Choose and Implement Your Deployment
Use the methods presented in this section to secure Oracle Autonomous Database Serverless@Azure:
- Use Transparent Data Encryption and Azure Key Vault
- Configure and Enable Oracle Database Vault
- Register the Database with Oracle Data Safe
- Centralize User Authentication and Authorization by Integrating with Entra ID
- Unify Audit and Database Pipeline to Export Data to Azure Blob Storage
- Use Oracle SQL Firewall for Oracle Database 23ai
Option 1: Use Transparent Data Encryption and Azure Key Vault
Oracle Transparent Data Encryption (TDE) is configured and enabled by default in all Oracle Autonomous Database Serverless databases.
The following steps will show you how to validate the default TDE setup. Then, it will walk through the steps for implementing customer managed encryption with Azure Key Vault for the Oracle Autonomous Database Serverless.
To implement the plan presented here, you must first meet the following prerequisites:
- Deploy the Oracle Autonomous Database Serverless instance by using the Microsoft Azure Console
- Create the Azure Key Vault (either Standard or Premium)
- Create an RSA 2048-bit key in the Azure Key Vault
- Create a service principal for Autonomous Database
To use TDE and Azure key vault, perform the following steps:
Option 2: Configure and Enable Oracle Database Vault
Configure and enable Oracle Database Vault in your Oracle Autonomous Database Serverless instance to protect data from unauthorized privileged account access.
You need to create some additional database accounts to facilitate separation of duties for Oracle Database Vault. After Oracle Database Vault is enabled, create a Oracle Database Vault realm to separate the sensitive data from highly privileged accounts inside the database.
To configure and enable Oracle Database Vault:
Option 3: Register the Database with Oracle Data Safe
Oracle Data Safe is a unified control center for your Oracle databases that helps you understand the sensitivity of your data, evaluate risks to your data, mask sensitive data, implement and monitor security controls, assess user security, monitor user activity, and address data security compliance requirements.
In this option, you register the target instance with Oracle Data Safe. After successful registration, review the Security Assessment and the User Assessment results and configure baselines for each.
To register the database with Oracle Data Safe, perform the following steps:
- Register the target database with Oracle Data Safe:
- In the OCI console, click Oracle Database, then Overview under Data Safe. Click Target databases in the left navigation pane and click Register database.
- Select Oracle Autonomous Database Serverless, enter the required information and click Register.
- Upon successful target registration, Oracle Data Safe initiates both a Security Assessment scan as well as a User Assessment scan.
- Review the Security Assessment:
- From the Data Safe Overview page, click Security Assessment in the left navigation pane. Select the target summary tab, then click the target summary for your database.
- Scroll down and review each of the findings. If necessary, take corrective action and initiate another scan. If you are happy with the current scan results and accept the findings, click Set as Baseline. All future scans are compared with the baseline and you will receive a notification if the database configuration deviates from the set baseline.
- Review the User Assessment:
- From the Data Safe Overview page, click Security Assessment in the left navigation pane. Select the target summary tab, then click the target summary for your database.
- Scroll down and review each of the findings. If necessary, take corrective action and initiate another scan. If you are happy with the current scan results and accept the findings, click Set as Baseline. All future scans will be compared with the baseline and you will receive a notification if the database configuration deviates from the set baseline.
Option 4: Centralize User Authentication and Authorization by Integrating with Entra ID
Managing users and credentials for Oracle Database users can quickly become a challenging administrative burden as the number of databases instances multiply.
Oracle has been creating innovative solutions to mitigate this problem for decades. Oracle Autonomous Database honors OAuth2 tokens issued by Entra ID (formerly Active Directory), Microsoft’s cloud identity platform. This capability lets you manage users and roles in a central cloud identity solution, while Oracle Autonomous Database uses those credentials for policy-based access controls.
The authentication flow is shown in the diagram below and described in steps that follow:
azure-authentication-oracle.zip
- The Azure user requests access to the Oracle Autonomous Database Serverless instance.
- The database client or application requests an authorization code from Entra ID.
- Entra ID authenticates the user and returns the authorization code.
- The helper tool or application uses the authorization code with Entra ID to exchange it for the OAuth2 token.
- The database client sends the OAuth2 access token to the Oracle database. The token includes the database app roles the user was assigned to in the Entra ID app registration for the database.
- The Oracle Autonomous Database Serverless instance uses the Entra ID public key to verify that the access token was created by Entra ID.
To implement the plan presented here, you must first meet the following prerequisites:
- Set up Oracle Autonomous Database Serverless as an Microsoft Azure Entra ID enterprise application (tutorials are referenced in the Explore More section).
- Set up SQL Developer Client for seamless Azure Entra ID authentication.
To integrate authentication with Microsoft Entra ID, perform the following steps:
Option 5: Unify Audit and Database Pipeline to Export Data to Azure Blob Storage
Creating an audit trail of your database transaction is a powerful way to ensure that you have traceability. Oracle Autonomous Database includes pipelines that are ready to configure and deploy and that can push these audit logs to your choice of multicloud storage. This section shows how you can easily use the existing Entra ID service principal (created in the previous section) to push your audit trail to Azure Blob Storage on a continuous time interval.
To implement the plan presented here, you must first meet the following prerequisites:
- Enable a unified audit trail with Oracle Data Safe.
- Create a service principal for the Oracle Autonomous Database Serverless.
- Create an Azure storage account.
- Create a private container in the Azure storage account for the Oracle Autonomous Database Serverless audit logs.
To use and store audit logs, perform the following steps:
Option 6: Use Oracle SQL Firewall for Oracle Autonomous Database Serverless 23ai
In addition to the virtual networking security lists and network security groups, Oracle Autonomous Database Serverless 23ai ships with Oracle SQL Firewall.
Oracle SQL Firewall is a defense-in-depth feature that runs within the database runtime and that enforces policy-based and context-based access control to your data.
For Oracle Database@Azure, the SQL Firewall policies can provide last-mile protection against unauthorized access, regardless of the ingress point.
adbs-sqlfirewall-flow-oracle.zip
To implement the plan presented here, you must first meet the following prerequisites:
- Register Oracle Data Safe with Oracle Autonomous Database Serverless 23ai instance.
- Enable SQL Firewall in Oracle Data Safe (a link to instructions is provided in the Explore More section).
To use Oracle SQL Firewall for Oracle Autonomous Database Serverless 23ai, perform the following steps: