database Advanced Security Guide
  • Oracle Fusion Middleware Securing a Production Environment for Oracle WebLogic Server (especially relevant when either WebLogic only or full OBIEE suite is used in combination with Oracle Communications Data Model).

  • Oracle Application Server Security Guide (only if used)

  • Oracle Application Server Administrator's Guide (only if used)

All Oracle documentation is available from Oracle Help Center:


There are several areas in Oracle Communications Data Model where you must take specific care and note the security considerations, including:

  • When the sensitivity of the data Oracle Communications Data Model deals with is an important consideration.

  • When the sensitivity of the access granted for some (power) users is an important consideration. For example, for anyone accessing critical application areas (for example billing or campaign management).

Communications Data Model Basic Security Considerations

The following principles are fundamental to using any application securely:

  • Keep software up to date. This includes using the latest product release and any patches that apply to it.

  • Limit privileges as much as possible. Users should be given only the access necessary to perform their work. User privileges should be reviewed periodically to determine relevance to current work requirements. This also means that no user should have direct access to OCDM_SYS (at least for production).

  • Monitor system activity. Establish who should access which system components, and how often, and monitor those components. This means that each user should have their own user ID (no generic login). It also means that roles and data access should be restricted and monitored, especially when accessing sensitive or very sensitive data.

  • Install software securely. For example, use firewalls, secure protocols using TLS (SSL), and secure passwords.

  • Learn about and use the Oracle Communications Data Model security features.


    Using Oracle Communications Data Model the Oracle Database DBA will leverage the standard or advanced security database options to protect Oracle Communications Data Model content.

  • Use secure development practices. For example, take advantage of existing database security functionality instead of creating your own application security.

  • Keep up to date on security information. Oracle regularly issues security-related patch updates and security alerts. You must install all security patches as soon as possible. See the “Critical Patch Updates and Security Alerts” Web site:


Understanding the Communications Data Model Environment

When planning your Oracle Communications Data Model implementation, consider the following:

  • Which resources need to be protected?

    • You need to protect employee and customer personal data, such as credit-card numbers, social security numbers and login, PIN, and so on.

    • You need to protect internal data, such as proprietary source code, custom development, and so on. This is not specific to Oracle Communications Data Model, but you need to make sure that any party able to access Oracle Communications Data Model and its customer paying documentation should have an NDA in place, to avoid being liable for dispatch or reuse of information by 3rd party.

    • You need to protect system components from being disabled by external attacks or intentional system overloads. This is not specific to Oracle Communications Data Model.

  • Who Are You Protecting Data From?

    The list of sources of possible threats includes a wide range of people and organizations. Threats depend on the data stored. Individuals could also include employees or an external hacker.

    For example, you need to protect your subscribers’ data from other subscribers, but someone in your organization might need to access that data to manage it. You should analyze your workflows to determine who needs access to the data and what for; it is possible that a system administrator can manage your system components without needing to access the system data. Also, hackers continue to target privileged accounts inside and outside of databases.

    The following list provides some examples of threats and the possible financial impact (taking the Communications Service Provider (CSP) point of view).

    • Insider: typically an employee or a contractor, who tries to abuse the normal rights for “revenge” or for their own benefit. In this case the possible damage is highly dependent on the breadth of access the person has and how malevolent the actions are. The damage can range from self adjustment (of one’s own bills) up to destruction or re-selling of data.

    • Individual: individual persons outside the CSP, not including employees or contractors, that try to get into the Communications Service Provider (CSP) network to test themselves (and the CSP) or to test the security for “fun”. These threats can cause significant damage.

    • Criminal organizations: such organizations target the CSP for subscriber data, in particular bank account and credit card data. They may also target the network to take control and blackmail the CSP.

    • State-like organizations: their aim is usually to gather information on their own target(s). CSP data is a treasure if they want this data and they do not or cannot go through a standard judicial process to obtain the data.

    • Research organizations: these organizations try to test security and look for breaches. Their goal is often to publish their finding but such organizations sometimes notify the organization and provide the opportunity (time) to change the system before they publish security vulnerabilities. Such threats, when identified may have a small financial impact if the vulnerability stays under the CSP’s control.

    The CSP has to protect Oracle Communications Data Model with the highest security standard possible with respect to the possible wide range of threats Oracle Communications Data Model system may be subject to. A cable operator doing local B2B offerings with small or medium enterprises may not be as sensitive to some attacks as big operators, but the threat is present and prevention is better than reparation.

  • What will happen if protections on a strategic resource fail?

    In some cases, a fault in your security scheme is nothing more than an inconvenience. In other cases, a fault might cause great damage to the CSP and to your customers. Understanding the security ramifications of each resource allows you to properly protect it.

Oracle Communications Data Model is an option of the Oracle Database and because it is a physicalized Enterprise Data Warehouse, the security principles of Oracle Communications Data Model follow the standard security principles valid for any Oracle Database (as described in the ). Additionally, you need to apply the security policies associated with the applicable reporting tools. By default, Oracle Communications Data Model uses the repository and reports with Oracle Business Intelligence Enterprise Edition (OBIEE), which leverages WebLogic server. Hence, the security standards applied to the Oracle Communications Data Model reporting layer should be set up as security for WebLogic server (and OBIEE).

Also, security features need to protect the servers and their operating systems on which the database for Oracle Communications Data Model runs, as well as any interfaces and configurations for supplying and accessing the systems or for reports. In particular:

  • ETL/ELT servers and ETL GUI (staging area and more)

  • Direct feed to Oracle Communications Data Model (whether with GUI or not)

  • Access to the database management (DBA GUI)

  • Access to/from Oracle Communications Data Model:

    • For Development Tools: SQL developer, SQL Data Modeler

    • For research and discovery: Oracle Data Mining GUI, Oracle Data Miner (including SNA), Oracle R

    • For cubes management: Oracle Analytical Workspace Manager

    • External feeds to other applications (from Oracle Communications Data Model directly, for example through a trigger)

    • Configuration Files

  • Oracle Communications Data Model Content

    • Users Traceability and Audit-ability (especially for sensitive data)

    • Encryption and masking (especially for sensitive data and the backups for sensitive data)

    • User access rights (through roles)

  • Backup and Disaster Recovery Systems (and high availability architecture).

  • BI systems and applications on top of Oracle Communications Data Model, leveraging its data

    • OBIEE

    • Any other system (for example a campaign management tool)

Depending on which part of Oracle Communications Data Model has been implemented and filled with data, some or all of the security steps should be applied. Additionally, any customization must be protected as part of the global security processes.

Recommended Deployment Configurations

Typically, as for any data warehouse, there are several environments on which you install Oracle Communications Data Model:

  • The Test and Development Environment (R&D): this area is for testing, development, research, and unit testing with a subset of data. The test and development environment is typically where most customization takes place before being moved to other environments. The test and development area usually contains a full end-to-end implementation (from staging area up to BI reporting). Despite the test and development apparently temporary presence, this environment should be kept available for debugging and for work on extensions to Oracle Communications Data Model (this area could be reduced when there are no planned project extensions).


    The staging, data warehouse and BI server do not need to be installed on the same platform and they can have their own test or pre-production and production environment.

  • The Pre-production Environment: this area is typically provided for scalability testing (load and performance) and global integration testing. The pre-production environment should contain a representative subset of the data set (for example, containing a few months of history), for a relevant test and for final user acceptance.

  • The Production Environment: this area is the final end user environment, providing the required performance and capacity to store the complete data set and any required history.

All these environments must be protected equally since they likely will contain copies of similar sensitive data, whatever subset of data you use for the different testing and development or pre-production environments. Additionally, the backup of each of these environments, if any, should be protected as if it was production.

Architecture Analysis for Security

This topic describes areas in Oracle Communications Data Model that are potential security risks, in order to first be aware of them and second, to secure them.

Security Boundaries of Trust

Within each boundary shown in Figure 8-1, assume that whoever accesses the data can be trusted (with “recognized” users or roles). Outside those boundaries, anyone is a potential threat (this is critical from a security analysis perspective).

Figure 8-1 Security Boundaries of Trust

Description of Figure 8-1 follows
Description of "Figure 8-1 Security Boundaries of Trust"

Figure 8-1 identifies points of interactions at risk, trust boundaries, through which an attack could occur. The interactions at risk are:

  1. ETL GUI: Whatever tools and GUI you use for the Extraction, Transform and Load tools that manage the data movement and transformation from the source to staging area, there is clearly a risk of attack:

    • Because the tool has access to the raw data source as well as all its transformation rules (Database login data, data source visibility, metadata and transformation rules, mapping).

    • Because someone could change the rules (and place unexpected code into Oracle Communications Data Model).


    If you use Big Data this is also considered part of the “Staging area” even if it also performs operational analysis and reporting. Adding a Big Data environment into the architecture thus includes additional interfaces, and additional boundaries of trust that need to be considered for security and analyzed.

  2. SQL developer and Oracle Data Modeler GUI (or any GUI that can directly access the database of either the staging area or the Oracle Communications Data Model area – hence two accesses at risk). The access at this boundary needs to be restricted (leveraging roles) and monitored (traceability). Additionally, the access string must be protected (do not allow the tnsnames.ora to be saved with an unencryption schema password) and the schema password should never be saved with the applications.

  3. Data Source feed: when some data from the source system could cause a security breach (through unexpected code or corrupted data, intentional or not, that could break the process). The best way to protect from such an attack is to set up a data profiling check (for example with ODI Data Profiling option or manually by verifying that the input data have the content you expect). Additionally, the schema name and password for the connection should be protected as for 1 and 2 (if not done in the respective GUI).

  4. Direct Data Source Feed: this case is similar to case 3, but a direct data source feed assumes a real-time or near real-time direct feed to Oracle Communications Data Model (to the foundation or analytic layer). The protection should however be similar to 3.

  5. DBA GUI access: Due to its rights, the DBA is clearly a role with risk, whatever GUI this person uses (Oracle Enterprise Manager, or any other tools of choice). Leverage the suggestions in Oracle Database Security Guide to split the various DBA roles and data access.

  6. DBA Backup process and access GUI: This is similar to 5, but for the backup process. Refer to the Oracle Database Security Guide for this area, in particular for backup encryption and splitting the backup role from the standard DBA role.

  7. Backup process itself: The backup process must be as secure as the Oracle database it is supposed to backup. Configuration files must be encrypted to avoid malevolent use (for example running an unwanted “Restore” or changing the target for a backup). Refer to the security guide of the backup software for such risk analysis.

  8. Oracle Advanced Analytics Mining GUI (or any other mining tools GUI): Power users that have access to mining normally also have access to most of the data in clear text (to be able to run the mining and to build the models). They should be treated correspondingly from a data access perspective with much care, as their power, unless explicitly limited within their role, is similar to the DBA. Such power users may also use significant resources (for example CPUs) to run their models, possibly unwillingly deploying a self-developed model to the full customer base on a production system at an unplanned time, making the data warehouse slow down such that it becomes unusable. On top of a secure access to the database (with hopefully encrypted configuration files), the GUI for mining users should be protected (and access traced), as for the DBA GUI (5).

  9. Oracle Analytics Workspace Manager GUI (or any GUI accessing the database OLAP cubes or creating M/R/HOLAP cubes in Oracle Communications Data Model or accessing data from Oracle Communications Data Model): Security risk and mitigations should be as for the mining GUI (7).

  10. WebLogic or BI server Access to Oracle Communications Data Model: The BI server that serves as “BI windows” to Oracle Communications Data Model end users is a boundary of trust, independent of the BI tool used (including WebLogic or other tools) The configuration file and the connection to access Oracle Communications Data Model should be protected according to the security guidelines for the corresponding tool. For more information for WebLogic guidelines see Oracle Fusion Middleware Securing a Production Environment for Oracle WebLogic Server .

  11. External Data feed (outgoing): When information is directly picked up from Oracle Communications Data Model database by an external application (campaign management or monitoring tools for example, to obtain the churn probability and to generate the best offer for a customer) or when Oracle Communications Data Model itself is setup to export on a regular basis directly to a file, using a database trigger or Spool scripts for example, the data exported should be correspondingly:

    • Anonymized (as part of the export process) or encrypted (before being transmitted) according to the sensitivity of the content.

    • Stored in a place that is only accessible for the purpose required, and not changeable, possibly encrypted or unreadable except by the targeted application.

    • In a format and with the data expected (quality check).

    • Removed after use by the target application.

    Check the appropriate database security guide to protect the external feed and the security guide of the application when direct load or query to the database.

  12. OBIEE Administrator GUI: The administrator is usually accessing the BI tools and manages the access rights and data accessed as well as the way they are organized and presented to the end-users. With OBIEE, the repository (rpd – default in Oracle Communications Data Model is ocdm.rpd) and the webcat files are the most important to protect. See the Oracle Fusion Middleware Securing a Production Environment for Oracle WebLogic Server and apply the suggestions according to your environment and needs.

    The OBIEE admin should remove or restrict access to OCDM_SAMPLE after it is no longer required, change default password of OCDM RPD, and define all the users (individually), associated with database Users. Additionally, the OBIEE administrator should define various groups with limited rights (at OBIEE level) and associate each user with one of those groups. It is important to implement a 2 level security: .

    • Database level (I can only access the data I am entitled to – independently of what rights I am given at BI level)

    • OBIEE level (I can only access the reports and create new reports or leverage OBIEE features on data I am entitled to see and/or use).

  13. OBIEE end-users: The end-users usually access their data through their browser on their mobile device or from their desktop. See the Oracle Fusion Middleware Securing a Production Environment for Oracle WebLogic Server for more information.

  14. Analytic Applications (such as Billing Analytics, Social Network Analysis- SNA or Customer Experience Analytics - CXA) Users: These applications have a specific part in the Oracle Communications Analytics Security guide specifying the risks and security measures you need for such sensitive applications. They are usually associated with powerful tools (mining algorithms for SNA, based on customer sensitive information such as calling communities or full customer information for CXA).

  15. WebLogic Outside or Others Incoming feed: this corresponds to the loading of external data to the WebLogic server to combine them with Oracle Communications Data Model output. It is proper to the WebLogic server and should be handled through Oracle Fusion Middleware Securing a Production Environment for Oracle WebLogic Server instructions. An example of load is an end-users loading an Excel file with 3rd party data (weather data, market share data, and so on) to enrich its own reports. If this file is corrupted or prepared with a malevolent intention, it can represent a risk for the complete architecture.

  16. WebLogic Outside or other (outgoing) feeds: This is exported from WebLogic server to the external world (as MS object or flat file, SMS or email, web agent, and so on). This can become particularly sensitive depending on the information sent or its form of management. Such external feeds must be handled as referred to in Oracle Fusion Middleware Securing a Production Environment for Oracle WebLogic Server.

  17. BI server backup: this is similar to the Oracle Communications Data Model backup, the BI server backup is to be secured in a similar way as for the Database. Refer to both the Oracle database and Oracle Fusion Middleware Securing a Production Environment for Oracle WebLogic Server to securely handle backups.

  18. Application GUI that manages the access and data loaded directly from the Oracle Communications Data Model database: Such applications should be similarly protected (encrypted where possible), monitored and limited (from a data access) as for a normal end-user. Avoid general application (generic) user accounts unless the information is not accessible by anyone else but the application itself (no external communications – internal processes only). Always use the “user ID” that logs into the application and do not use a generic user account.

Security by Component

Outlines security by component. To obtain the highest level of security you must leverage all the possible security options you can within your budget and resources. The default security provided is better than no security, but you should provide enough resources to obtain the highest possible security standard.

Security Component by Component

  • Operating System Security

    This area is not Oracle Communications Data Model specific. For example, if the Linux OS is used, see the following documents:

    • Guide to the Secure Configuration of Red Hat Enterprise Linux 5

    • Hardening Tips for the Red Hat Enterprise Linux 5

  • Oracle Database Security and WebLogic Server Security

    Not Oracle Communications Data Model specific.

Performing a Secure Oracle Communications Data Model Installation

Presents information to plan for a secure Oracle Communications Data Model installation. Outlines the steps required to perform a secure installation.

Pre-Installation Configuration

On the Oracle Database, after installation of partitioning, Database OLAP and mining, the simplest recommendation is first to change all default passwords (in particular of SYS and SYSTEM) and lock all accounts and schema that are not used.

Installing Communications Data Model Securely

You can perform a custom installation or a typical installation. Perform a custom installation to avoid installing options and products you do not need. If you perform a typical installation, remove or disable features that you do not need after the installation.

On the Oracle Database, during the installation process, first change all default passwords for OCDM_SYS (and OCDM_SAMPLE if installed). Use ALTER USER IDENTIFYIED BY SQL command for example.

There are four areas with default passwords:


  • OCDM_SAMPLE (to be removed at least for pre-production and production).

  • RPD Admin default password

  • Ocdm user OBIEE default password

Define the list of people and applications that need to access Oracle Communications Data Model, then determine the data they need use, the constraints to their access (the complete data set or only a subset), and for each type of profile, define a role at the database level with corresponding privileges. (CREATE ROLE command, and GRANT ROLE, PRIVILEGEs TO ROLE / USER command).

Create as many schemas as you need for each end-user that accesses Oracle Communications Data Model and specify the correct roles to limit access as required.

When you use OBIEE for reporting, change the default passwords of the RPD (see OBIEE Admin Guide for this) and change also the default user password (of ocdm). Create a user for each end-user, with groups, rights and roles as you did for the Database but at OBIEE level.

Post-Installation Configuration

There is nothing specific for this area except you must encrypt any custom scripts that you create and use for Oracle Communications Data Model.

Implementing Communications Data Model Security

Explains the Oracle Communications Data Model security features for tables and entities. This topic lists security sensitivity at various levels for Communications Data Model entities.

Implementing Communications Data Model Security

Oracle Communications Data Model is an option of the database and it does not contain product specific security features. However to secure Oracle Communications Data Model you must apply the rules of a secured data warehouse as explained in the Oracle Database Security Guide. The security rules must be applied and enforced.

The Oracle Communications Data Model includes entities and some entities need to be protected at various levels of security based on the sensitivity of the data they store.

The range for secure entities in the listing ranges from 1 (very sensitive) to 5 (public data).

Table 8-1 Entity Sensitivity Levels

Level Description Type of data Actions recommended


Highly sensitive

payment data, and so on.

Encrypt by default (at least the sensitive fields). Audit, Do not allow backup (without encryption), limit roles accessing them



address, age, resource, and so on.

Mask by default (at least sensitive fields), audit from time to time, limit roles accessing them


Somewhat sensitive


Limit access


Not sensitive




Publicly available data (weather, and so on.)



By default, any information in Oracle Communications Data Model is somewhat sensitive. Even if no data is stored in an entity, the entity should be protected from access.

Security Maintenance, Monitoring and Control

Provides information on controls for maintaining security for Oracle Business Intelligence Enterprise Edition (OBIEE) and the Oracle Database. You need to ensure that you remove or at least lock all unused users at the OBIEE and database level, and perform regular monitoring of user permissions and usage.

Users and Schema Management at Database and OBIEE Level

Remove (or at least lock) all unused users from both the OBIEE and the database level.

Monitor and automatically lock users without activity for the last N or 60 days (on OBIEE and on Oracle Communications Data Model). Providing a regular schedule for locking or resetting for the password for accounts every 120 days, to force a password change, is also a good practice.

Security Considerations for Developers

Provides information for developers about how to create secure applications for Oracle Communications Data Model, and how to extend Oracle Communications Data Model without compromising security.

Security Considerations for Developers

There are three levels where Oracle Communications Data Model developers work:

  • Database level: in Oracle Communications Data Model itself, typically for extensions and Customization, from tables to Intra-ETLs up to OLAP cubes or Mining models.

  • ETL level: in the staging area typically, to move data from source to Oracle Communications Data Model, while taking care of quality (correctness of content and quantity, timely arrival, meaningfulness for the scope), coherence, latency (or time coherence) and correctness (of mapping to Oracle Communications Data Model).

  • OBIEE level: Development (extensions, customizations) of dashboards, reports, alerts, web agents, guided analytics, users and user interfaces.

Each developer should work only on the test environment (except those who test performance in a pre-production environment). Developers should have access to a limited extract of the data that only concerns their scope of work. If possible, provide a dummy set of sample data, as similar to a real data set as possible, for unit testing before testing the system with real data.

If it is not possible to use sample data, it is strongly advised to use data masking for customer and payment information of the most sensitive tables. Also consider encrypting the source files or input files if sensitive information is stored there.

Dealing with Data Privacy, Data Retention, and other Data Related Rules and Laws

Describes regulations and covers dealing with data privacy, other data related rules and laws.

Dealing with Data Privacy, Data Retention, and other Data Related Rules and Laws

Each country has its own regulations with respect to data privacy, data allowed and forbidden to be stored and used, and the time for which it must be stored and available for criminal or state inquiry.

For Europe for example, you need to consider the laws, at least for data retention, including:

  • DIRECTIVE 2006/24/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL - 15 March 2006, which amended the Directive 2002/58/EC for Data privacy of Electronic communications.

These items specify rules for data for Quality, Security and Confidentiality.

Another concrete example: some fields need to be removed from Oracle Communications Data Model (or not used at least) in Europe: ETHNICITY field in PARTY is not allowed. The Opt-in and Opt out option of customers must be leveraged by campaign management systems. The Op-in and Opt out options are available in the Social Network Analytics option of Oracle Communications Data Model.

Because it is locally specific, you should review the Oracle Communications Data Model content for the project and data you are considering using with your data protection staff (or review the law currently applicable).

Database Vault on Oracle Communications Data Model

Describes how to use Database Vault with Oracle Communications Data Model

DBA Privileges

It is known that the user who has DBA privilege can see data in OCDM_SYS schema, Oracle Database Vault provides powerful security controls to help protect application data from unauthorized access, and comply with privacy and regulatory requirements. Figure 8-2 shows user SYSTEM query data from table OCDM_SYS.DWB_ACCT_BAL.

Figure 8-2 Sample SYSTEM Query

Description of Figure 8-2 follows
Description of "Figure 8-2 Sample SYSTEM Query"

Registering Oracle Database Vault with an Oracle Database

Describes how to register Oracle Database Vault from SQL*Plus in a non-multitenant environment.

Registering Oracle Database Vault with an Oracle Database

You can register Oracle Database Vault from SQL*Plus in a non-multitenant environment.

  1. Log into the database instance as user SYS with the SYSDBA administrative privilege.
    sqlplus sys as sysdba
    Enter password: password
  2. As user SYS with the SYSDBA administrative privilege, configure the Database Vault user accounts.
    SQL>CREATE USER dbv_owner IDENTIFIED BY dbv_owner;
    SQL>CREATE USER dbv_acctmgr IDENTIFIED BY dbv_acctmgr;
    SQL>GRANT CREATE SESSION TO dbv_owner, dbv_acctmgr;
    dvowner_uname => 'dbv_owner',
    dvacctmgr_uname => 'dbv_acctmgr');
  3. Run the utlrp.sql script to recompile invalidated objects. If the script gives you any instructions, follow them, and then run the script again. If the script terminates abnormally without giving any instructions, run it again.
  4. Connect as the Database Vault Owner user that you just configured.
    SQ>CONNECT dbv_owner

    Enter password: password

  5. Enable Oracle Database Vault.
  6. Connect with the SYSDBA administrative privilege.
  7. Restart the database.

Verifying That Oracle Database Vault Is Configured and Enabled

You can query the V$OPTION dynamic view to verify if Oracle Database Vault is configured and enabled.

To find if Oracle Database Vault is configured and enabled, run the following query, which should show the VALUE setting as TRUE.
  1. Query the V$OPTION dynamic view as follows:
  2. To check if Oracle Label Security is enabled, query V$OPTION as follows:

Logging into Oracle Database Vault

From Oracle Enterprise Manager Cloud Control (Cloud Control), you can use the Oracle Database Vault pages to administer and monitor Database Vault-protected databases from a centralized console, automate alerts, view Database Vault reports, and propagate Database Vault policies to other Database Vault-protected databases.
  1. Ensure that you have configured the Cloud Control target databases that you plan to use with Database Vault.
  2. If necessary, register Oracle Database Vault.
  3. Start Cloud Control
  4. Log into Cloud Control as user SYSMAN
  5. In the Cloud Control home page, from the Targets menu, select Databases
  6. In the Databases page, select the link for the Oracle Database Vault-protected database to which you want to connect. The Database home page appears
  7. From the Security menu, select Database Vault.The Database Login page appears
  8. Enter the following information:

    Username: Enter the name of a of a user who has been granted the appropriate Oracle Database Vault role(dbv_owner)

    The Database Vault home page appears

Securing OCDM_SYS Schema from DBA Access

  1. Step 1: Log On as SYSTEM to Access the OCDM_SYS Schema
  2. Create a Realm
    1. Log into Oracle Database Vault Administrator from Cloud Control as a user who has been granted the DV_OWNER or DV_ADMIN role and the SELECT ANY DICTIONARY privilege.
      "Logging into Oracle Database Vault" on page 3-7 explains how to log in.
    2. In the Administration page, under Database Vault Components, click Realms. (It should be selected by default.)
    3. In the Realms page of Oracle Database Vault Administrator, click Create.
    4. In the Create Realm page, under General, enter OCDM Apps after Name.
    5. In the Description field, enter Realm to protect the HR schema.
    6. After Status, ensure that Enabled is selected so that the realm can be used.
    7. Under Audit Options, ensure that Audit On Failure is selected so that you can create an audit trial later on.
    8. Click Next to display the Realm secured objects page.
    9. Click the Add button and in the Add Secured Object dialog box, enter the following information:
      Owner: Enter OCDM_SYS to select the OCDM_SYS schema.

      Object Type: Enter TABLE.

      Object Name: Enter DWB_ACCT_BAL.

    10. Click OK.
      The OCDM_SYS.DWB_ACCT_BAL table is added to the Create Realm : Realm Secured Objects page
    11. Click Done, and then click Finish.
  3. Create the OCDM Manager User Account
    At this stage, there are no database accounts or roles authorized to access or otherwise manipulate the database objects the realm will protect. So, the next step is to authorize database accounts or database roles so that they can have access to the schemas within the realm. You will create the OCDM_MGR user account.
    1. .In SQL*Plus, connect as the Database Vault Account Manager, who has the DV_ACCTMGR role, and create the local user OCDM_MGR.
      SQL>conn dbv_acctmgr/dbv_acctmgr;
    2. Connect as SYS with the SYSDBA privilege, and then grant SEBASTIAN the following additional privilege.
      SQL>conn / as sysdba;
  4. Create an Authorization for the Realm
    At this stage, even though OCDM_MGR has the SELECT ANY TABLE privilege, he cannot select from the OCDM_SYS.DWB_ACCT_BAL table because it is protected by a realm.
    Next, authorize user OCDM_MGR to have access to the OCDM Apps realm as follows:
    1. .In the Realms page of Database Vault Administrator, select the OCDM Apps in the list of realms, and then click Edit.
    2. Click the Next button until you reach the Realm authorizations page.
    3. Click Add and then enter the following information in the Add Authorizations dialog box:
      • Realm Authorization Grantee: Enter OCDM_MGR.

      • Realm Authorization Type: Select Participant from the list.

      • Realm Authorization Ruleset: Leave this field blank.

    4. Click OK.
    5. Click Done, and then Finish.
  5. Test the Realm
    To test the realm, try accessing the DWB_ACCT_BAL table as a user other than OCDM_SYS. The SYSTEM account normally has access to all objects in the OCDM schema, but now that you have safeguarded the DWB_ACCT_BAL table with Oracle Database Vault, this is no longer the case. connect as SYSTEM, and then try accessing the account balance information in the DWB_ACCT_BAL table again:
    Enter password: password

    The following output should appear:

    Error at line 1:

    ORA-01031: insufficient privileges


    Enter password: password

    Query data in DWB_ACCT_BAL,data appears

Data Masking on Oracle Communication Data Model

Describes how to use Data Masking with Oracle Communications Data Model.

Data Masking Overview

When performing real-world testing, there is the risk of exposing sensitive data to non-production users in a test environment. The Data Masking feature of the Enterprise Manager for Oracle Database Plug-in helps you to securely manage test data.

Using Data Masking

Describes steps for using data masking with Oracle Communications Data Model.

Assume there is sensitive data showing bank card number information where masking is required before sending the data to a test environment.
  1. Go to EM cloud control, Security->Application Data Model
  2. Create Application Data Model.
  3. Enter Application Data Model name and select source database.
  4. Enter the database credentials and select OCDM_SYS schema.
  5. Enter the job name
  6. Job submitted successfully
  7. Job done
  8. Edit the Application Data Model
  9. Add sensitive column
  10. Select column BNK_CARD_NBR in table DWR_ACCT_PYMT_MTHD
  11. Sensitive column added
  12. Set sensitive column type
  13. Set sensitive column type to ‘CREDIT_CARD_NUMBER’
  14. Sensitive column type updated
  15. Go to Security->Data Masking and Subsetting->Data Masking Definitions
  16. Data masking definition
  17. Create data masking definition
  18. Add column BNK_CARD_NBR
  19. Set format entry to random number
  20. Set the random number from 100000000 to 999999999
  21. Data masking definition created
  22. Generate data masking script
  23. Schedule data masking script job
  24. Generating masking script
  25. Masking script generating job succeeded
  26. Masking script generated.
  27. Schedule data masking job
  28. Data masking job submitted successfully
  29. Data masking job succeeded
  30. Now, check BNK_CARD_NBR, it is masked

Transparent Data Encryption in Oracle Communications Data Model

Describes how to configure Transparent Data Encryption (TDE), and demonstrates using TDE (making one encrypted column and one encrypted tablespace).

Transparent Data Encryption (TDE) stops would-be attackers from bypassing the database and reading sensitive information from storage by enforcing data-at-rest encryption in the database layer. Applications and users authenticated to the database continue to have access to application data transparently (no application code or configuration changes are required), while attacks from OS users attempting to read sensitive data from tablespace files and attacks from thieves attempting to read information from acquired disks or backups are denied access to the clear text data.

Configuring a Software Keystore

Configuring a Software Keystore

  1. Set the Software Keystore Location in the sqlnet.ora File.
  2. Create the Software Keystore.
    SQL>ADMINISTER KEY MANAGEMENT CREATE KEYSTORE ‘/biaora/home/app/biaora/admin/orcl12102/wallet’ IDENTIFIED BY ‘password’;
  3. Open the Software Keystore
    keystore altered

Demonstration of Oracle Communications Data Model Working with TDE

Use running one IETL package (PKG_DWD_ACCT_BAL_MO) as a TDE example.

  1. Showing dependent tables for PKG_DWD_ACCT_BAL_MO
  2. Showing part of data in table DWB_ACCT_BAL, later we will encrypt column BAL_AMT
  3. Showing data and current tablespace of table DWR_ACCT,later we will move it to one encrypted tablespace
  4. Showing encrypted columns.
  5. Showing current encryption property for each tablespace.
  6. Encrypt column BAL_AMT
  7. Now, column BAL_AMT is encrypted
  8. Go to EM cloud control to create encrypted tablespaceSecurity->Transparent Data Encryption
  9. Click Encrypt Tablespace
  10. Click Create
  11. Add datafile
  12. Check Encryption option
  13. Select Encryption Algorthm
  14. Showing the generated script
  15. Now, encrypted tablespace TBS_REFERNCE_TDE is created
  16. .Grant privilege on new tablespace.
  17. Move table DWR_ACCT to encrypted tablespace
  18. Select Schema Objects
  19. Search table DWR_ACCT
  20. Select move to new created tablespace.
  21. Show generated script
  22. Now ,table DWR_ACCT is moved to encrypted tablespace
  23. Before running IETL, target table DWD_ACCT_BAL_MO is empty.
  24. Run the IETL
  25. Now the target table has data.

Although column DWB_ACCT_BAL.BAL_AMT is encrypted and table DWR_ACCT is moved to and encrypted tablespace, it is transparently encrypted for Oracle Communications Data Model.