Oracle Database provides the industry’s most comprehensive auditing capability with Unified Auditing, a feature that captures the most accurate record of any database activity. Unified Auditing provides a single, unified audit trail for all audit records, simplifying the management and analysis of audited data. With it, you can monitor and detect suspicious database activities while better managing your compliance requirements.
Oracle Database 23ai introduces a new ability to audit access to certain columns in tables and views. It enables you create more narrowly targeted audit policies that reduce "noise" from unnecessary audit records.
Learn to provision more precise unified audit policies that are targeted to your corporate and compliance needs.
Discover why KuppingerCole recognized Oracle as a Leader in database security.
Documented records of user activity provide assurance to regulatory authorities that data is used only in intended ways.
Recognizing abnormal database activities early on means you can act quickly to correct the security threat and minimize damage.
A centralized and simplified audit trail provides a wealth of accurate information on data access that is useful for forensic investigations.
Privileged-user accounts are often soft targets for hackers attempting to gain access to critical systems and data. Continuous privileged-user activity monitoring allows security teams to easily identify anomalous behavior and quickly detect sensitive data leaks. To monitor privileged-user activity, first identify the privileged users in your system.
You can identify privileged database user accounts from different sources, such as the following:
Top-level statements by administrative users, such as SYSDBA and SYSKM, are mandatorily audited when the database is in the closed or mount state. To audit the administrative user activity once the database is open, set up the following audits:
Security-relevant events are actions within the database that warrant greater scrutiny and constant monitoring because they can potentially be abused. Monitoring such actions helps detect anomalous activities in the database. These actions include, but are not limited to, the following:
Most of the security-relevant events can be audited using predefined audit policies. Refer to the Predefined audit policies for more details.
Sensitive data access auditing is a powerful monitoring mechanism providing visibility into access and changes to sensitive data. It can serve as a primary deterrence to those who do not have a business reason to access or modify your data. Knowing your sensitive data landscape helps build focused audit policies to track its access.
Leverage one of the several sensitive data discovery tools, such as Data Safe, DBSAT, AVDF or Oracle Enterprise Manager to identify sensitive tables and columns, as shown on the left.
Once you understand your sensitive data landscape, you should determine who can access your sensitive data and audit their access.
Get started on Unified Auditing key use cases in Oracle LiveLabs.
Quickly assess database security posture and get recommendations to mitigate risks.
Talk to a team member about Oracle database security.