Table of Contents Table of Contents Title and Copyright Information Access to Oracle Support Preface Documentation accessibility Diversity and Inclusion Related resources 1 Oracle LSH and Oracle DMW Security Introduction User Security Features User Password Security Database User Account Security Oracle TMS User Security Application Security Features Roles, Rights, and User Groups Data Blinding and Masking Object Security Auditing and Monitoring Data Auditing Oracle DMW Discrepancy Auditing Security Configuration Features Secure Installation Secure the Database Context Secure Installation with HTTPS Secure the WebLogic Server Secure Access to APIs Oracle DMW File Watcher Security DP Server Security Security for Third-Party Applications Secure Oracle Business Intelligence Enterprise Edition Integration Oracle DMW Secure Development Broken Access Control Cryptographic Failures Injection Insecure Design Security Misconfiguration Vulnerable and Outdated Components Identification and Authentication Failures Software and Data Integrity Failures Security Logging and Monitoring Failures Server-Side Request Forgery