Overview
Assess security needs (risk reduction, regulatory compliance)
Assess the typical attack points for a database
Deploy the Maximum Security Architecture
Configure Fine Grained Access Control
Configure Fine Grained Access Control (FGAC)
Configure FGAC with Real Application Security
Configure FGAC withVirtual Private Database
Configure FGAC with Oracle Label Security
Manage Database Users
Administer OS Authentication
Administer Kerberos Authentication
Administer PKI Certificate Authentication
Administer Enterprise User Security
Administer Centrally Managed Users
Identify Inactive accounts
Configure and Manage Database Vault
Describe the Default Separation of Duties with Database Vault
Configure Database Vault Factors, Rules, and Rule Sets
Configure Database Vault Mandatory and non-Mandatory Realms
Configure Database Vault Command Rules
Configure Realms, Command Rules, and Application Context to enforce trusted path access
Perform Database Vault Operations Control
Manage and Secure passwords
Secure Passwords in scripts and applications
Change a user's password securely
Administer a secure external password store to secure passwords
Administer the Database Password File
Control the use of a password file
Configure and Use Auditing
Perform Privileged User Audit
Configure Standard Audit
Configure Fine Grained Auditing
Configure and use Unified Audit
Configure and Use Contexts
Understand and use USERENV variables
Understand and Use Client Identifiers
Extend Unified Auditing with Context information
Use context information with Secure Application Roles
Cofigure Network Security
Assess the need for Network access control (ACL)
Manage Network ACLs in relation to microservice deployments
Configure ACLs to access passwords in a wallet
Configure Network Service Profiles
Configure and use Listener Valid-Node Checking
Enhance Database Communication Security with SEC_ parameters
Manage Authorization
Administer System and Object Privileges
Assign Administrative Privileges
Configure Secure Application Roles
Configure Global Roles (EUS/CMU)
Perform Privilege Analysis
Configure and Implement Encryption
Encrypt data in motion
Configure Native Network Encryption
Configure TLS Encryption
Encrypt data at rest with Transparent Database Encryption
Configure Column level and Tablespace level Encryption
Encrypt the Data Dictionary
Migrate unencrypted to encrypted data
Manage Encryption Keys
Administer and use the SYSKM Administrative Privilege
Administer Encryption Wallets