Using Oracle Label Security

 

Oracle Label Security was introduced in Oracle8i to provide multi-level security capabilities within the Oracle Database for government and defense organizations. Since then, the use of label based access control technology has expanded to commercial organizations addressing privacy and regulatory compliance requirements. Oracle Label Security has the ability to:

  • Control access based on data classification, adding a powerful dimension to the access control decision process.
  • Enforce traditional multi-level security (MLS) policies for government and defense applications.

In addition, Oracle Label Security user authorizations such as “Sensitive:PII” can be used:

For government and defense applications Oracle Label Security provides multi-level security (MLS) capabilities to protect classified information. Please refer to the Label Security best practices paper for more information on Oracle Label Security MLS capabilities.

 


Hands-On


 Using OLS user authorizations to create powerful Command Rules in Oracle Database Vault
 OLS user authorizations in VPD policies: Determine access to application table columns based on user authorizations
 Six steps towards a successful multi level security implementation
 Integrating OLS with Identity Management
 Oracle Magazine: Now Securing Every Row

Related Technologies


 Database Firewall
 Audit Vault
 Data Masking (pdf)
 Secure Backup
 Configuration Management
 Information Rights Management
 Identity Management

Discussion Forums


 Security
 Audit Vault
 Database

Technical Information


 Datasheet
 Overview Whitepaper
 Oracle Label Security in Government and Defense Environments
 Technical White Paper
 Best practices
 Frequently Asked Questions
 Oracle Label Security with Oracle E-Business Suite: Best Practices

Security Options


 Oracle Database Vault
 Oracle Advanced Security
 Oracle Label Security

Security Features


 Data Encryption
 Virtual Private Database
 Database Auditing
 Backup Encryption
 Export file encryption
 Proxy Authentication
 Enterprise User Security
 Secure Application Roles
 Fine Grained Auditing

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s