17.1 Auditable Actions
Oracle Unified Auditing can capture Oracle Deep Data Security (Deep Sec) configuration and security context lifecycle operations. Create custom audit policies with the actions listed below to track policy administration, role assignments, data grant changes, and end-user security context management.
Configuration actions
Database administrators (DBAs) use the following actions to configure Deep Sec. You can include these actions in a unified audit policy:
CREATE END USERALTER END USERDROP END USERCREATE APPLICATION IDENTITYDROP APPLICATION IDENTITYCREATE DATA ROLEDROP DATA ROLEGRANT DATA ROLEREVOKE DATA ROLECREATE DATA GRANTDROP DATA GRANTCREATE END USER CONTEXTDROP END USER CONTEXT
Security context lifecycle actions
The following action tracks the creation of end-user security contexts. This action occurs automatically during session establishment and can be used to trace database activity back to specific end-user sessions.
Because this action may generate a large number of audit records, it is
not audited when you configure an audit policy with ACTIONS ALL. To
audit this action, you must specify it explicitly in your audit policy.
CREATE END USER SECURITY CONTEXT