Home » RDBMS Server » Security » Transparent Database Encryption (Oracle 12c)
Transparent Database Encryption [message #660110] |
Thu, 09 February 2017 03:14  |
 |
jvanh
Messages: 17 Registered: August 2013
|
Junior Member |
|
|
Hi,
I understand TDE is used to encrypt data stored on media. Is there however a possibility to encrypt columns, or whole tables for that matter, in such a manner that Oracle users viewing table data in SQL Developer or alike will only be able to view the scrambled data, whereas the application can operate transparently and use this data without need to encrypt/decrypt?
Thanks in advance for any feedback!
"Transparent Data Encryption (TDE) enables you to encrypt sensitive data, such as
Personally Identifiable Information (PII), that you store in tables and tablespaces.
After the data is encrypted, this data is transparently decrypted for authorized users
or applications when they access this data. TDE helps protect data stored on media
(also called data at rest) in the event that the storage media or data file is stolen.
Oracle Database uses authentication, authorization, and auditing mechanisms to
secure data in the database, but not in the operating system data files where data is
stored. To protect these data files, Oracle Database provides Transparent Data
Encryption (TDE). TDE encrypts sensitive data stored in data files. To prevent
unauthorized decryption, TDE stores the encryption keys in a security module
external to the database, called a keystore."
|
|
|
|
|
|
Re: Transparent Database Encryption [message #660115 is a reply to message #660114] |
Thu, 09 February 2017 03:46   |
 |
jvanh
Messages: 17 Registered: August 2013
|
Junior Member |
|
|
Ehr, how to put this ... so users, people, executing SQL against this DB, or viewing data using SQL Developer, should not be able to see some data. OK, that works nicely with redaction it seems.
However the app, when it selects and receives this data, it should not be redacted. It will have to take the (obviously un-redacted) data from this column and will need to update this data at end of processing.
So, the limitation I thought was on the application side, or is it not?
|
|
|
Re: Transparent Database Encryption [message #660119 is a reply to message #660115] |
Thu, 09 February 2017 04:04   |
John Watson
Messages: 8976 Registered: January 2010 Location: Global Village
|
Senior Member |
|
|
Quote:So, the limitation I thought was on the application side, or is it not?
No, it isn't. Your application sees clear text data. It will write clear text data: whatever your users choose to write. All Redaction does is adjust the values returned to the user process, it doesn't do anything with INSERT or UPDATE.
[Updated on: Thu, 09 February 2017 04:06] Report message to a moderator
|
|
|
|
|
|
Re: Transparent Database Encryption [message #660130 is a reply to message #660119] |
Thu, 09 February 2017 05:52   |
Roachcoach
Messages: 1576 Registered: May 2010 Location: UK
|
Senior Member |
|
|
John Watson wrote on Thu, 09 February 2017 10:04Quote:So, the limitation I thought was on the application side, or is it not?
No, it isn't. Your application sees clear text data. It will write clear text data: whatever your users choose to write. All Redaction does is adjust the values returned to the user process, it doesn't do anything with INSERT or UPDATE.
I believe the concern is apps which are lazy and write everything what the database shows them, redacted, thus wrecking the data underneath.
e.g. some HR guy updates a record with say a holiday and it also has redacted SSN. the app is poorly written and writes ALL the current values back in totality instead of just the holiday thus replacing the SSN with garbage.
I may be wrong, it's been a while since I worried about stuff like this but Oracle have a long track record these days of warning people against bad application design even when it is really not the database manuals place to do so.
Edit to add clarity
[Updated on: Thu, 09 February 2017 05:58] Report message to a moderator
|
|
|
|
|
|
|
Goto Forum:
Current Time: Sat May 03 09:43:08 CDT 2025
|