Part III Controlling Access to Data
Part III describes how to control access to data.
Oracle Deep Data Security extends and modernizes Oracle Virtual Private Database and Real Application Security, moving from earlier procedural PL/SQL and API-driven controls to declarative policies in SQL. Oracle recommends using Deep Data Security to ensure identity propagation, database-enforced authorizations and audit compliance.
- Using Application Contexts to Retrieve User Information
An application context stores user identification that can enable or prevent a user from accessing data in the database. - Using Oracle Virtual Private Database to Control Data Access
Oracle Virtual Private Database (VPD) enables you to filter users who access data. - Using Transparent Sensitive Data Protection
Transparent sensitive data protection enables you to identify all table columns in a database that hold sensitive data. - Encryption of Sensitive Credential Data in the Data Dictionary
You can encrypt sensitive credential information, such as passwords that are stored in the data dictionary. - Securing and Isolating Resources Using DbNest
You can secure and isolate instance-level and operating system resources by using dbNest. - On-Demand Encryption of Data
You can use theDBMS_CRYPTOPL/SQL package to perform on-demand encryption of data.