Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cloud
    • Cloud
    • Cybersecurity
    • Database

    Oracles 10g Encryption Feature Is a Fine First Step

    Written by

    Charles Garry
    Published July 16, 2005
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      The most timely feature of Oracles newest release, 10g R2, has to be Transparent Data Encryption. When you consider all the recent data privacy breaches and their impact on companies (if not customers—yet, anyway) due to compliance with new data privacy legislation, this feature just seemed to leap out at me.

      TDE (Transparent Data Encryption) is a new feature now included in Oracles Advanced Security option ($10k per processor) and is only available to customers with Enterprise Edition licenses for the database.

      This feature is a big leap forward from Oracles previously offered Obfuscation Toolkit, which, though free, leaves much to be desired. Besides the manual coding effort, it also requires changes to application code to call the encryption API.

      There have always been options as to where encryption can or should occur. It can be done at the storage level (block or file), but that approach doesnt provide any granularity when it comes to what you want to encrypt.

      The application layer has been a popular place to do encryption because it does provide more flexibility as to when and what will be encrypted. It also tends to be a good method for encrypting data elements that are authorized and manipulated by the application.

      The problem, of course, is that encryption at this layer wouldnt have prevented some of the most recent losses of data that happened because unencrypted backup data was lost. Also, application layer encryption cannot be retrofitted if the application is a packaged application.

      Oracles new Transparent Data Encryption feature is aptly named, as all encryption is handled and managed by the database, making the encryption itself transparent to all applications that access the Oracle database.

      In addition, database-level encryption enables the user to choose which columns to encrypt. Remember that not all fields contain sensitive data, so be judicious in making that choice, as there is always a performance hit because of the overhead of the encryption and decryption process.

      Oracle has tried to minimize the performance reduction somewhat by also encrypting the corresponding index columns. This will enable equal predicates to continue to use an index if appropriate. That has always been an issue with some database encryption solutions in the past.

      In addition, any columns encrypted in the database will also be encrypted when that database is backed up, so banks and credit card companies can rest a bit easier.

      /zimages/3/28571.gifTo read about data theft at MCI and its effect on the encryption debate, click here.

      One point to take note of is that TDE key management does reside within the database itself, in a new database object known as the Wallet. Most security experts would prefer that key management reside outside of the database to create another layer of security. At least the TDE Wallet is password-protected and could still be protected from tampering, even by a database administrator

      So, on the surface, TDE looks like a strong solution to the most threats to data privacy. Im just concerned that organizations will stop there, thinking that is all they need.

      The reality is that encryption is only one aspect of an overall strategy for creating a truly secure database environment. After all, any “authorized” user can still access all data in the clear. This means administrators still must have a well-planned and administered authentication and authorization scheme.

      /zimages/3/28571.gifClick here to read Contributing Editor David Courseys commentary on the relationship between encryption and backup.

      However, even that is not enough. Sometimes internal users bent on foul play will connect as another authorized user, or hackers will appropriate an authorized ID. That means that in addition to encryption, authorizations and authentication, organizations also need some type of policy-based approach that can create alerts or deny access when users, even authorized users, attempt to do things that are outside their normal patterns of behavior.

      An example would be if a customer service rep ran a query asking for social security numbers, date of birth, address, account number and mothers maiden name for every customer in the credit card customer database.

      And since policies are not foolproof, a solid auditing process also needs to be in place to detect possible incursions. Oh, and strong network protection as well. Placing your database behind the firewall. Anyway, I think you get the picture. A secure database requires good planning, strong process control and some decent tools.

      This is an emerging area and many small vendors occupy niches in the database security market. Indeed, for those of you running other editions of Oracles products beside Enterprise Edition, third-party suppliers might be the better way to approach this problem, as the upgrade cost itself could be significantly higher.

      With 10g R2 and the soon-to-be-released SQL Server 2005 both featuring strong encryption, organizations can finally start to take steps toward providing a more secure database environment. Now we need to see organizations implement an overall strategy.

      Charles Garry is an independent industry analyst based in Simsbury, Conn. He is a former vice president with META Groups Technology Research Services.

      /zimages/3/28571.gifCheck out eWEEK.coms for the latest database news, reviews and analysis.

      Charles Garry
      Charles Garry

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×