The image shows the basic flow for the SQL Firewall.

  1. A user logs in to the Oracle database through a web application.
  2. The user runs SQL statements, creating inbound traffic to the Oracle database.
  3. SQL Firewall inspects the incoming database connections and SQL statements, and enforces it against the permitted SQL statements and trusted connection paths in the allow-list policy for the user. SQL Firewall’s processing outcome is one of the following options:
    • Allow the SQL for its subsequent execution.
    • Allow the SQL and log it.
    • Log and optionally block unauthorized SQL.