Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Oracle Database

Welcome to the Oracle Database topic!

In this topic you may collaborate with your peers by participating in discussions, adding links and documents, and starting or contributing to wikis.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
341 Members
0 Online
0 Visits

 Recent Discussions

Oracle Is Large, Liquid and Defensive. Posted by Ian Cooke.
SANS Webcast: Simplifying Data Encryption and ... Posted by Ian Cooke.
How to hide login data of sql-scripts on Windows. Posted by Ian Cooke.

Community Leader

Ian Cooke

Ian Cooke

Title: IT Audit Manager

Points: 53998

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 264 total

Must be a Topic member to contribute
View All »
SANS Webcast: Simplifying Data Encryption and Redaction Without Touching the Code https://blogs.oracle.com/securityinsideout/entry/sans_webcast_simplifying_data_encryption
Ian Cooke | 9/11/2014 8:03:16 AM | COMMENTS(0)
Nice tip this..... How to hide login data of sql-scripts on Windows http://technology.amis.nl/2014/09/03/how-to-hide-login-data-of-sql-scripts-on-windows
Ian Cooke | 9/10/2014 3:31:17 AM | COMMENTS(0)
Oracle 12c Real Application Security and Standard Database Auditing - Warning Database Logins Not Logged http://www.integrigy.com/oracle-security-blog/oracle-12c-real-application-security-and-standard-database-auditing-warning
Ian Cooke | 9/9/2014 7:51:16 AM | COMMENTS(0)
Breach of Homeland Security Background Checks Raises Red Flags http://www.darkreading.com/breach-of-homeland-security-background-checks-raises-red-flags/d/d-id/1306624?
Ian Cooke | 9/8/2014 5:54:33 AM | COMMENTS(1)
Guys, Just wondering if anyone has worked with Oracle database 12c yet.  If so, anything to share with the group? I have uploaded an Oracle While Paper on same to the documents section. Best Regards, Ian
Ian Cooke | 9/5/2014 4:29:15 AM | COMMENTS(0)
Oracle Audit Vault and Database Firewall Wins Reader's Choice Award for Best Database Security Solution https://blogs.oracle.com/securityinsideout/entry/oracle_audit_vault_and_database1
Ian Cooke | 9/4/2014 3:00:14 AM | COMMENTS(0)

Documents & Publications: 20 total

Must be a Topic member to contribute
View All »
Security and Compliance with Oracle Database 12c, An Oracle White Paper, April 2014
Posted by Ian Cooke 11 days ago
Sources of Assurance for an Oracle Database (Update 2) August 2014
Posted by Ian Cooke 23 days ago
Oracle Database Security Checklist An Oracle White Paper June 2008
Posted by Ian Cooke 23 days ago
Building Secure Apex Application
Posted by nooruddin 27 days ago
Exploiting PL/SQL Injection on Oracle 12c by David Litchfield [david.litchfield@datacom.com.au]
Posted by Ian Cooke 61 days ago
Oracle Data Redaction is Broken by David Litchfield [david.litchfield@datacom.com.au]
Posted by Ian Cooke 61 days ago

Events & Online Learning: 3 total

Journal Articles: 4 total

Volume 2, 2014
by Ian Cooke, CISA, CGEIT, COBIT-F, CFE, CPTS, DipFM, ITIL-F, Six Sigma Green Belt
CAATs are a valuable tool for auditing Oracle databases.
Volume 1, 2011
by David Knox, Scott Gaetjen, Hamza Jahangir, Tyler Muth, Patrick Sack, Richard Wark and Bryan Wise | Reviewed by Horst Karin, Ph.D., CISA, CISSP, ITIL
The strength of this book is its comprehensive knowledge, which is presented in an easy-to-understand style with useful supporting background information.
Volume 3, 2010
by ISACA | Reviewed by K. K. Mookhey, CISA, CISM, CISSP
A book review of the third edition of this popular ISACA title.
Volume 4, 2007
by Ying Shi, CISA, OCP

Wikis: 2 total

Blog Posts: 11 total

Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...
Posted By : SA | 0 comments
During an audit you may find that shell scripts are used to connect to your Oracle database (these are often scheduled jobs).  In many instances this represents a security risk as the Oracle database password is hardcoded into the script.  This means th...
Posted By : Ian Cooke | 0 comments
The main idea I am trying to advocate with these posts is a simple one.  Compare a database you are auditing against a database that you know already meets the standards required by the organisation you are auditing. This is achieved by creating “CSV...
Posted By : Ian Cooke | 1 comments
We have covered most of the core items that should be consider when performing an Oracle database audit in previous posts, however there a number of other items that I would typically look into. Database Links A database link is an object in one databa...
Posted By : Ian Cooke | 0 comments
The company you are auditing should have a policy on what is being audited within your Oracle database.  The level of auditing will almost certainly be affected by the sensitivity of the data. Good examples and bench marks for auditing may be seen in th...
Posted By : Ian Cooke | 0 comments
Typically application access to an Oracle database is via one of two methods.  Either all users access the same database using a single (proxy) user which is defined in an initialisation (.INI) file, registry etc. Or the users access the database indiv...
Posted By : Ian Cooke | 1 comments