- Oracle SQL Firewall User's Guide
- Configuring Oracle SQL Firewall
- Configuring and Managing Oracle SQL Firewall with the DBMS_SQL_FIREWALL Package
- Configuring Oracle SQL Firewall Using the DBMS_SQL_FIREWALL Package
2.1.1 Configuring Oracle SQL Firewall Using the DBMS_SQL_FIREWALL Package
A user who has the SQL_FIREWALL_ADMIN
role can use the DBMS_SQL_FIREWALL
PL/SQL package to configure Oracle SQL Firewall in the root or a pluggable database (PDB).
- Connect to the root or PDB as a user who has been granted the
SQL_FIREWALL_ADMIN
role. - Enable SQL Firewall.
EXEC DBMS_SQL_FIREWALL.ENABLE;
- For every database user to protect with SQL Firewall in the Oracle database, enable SQL Firewall to learn the normal SQL traffic of the database user by capturing all the authorized SQL statements over trusted database connection paths.The examples in this procedure assume the user is a PDB user named
APP
. For example:BEGIN DBMS_SQL_FIREWALL.CREATE_CAPTURE ( username => 'APP', top_level_only => TRUE, start_capture => TRUE ); END; /
In this specification:
username
is the name of the application user that SQL Firewall will monitor. You can only create one capture for each user. You cannot create SQL Firewall captures for theSYS
,SYSDG
,SYSBACKUP
,SYSRAC
,SYSKM
,DVSYS
,LBACSYS
, orAUDSYS
users.top_level_only
controls the level of SQL statements that are captured.TRUE
generates capture logs only for top-level SQL statements, that is, statements that the user directly runs.FALSE
generates capture logs for both top-level SQL statements and SQL commands issued from PL/SQL units. The default isFALSE
.
start_capture
controls when the capture will be effective.TRUE
enables SQL Firewall to start capturing the target user's activities right away. The default isTRUE
.FALSE
creates a capture for the user, but does not start the capture right away. When you want to start the capture later on, you must run theDBMS_SQL_FIREWALL.START_CAPTURE
procedure for the user. For example:EXEC DBMS_SQL_FIREWALL.START_CAPTURE ('APP');
As an application service account, run the normal application SQL workload from the trusted database connection paths when the capture is started for the application service account. In the event of a change in application in the SQL workload following application patching, you may want SQL Firewall to unlearn and learn, starting over. You can delete the current capture, and create a new one. Specifically, if you want to restart the capture process, then you must first stop this capture (if it is started), then either purge the capture logs and start this capture again, or, delete this capture and create (and start) the capture again.
- Review the capture logs and sessions logs to determine the adequacy of the capture.For example:
SELECT SQL_TEXT FROM DBA_SQL_FIREWALL_CAPTURE_LOGS WHERE USERNAME = 'APP';
- Stop the capture. For example:
EXEC DBMS_SQL_FIREWALL.STOP_CAPTURE ('APP');
- Generate the SQL Firewall policy with allow-lists for the user:A SQL Firewall policy with allow-lists sets the baseline for allowed SQL statements and allowed contexts. Allowed SQL statements constitute the approved SQL statements. Allowed contexts represent trusted database connection paths. SQL Firewall creates the allow-list based on data collected from existing capture logs for the user.
For example:
EXEC DBMS_SQL_FIREWALL.GENERATE_ALLOW_LIST ('APP');
- To find the permitted and allowed SQL statements that the user can run, query the
DBA_SQL_FIREWALL_ALLOWED_
* data dictionary views.For example:SELECT SQL_TEXT FROM DBA_SQL_FIREWALL_ALLOWED_SQL WHERE USERNAME = 'APP';
To find the trusted database connection paths for the user, perform the following queries:
SELECT OS_PROGRAM FROM DBA_SQL_FIREWALL_ALLOWED_OS_PROG WHERE USERNAME = 'APP';
SELECT OS_USER FROM DBA_SQL_FIREWALL_ALLOWED_OS_USER WHERE USERNAME = 'APP';
SELECT IP_ADDRESS FROM DBA_SQL_FIREWALL_ALLOWED_ALLOWED_IP_ADDR WHERE USERNAME = 'APP';
- Optionally, add or modify entries in the allowed contexts by running the
DBMS_SQL_FIREWALL.ADD_ALLOWED_CONTEXT
andDBMS_SQL_FIREWALL.DELETE_ALLOWED_CONTEXT
procedures.You can only add a context after you have generated the allow-list. A context can specify the client IP address, names of operating system users, or the operating system program that can be used for database connections. You can add as many context values as you need. For example, if the user's allowed context list does not contain the IP address 192.0.2.1 but you want to allow the user to connect from this IP after the enablement of the allow-list:BEGIN DBMS_SQL_FIREWALL.ADD_ALLOWED_CONTEXT ( username => 'APP', context_type => DBMS_SQL_FIREWALL.IP_ADDRESS, value => '192.0.2.1' ); END; /
To specify all possibilities for a specific
context_type
, enter the%
wildcard.The following three types of
context_type
settings are valid:DBMS_SQL_FIREWALL.IP_ADDRESS
accepts IPv4 and IPv6 addresses and subnets in the CIDR notation. It accepts the valueLocal
(case sensitive) for local connections when the IP address is not available.DBMS_SQL_FIREWALL.OS_USERNAME
accepts any valid operating system user name, such asoracle
.DBMS_SQL_FIREWALL.OS_PROGRAM
accepts any valid operating system program name that the user uses to run SQL statements, such assqlplus
orSQL Developer
.
You can query the following data dictionary views to check the contexts:
DBA_SQL_FIREWALL_ALLOWED_IP_ADDR
DBA_SQL_FIREWALL_ALLOWED_OS_USER
DBA_SQL_FIREWALL_ALLOWED_OS_PROG
- Enable the generated SQL Firewall policy to protect the database user. The SQL Firewall enforces checks on the allow-lists when the user connects to the database and issues SQL statements.This enablement becomes effective immediately, even in the existing sessions of the target user.
For example:
BEGIN DBMS_SQL_FIREWALL.ENABLE_ALLOW_LIST ( username => 'APP', enforce => DBMS_SQL_FIREWALL.ENFORCE_SQL, block => TRUE ); END; /
In this specification:
username
can be a specific user whose allow-list has been generated, or it can be all users whose allow-list are not currently enabled. To specify all users, useNULL
as the value.enforce
specifies one of the following enforcement types:DBMS_SQL_FIREWALL.ENFORCE_CONTEXT
enforces the allowed contexts that have been configured.DBMS_SQL_FIREWALL.ENFORCE_SQL
enforces the allowed SQL that has been configured.DBMS_SQL_FIREWALL.ENFORCE_ALL
enforces both allowed contexts and allowed SQL. This setting is the default.
block
specifies the following:TRUE
blocks the user's database connection or the user's SQL execution whenever the user violates the allow-list definition.FALSE
allows unmatched user database connections or SQL commands to proceed. This setting is the default.
SQL Firewall always generates a violation log for any unmatched user database connection or SQL statement regardless of the enforcement option.
At this stage, if the user attempts to perform a SQL query that violates the allow-list and you have specified SQL Firewall to block this SQL, then an
ORA-47605: SQL Firewall violation
error appears.
- Monitor the violation log for abnormal SQL connection attempts or SQL queries that are reported if they are not in allow-list.For example:
SELECT SQL_TEXT, FIREWALL_ACTION, IP_ADDRESS, CAUSE, OCCURRED_AT FROM DBA_SQL_FIREWALL_VIOLATIONS WHERE USERNAME = 'APP';
Output similar to the following appears:
SQL_TEXT FIREWALL_ACTION IP_ADDRESS CAUSE OCCURRED_AT –-------------------------------------------------------- –--------------- –---------- –---------------- –---------------------------------- SELECT SALARY FROM HR.EMPLOYEES WHERE SALARY >:"SYS_B_0" BLOCKED 192.0.2.146 Context violation 12-MAY-23 11.12.39.626053 PM +00:00