3.4 Oracle SQL Firewall and Oracle Database Vault
Oracle Database Vault requires special authorization before you can use Oracle SQL Firewall in a Database Vault environment.
3.4.1 Using SQL Firewall in an Oracle Database Vault Environment
Depending on the type of protection that you want to configure, you can use either or both Oracle Database Vault and SQL Firewall.
Database Vault enables you to use realms and command rules to block access to sensitive objects, the execution of critical commands, and SQL connections from untrusted factors such as the time of the day, IP address, host name, program name, or any number of identifiable attributes that are associated with the user. In a Database Vault environment, you can extend this protection by using SQL Firewall to capture an allow-list of SQL commands with an associated trusted database connection paths for a database account. Then you can log (and optionally block) the unseen SQL traffic. SQL Firewall enforcement can distinguish approved SQL statements and connections from the unauthorized SQL traffic, which adds to the protection layer that realms and command rules provide to prevent access to sensitive objects unless they have been explicitly authorized.
The following table shows a comparison of how you can enforce protections using Database Vault realms and command rules, and SQL Firewall.
Table 3-1 Comparison of Oracle Database Vault and SQL Firewall Protections
Use Case | Realms | Command Rules | SQL Firewall |
---|---|---|---|
Protect database schemas |
Yes, traditional or mandatory realms can limit access to your data.
|
Yes, DML or DDL statements against schema objects |
No |
Protect database roles |
Yes, traditional or mandatory realms can protect your roles. |
Yes, create a command rule with |
No |
Protect database objects |
Yes, traditional or mandatory realms can limit access to your data.
|
Yes, DML or DDL statements against schema objects
|
No |
Protect individual SQL statements |
No |
Yes, control statements against schema or individual schema objects. |
Yes, block all but explicitly allowed SQL statements. |
Allow-list and protect application SQL traffic |
No |
No |
Yes, block all but explicitly allowed SQL statements. |
Protect against risks of compromised accounts |
Yes, establish trusted path conditions based on any factors that can be checked programmatically. |
Yes, protect |
Yes, block sessions from untrusted client IP, program and OS user name |
Protect database users against SQL Injection risks |
No |
No |
Yes, create an allow-list SQL Firewall policy for each database user and enforce it. |
3.4.2 Authorization for Using SQL Firewall in an Oracle Database Vault Environment
In an Oracle Database Vault environment, users who want to configure SQL Firewall must have Oracle Database Vault-specific authorization.
When Database Vault is enabled, the management of SQL Firewall (that is, the invocation of the DBMS_SQL_FIREWALL
package) requires SQL Firewall administrators to have Database Vault-specific authorization in addition to the ADMINISTER SQL FIREWALL
system privilege. This requirement is to ensure that only trusted users will be able to manage SQL Firewall in a Database Vault environment.
You can authorize SQL Firewall administrators to allow or not allow captures on users who have the DV_OWNER
, DV_ADMIN
, or DV_ACCTMGR
roles in a Database Vault environment. When Database Vault operations control is enabled, common users will be blocked from using SQL Firewall (that is, the DBMS_SQL_FIREWALL
procedures for managing captures and allow-lists) on local users unless the common users are included in the exception list.
Related Topics