Oracle Critical Patch Update October 2014 - Massive Patch
Just when you thought the Oracle Database world was getting safer, Oracle will be releasing fixes for 32 database security bugs on Tuesday, October 14th. This is in stark contrast to the previous twenty-five quarters where the high was 16...Oracle E-Business Suite is Vulnerable to Bash Shellshock (CVE-2014-6271/CVE-2014-7169)
All Oracle E-Business Suite environments are vulnerable to the “Shellshock” Bash vulnerabilities (CVE-2014-6271 and CVE-2014-7169) if the underlying operating system has not been patched for these vulnerabilities. Integrigy believes this to be...Oracle 12c Real Application Security and Standard Database Auditing - Warning Database Logins Not Logged
Oracle 12c introduces several major new security features. Data redaction is one new feature and Real Application Security (RAS) is another. Per Oracle, RAS is the next generation Virtual Private Database (VPD) and is installed with Oracle...UTL_FILE_DIR Security Weakness: Why and How To Use Oracle Directories
UTL_FILE_DIR is the database initialization parameter the Oracle Database uses to determine what operating system directories and files PL/SQL packages, functions, and procedures may read from or write to when using the standard UTL_FILE database...Oracle E-Business Suite Security - Signed JAR Files - What Should You Do – Part II
In our blog post on 16-May, we provided guidance on Java JAR signing for the E-Business Suite. We are continuing our research on E-Business Suite Java JAR signing and will be presenting it in a forthcoming educational webinar. Until then we would...Oracle E-Business Suite Security, Java 7 and Auto-Update
Maintaining a secure Oracle E-Business Suite implementation requires constant vigilance. For the desktop clients accessing Oracle E-Business Suite, Integrigy recommends running the latest version of Java 7 SE. Java 7 is fully supported by...Trusting Privileged Users, DBMS_SQLHASH, and Three Misconceptions about Encryption
Clients often contact Integrigy requesting assistance to protect their sensitive data. Frequently these are requests for assistance to locate and then encrypt sensitive data. While encryption offers protection for sensitive data, it by no...Splunk DB Connect Tail for Oracle E-Business Sign-on Audit
Integrigy has received a lot of great feedback about our Framework for logging and auditing the Oracle E-Business Suite. The Framework is posted here. The Framework is a direct result of our consulting experience and clients have found...Kerberos Authentication for Oracle - Benefits and Recommendations
Kerberos authentication support in the Oracle Database is now included with all editions of the Oracle Database. Previously, Kerberos authentication required an Oracle Advanced Security Option license. Since this licensing change, we...Oracle E-Business Suite Denial of Service Attacks and Locking the APPS Password
My wake-up call one day last week came from an acquaintance. Somebody at his company typed the APPS password in wrong too many times and locked the APPS database account. This caused the Oracle E-Business Suite to lock-out ALL users from accessing...How To Stop Insiders from Stealing Your Secrets – Recommendations on Rings of Security
For those of you who attended our webinar on 15-May-2014 on how to secure privileged users, Bruce Schneier’s blog post on 5/16/2014 will be of interest. The post was titled “How to Stop an Insider from Stealing All Your Secrets”. In the post he...Oracle E-Business Suite Security - Signed JAR Files - What Should You Do
Until recently the Oracle E-Business Suite allowed self-designed certificates to assure the validity of Java code run within end-users’ browsers. This meant that the Java JAR files downloaded from the middle tier server were tested by the end-user’s...PreInstall RPM Makes Oracle Database Installation Easy
Last week I had to build an Oracle 11gR2 database in the lab. Usually this process involves selecting one of several VirtualBox VM images for an appropriate Oracle Enterprise Linux (OEL) build and then several hours of effort. I selected a basic...OBIEE Authentication Using the Oracle E-Business Suite
There are two primary options for sharing authentication solutions with the Oracle E-Business Suite. The Oracle E-Business Suite and OBIEE both can take advantage of Oracle’s Single Sign-On (SSO) solutions. If SSO is used, both OBIEE and the E-...OBIEE Security: Questions IT Security and Audit Should Ask
This blog series so far has reviewed the basics of OBIEE security, the following questions should be included in any discussion of about the security of an OBIEE implementation.How are Security Configurations Migrated?Creation of non-production...
