Oracle Database Security Audit

We offer Oracle database configuration security audit as a (Windows or UNIX) system configuration security audit extension, on which Oracle runs.

The objective is to review Oracle databases configuration and to evaluate it’s data security. In addition to founded weaknesses audit also includes technical recommendations for their removing.

Supported Oracle versions

  • Oracle RDBMS Server (versions 9 – 12)

  • we also support all main operation systems needed for DB Oracle server operation

Security audit needs short configuration data collection (less than 1 hour) on an audited server – remote access is sufficient. Data collection is made with database administrator’s assistance via a privileged account (usually with usage of DBA). Collected configuration data are processed outside a customer’s seat.

Audit scope

Oracle database system configuration security audit usually includes following areas:

ID Area
1. DB Oracle version, patchset, CPU
2. Installation, Important Files Access Rights
3. Protocol Net8 Configuration
4. Database Parameters
5. Data files, Control files, Redo log files
6. Auditing – Basic Parameters
7. Auditing – Audited Events
8. Scheduled Tasks
9. User Profiles – Password Parameters
10. Problematic User Accounts
11. DB Roles
12. System Privileges
13. Object Privileges
14. Critical DB objects

Any questions?

If you are interested in more details please contact us.

Ask by e-mail