13 Using Transparent Sensitive Data Protection
- About Transparent Sensitive Data Protection
Transparent sensitive data protection is a way to find and classify table columns that hold sensitive information. - General Steps for Using Transparent Sensitive Data Protection
To use TSDP with Oracle Data Redaction, you must follow a set of general steps. - Use Cases for Transparent Sensitive Data Protection Policies
Transparent sensitive data protection has several benefits. - Privileges Required for Using Transparent Sensitive Data Protection
To use transparent sensitive data protection, you must have theEXECUTE
privilege for several PL/SQL packages. - How a Multitenant Environment Affects Transparent Sensitive Data Protection
You can apply Transparent Sensitive Data Protection policies to the current PDB or current application PDB only. - Creating Transparent Sensitive Data Protection Policies
You must create a sensitive type, find the sensitive columns to be protected, and then import these columns from ADM into your database. - Altering Transparent Sensitive Data Protection Policies
TheDBMS_TSDP_PROTECT.ALTER_POLICY
procedure can alter a TSDP policy. - Disabling Transparent Sensitive Data Protection Policies
TheDBMS_TSDP_PROTECT.DISABLE_PROTECTION_COLUMN
procedure disables one or all TSDP policies. - Dropping Transparent Sensitive Data Protection Policies
You can drop an entire TSDP policy or a condition-enable-options combination from the policy. - Using the Predefined REDACT_AUDIT Policy to Mask Bind Values
The predefinedREDACT_AUDIT
policy masks bind values, which can appear in trace files when an event is set. - Transparent Sensitive Data Protection Policies with Data Redaction
Oracle Data Redaction features work with transparent sensitive data protection policies. - Using Transparent Sensitive Data Protection Policies with Oracle VPD Policies
You can combine protections from TSDP and Oracle Virtual Private Database into one policy. - Using Transparent Sensitive Data Protection Policies with Unified Auditing
The transparent sensitive data protection and unified auditing procedures can combine the protections of these two features. - Using Transparent Sensitive Data Protection Policies with Fine-Grained Auditing
The transparent sensitive data protection and fine-grained auditing procedures can combine the protections of these two features. - Using Transparent Sensitive Data Protection Policies with TDE Column Encryption
The TSDP procedures and Transparent Data Encryption column encryption statements can combine the protections of these two features. - Transparent Sensitive Data Protection Data Dictionary Views
Oracle Database provides data dictionary views that list information about transparent sensitive data protection policies.
Parent topic: Controlling Access to Data
13.1 About Transparent Sensitive Data Protection
Transparent sensitive data protection is a way to find and classify table columns that hold sensitive information.
This feature enables you to quickly find the table columns in a database that hold sensitive data, classify this data, and then create a policy that protects this data as a whole for a given class. Examples of this type of sensitive data are credit card numbers or Social Security numbers.
The TSDP policy then protects the sensitive data in these table columns by using either Oracle Data Redaction or Oracle Virtual Private Database settings. The TSDP policy applies at the column level of the table that you want to protect, targeting a specific column data type, such as all NUMBER
data types of columns that contain credit card information. You can create a uniform TSDP policy for all of the data that you classify, and then modify this policy as necessary, as compliance regulations change. Optionally, you can export the TSDP policies for use in other databases.
The benefits of TSDP policies are enormous: You easily can create and apply TSDP policies throughout a large organization with numerous databases. This helps auditors greatly by enabling them to estimate the protection for the data that the TSDP policies target. TSDP is particularly useful for government environments, in which you may have a lot of data with similar security restrictions and you must apply a policy to all of this data consistently. The policy could be to redact it, encrypt it, control access to it, audit access to it, and mask it in the audit trail. Without TSDP, you would have to configure every redaction policy, column-level encryption configuration, and Virtual Private Database policy column by column.
Parent topic: Using Transparent Sensitive Data Protection
13.2 General Steps for Using Transparent Sensitive Data Protection
To use TSDP with Oracle Data Redaction, you must follow a set of general steps.
Parent topic: Using Transparent Sensitive Data Protection
13.3 Use Cases for Transparent Sensitive Data Protection Policies
Transparent sensitive data protection has several benefits.
These benefits are as follows:
-
You configure the sensitive data protection once, and then deploy this protection as necessary. You can configure transparent sensitive data protection policies to designate how a class of data (for example, credit card columns) must be protected without actually having to specify the target data. In other words, when you create the transparent sensitive data protection policy, you do not need to include references to the actual target columns that you want to protect. The transparent sensitive data protection policy finds these target columns based on a list of sensitive columns in the database and the policy's associations with the specified sensitive types. This can be useful when you add more sensitive data to your databases after you have created the transparent sensitive data protection policies. After you create the policy, you can enable protection for the sensitive data in a single step (for example, enable protection based on the entire source database). The sensitive type of the new data and the sensitive type and policy associations determine how the sensitive data is protected. In this way, as new sensitive data is added, you do not need to configure its protection, as long as it meets the current transparent sensitive data protection policy's requirements.
-
You can manage protection of multiple sensitive columns. You can enable or disable protection for multiple sensitive columns based on a suitable attribute (such as the source database of the identification, the sensitive type itself, or a specific schema, table, or column). This granularity provides a high level of control over data security. The design of this feature enables you to manage data security based on specific compliance needs for large data sets that fall under the purview of these compliance regulations. You can configure data security based on a specific category rather than for each individual column. For example, you can configure protection for credit card numbers or Social Security numbers, but you do not need to configure protection for each and every column in the database that contains this data.
-
You can protect the sensitive columns identified using the Oracle Enterprise Manager Cloud Control Application Data Modeling (ADM) feature. You can use the Cloud Control ADM feature to create sensitive types and discover a list of sensitive columns. Then you can import this list of sensitive columns and their corresponding sensitive types into your database. From there, you can create and manage transparent sensitive data protection policies using this information.
Parent topic: Using Transparent Sensitive Data Protection
13.4 Privileges Required for Using Transparent Sensitive Data Protection
To use transparent sensitive data protection, you must have the EXECUTE
privilege for several PL/SQL packages.
These privileges are as follows:
-
DBMS_TSDP_MANAGE
, which enables you to import and manage sensitive columns and sensitive types into your database. The procedures in this package execute with invoker's rights. Typically, an application database administrator will be granted privileges for this package. -
DBMS_TSDP_PROTECT
, which you use to create the TSDP policy. The procedures in this package execute with invoker's rights. Typically, a security database administrator will be granted privileges for this package. -
DBMS_REDACT
, if you plan to create Data Redaction policies. Typically, a security database administrator will be granted privileges for this package. -
DBMS_RLS
, if you plan to incorporate Oracle Virtual Private Database functionality into your TSDP policies. Typically, a security database administrator will be granted privileges for this package.
For better separation of duty, these packages are designed so that either an application database administrator has control over one area of the TSDP policy creation (as in the case of the DBMS_TSDP_MANAGE
package) or a security database administrator (for the DBMS_TSDP_PROTECT
, DBMS_REDACT
, and DBMS_RLS
packages).
Parent topic: Using Transparent Sensitive Data Protection
13.5 How a Multitenant Environment Affects Transparent Sensitive Data Protection
You can apply Transparent Sensitive Data Protection policies to the current PDB or current application PDB only.
If you are using Enterprise Manager Cloud Control Application Data Model, then you can find sensitive columns that belong to both local and common application objects (that is, common objects that are visible and accessible in the current PDB) inside the PDB. This enables you to use a TSDP policy to protect both local objects to the PDB and common objects that are accessible from the PDB.
In an application root:
-
For application containers in general:
-
When you create scripts for application install, upgrade, patch, or uninstall operations, you can include SQL statements within the
ALTER PLUGGABLE DATABASE app_name BEGIN INSTALL
andALTER PLUGGABLE DATABASE app_name END INSTALL
blocks to perform various operations. If you include TSDP statements within these blocks, then the TSDP statements will fail. You can, however, include TSDP statements outside these blocks in the script.
-
-
In the application root:
-
You can perform TSDP operations in both application common objects and application root local objects.
-
A TSDP policy that is defined in the application root container behaves as if it is a local policy to the application root. That is, the policy is effective only in the application root container.
-
In an application PDB:
-
The security policies that protect an application PDB apply to TSDP operations that are performed on local application objects.
-
The security policies that protect an application PDB apply to TSDP operations that are performed on application common objects that are accessed from the PDB. However, access to the application common object outside the application PDB is not governed by the security policy that protects the application PDB.
You can find a listing of TSDP policies and the security features that are associated with them by querying the DBA_TSDP_POLICY_FEATURE data dictionary views. To find all PDBs, query the DBA_PDBS view.
Parent topic: Using Transparent Sensitive Data Protection
13.6 Creating Transparent Sensitive Data Protection Policies
You must create a sensitive type, find the sensitive columns to be protected, and then import these columns from ADM into your database.
- Step 1: Create a Sensitive Type
The sensitive type is a class of data that you designate as sensitive. - Step 2: Identify the Sensitive Columns to Protect
After you define a sensitive column, you are ready to identify the columns to protect. - Step 3: Import the Sensitive Columns List from ADM into Your Database
Next, you are ready to import the sensitive columns list from ADM into your database. - Step 4: Create the Transparent Sensitive Data Protection Policy
After you have created the list of sensitive columns and imported this list into your database, you can create the transparent sensitive data protection policy. - Step 5: Associate the Policy with a Sensitive Type
TheDBMS_TSDP_PROTECT.ASSOCIATE_POLICY
procedure associates a TSDP policy with a sensitive type. - Step 6: Enable the Transparent Sensitive Data Protection Policy
You can enable the TSDP policy for the current database in a protected source, a specific table column, or a specific column type. - Step 7: Optionally, Export the Policy to Other Databases
You can export or import the policy to or from another database.
Parent topic: Using Transparent Sensitive Data Protection
13.6.1 Step 1: Create a Sensitive Type
The sensitive type is a class of data that you designate as sensitive.
credit_card_type
sensitive type for all credit card numbers.
Related Topics
Parent topic: Creating Transparent Sensitive Data Protection Policies
13.6.2 Step 2: Identify the Sensitive Columns to Protect
After you define a sensitive column, you are ready to identify the columns to protect.
To identify the columns to protect, based on the sensitive type that you defined, you either can use an Enterprise Manager Cloud Control Application Data Model to identify these columns, or you can use the DBMS_TSDP_MANAGE.ADD_SENSITIVE_COLUMN
procedure.
To remove the column from the list of sensitive columns for the database, you can use the DBMS_TSDP_MANAGE.DROP_SENSITIVE_COLUMN
procedure.
Parent topic: Creating Transparent Sensitive Data Protection Policies
13.6.3 Step 3: Import the Sensitive Columns List from ADM into Your Database
Next, you are ready to import the sensitive columns list from ADM into your database.
-
If you had used an Application Data Model to create the list of sensitive columns, then import this list into your database by running the
DBMS_TSDP_MANAGE.IMPORT_DISCOVERY_RESULT
procedure.If you had used the
DBMS_TSDP_MANAGE.ADD_SENSITIVE_COLUMN
procedure to identify these columns, then you can bypass this step.
For example, to import the Cloud Control Application Data Model into the current database:
BEGIN DBMS_TSDP_MANAGE.IMPORT_DISCOVERY_RESULT ( discovery_result => xml_adm_result, discovery_source => 'ADM_Demo'); END; /
In this example:
-
discovery_result
refers to the list of sensitive columns and their associated sensitive types. This list is in XML format. -
discover_source
refers to the name of the Application Data Model that contains the list of sensitive columns referred by thediscovery_result
setting. You can find a list of the Application Data Models from the Data Discovery and Modeling page in Enterprise Manager Cloud Control. (To access this page, from the Enterprise menu, select Quality Management, and then Data Discovery and Modeling. You can find a list of the sensitive columns and their associated types in the Sensitive Columns tab.)
Parent topic: Creating Transparent Sensitive Data Protection Policies
13.6.4 Step 4: Create the Transparent Sensitive Data Protection Policy
After you have created the list of sensitive columns and imported this list into your database, you can create the transparent sensitive data protection policy.
- About Creating the Transparent Sensitive Data Protection Policy
TheDBMS_TSDP_PROTECT.ADD_POLICY
procedure creates the transparent sensitive data protection policy. - Creating the Transparent Sensitive Data Protection Policy
You can create a transparent sensitive data protection policy that uses a partial number data type-based Data Redaction policy. - Setting the Oracle Data Redaction or Virtual Private Database Feature Options
The TSDP feature options describe the Oracle Data Redaction or Virtual Private Database settings to use for the transparent sensitive data protection policy. - Setting Conditions for the Transparent Sensitive Data Protection Policy
Optionally, you can specify conditions for the transparent sensitive data protection policy. - Specifying the DBMS_TSDP_PROTECT.ADD_POLICY Procedure
TheDBMS_TSDP_PROTECT.ADD_POLICY
procedure names the TSDP policy and executes theFEATURE_OPTIONS
andPOLICY_CONDITIONS
settings.
Parent topic: Creating Transparent Sensitive Data Protection Policies
13.6.4.1 About Creating the Transparent Sensitive Data Protection Policy
The DBMS_TSDP_PROTECT.ADD_POLICY
procedure creates the transparent sensitive data protection policy.
After you have identified the sensitive columns, and if you had used an Application Data Model to create the list of sensitive columns, and imported this list into your database, you are ready to create the transparent sensitive data protection policy. To create the transparent sensitive data protection policy, you must configure it for the Virtual Private Database or Oracle Data Redaction settings that you want to use, and then apply these settings to a transparent sensitive data protection policy defined by DBMS_TSDP_PROTECT.ADD_POLICY
.
You can create the policy by defining an anonymous block that has the following components:
-
If you are using Oracle Data Redaction for your policy, a specification of the type of Data Redaction that you want to use, such as partial Data Redaction
-
If you are using Oracle Virtual Private Database for your policy, a specification of the VPD settings that you want to use
-
Conditions to test when the policy is enabled. For example, the data type of the column which should be satisfied before the policy can be enabled.
-
A named transparent sensitive data protection policy to tie these components together, by using the
DBMS_TSDP_PROTECT.ADD_POLICY
procedure
After you create the sensitive type, it resides in the SYS
schema.
13.6.4.2 Creating the Transparent Sensitive Data Protection Policy
You can create a transparent sensitive data protection policy that uses a partial number data type-based Data Redaction policy.
Example 13-1 shows how to create this type of policy.
-
To create the policy, use the
DBMS_TSDP_PROTECT.ADD_POLICY
procedure, as shown in Example 13-1.
Example 13-1 Creating a Transparent Sensitive Data Protection Policy
DECLARE
redact_feature_options DBMS_TSDP_PROTECT.FEATURE_OPTIONS;
policy_conditions DBMS_TSDP_PROTECT.POLICY_CONDITIONS;
BEGIN
redact_feature_options ('expression') :=
'SYS_CONTEXT(''USERENV'',''SESSION_USER'') =''APPUSER''';
redact_feature_options ('function_type') := 'DBMS_REDACT.PARTIAL';
redact_feature_options ('function_parameters') := '0,1,6';
policy_conditions(DBMS_TSDP_PROTECT.DATATYPE) := 'NUMBER';
policy_conditions(DBMS_TSDP_PROTECT.LENGTH) := '16';
DBMS_TSDP_PROTECT.ADD_POLICY ('redact_partial_cc',
DBMS_TSDP_PROTECT.REDACT,redact_feature_options,
policy_conditions);
END;
/
In this example:
-
redact_feature_options DBMS_TSDP_PROTECT.FEATURE_OPTIONS
creates the variableredact_feature_options
, which uses theFEATURE_OPTIONS
data type. See Setting the Oracle Data Redaction or Virtual Private Database Feature Options for more information. -
policy_conditions DBMS_TSDP_PROTECT.POLICY_CONDITIONS
creates the variablepolicy_conditions
, which uses thePOLICY_CONDITIONS
data type. See Setting Conditions for the Transparent Sensitive Data Protection Policy for more information. -
redact_feature_options
lines (3) write the Data Redaction policy settings to theredact_feature_option
variable. This example applies the Data Redaction policy to the userAPPUSER
and defines the policy as a partial data redaction for number data types. See Oracle Database Advanced Security Guide for information about how thefunction_parameters
parameter works for this case. -
policy_conditions
lines (2) write the TSDP policy conditions to thepolicy_conditions
variable (that is, the data type and length) for the protectedNUMBER
data type column. -
DBMS_TSDP_PROTECT.ADD_POLICY
executes theDBMS_TSDP_PROTECT.ADD_POLICY
procedure, which creates theredact_partial_cc
TSDP policy. See Specifying the DBMS_TSDP_PROTECT.ADD_POLICY Procedure for more information.
If you want to see an example of a similar policy for VPD, see Step 4: Create and Enable a Transparent Sensitive Data Protection Policy.
13.6.4.3 Setting the Oracle Data Redaction or Virtual Private Database Feature Options
The TSDP feature options describe the Oracle Data Redaction or Virtual Private Database settings to use for the transparent sensitive data protection policy.
13.6.4.4 Setting Conditions for the Transparent Sensitive Data Protection Policy
Optionally, you can specify conditions for the transparent sensitive data protection policy.
- Specify the transparent sensitive data protection policy conditions in the following ways:
- To define the conditions, use the name
policy_conditions
for the variable and for the type, use typeDBMS_TSDP_PROTECT.POLICY_CONDITIONS
, which is an associative array of the data typeVARCHAR2(TSDP_PARAM_MAX)
. Ensure that no two conditions are satisfied by a single target sensitive column. The target column's properties should satisfy all the condition properties for the correspondingDBMS_TSDP_PROTECT.FEATURE_OPTIONS
settings to be applied on the column.For example:
policy_conditions(DBMS_TSDP_PROTECT.DATATYPE) := 'NUMBER'; policy_conditions(DBMS_TSDP_PROTECT.LENGTH) := '16';
- Optionally, to specify one or more of the following keys for the
POLICY_CONDITIONS
settings:-
DBMS_TSDP_PROTECT.DATATYPE
enables you to specify a data type. -
DBMS_TSDP_PROTECT.LENGTH
enables you to specify a data type length for theDBMS_TSDP_PROTECT.DATATYPE
key. -
DBMS_TSDP_PROTECT.PARENT_SCHEMA
enables you to restrict the policy to a specific schema. If you omit this setting, then the policy applies to all schemas in the database. -
DBMS_TSDP_PROTECT.PARENT_TABLE
enables you to restrict the policy to a table specified by theDBMS_TSDP_PROTECT.PARENT_SCHEMA
key. If you omit this setting, then the policy applies to all tables within the specified schema.
-
- If you choose to omit conditions, you still must include the following line in the
DECLARE
variables. (In this case, the default value forpolicy_conditions
is an empty associative array.)policy_conditions SYS.DBMS_TSDP_PROTECT.POLICY_CONDITIONS;
- To define the conditions, use the name
13.6.4.5 Specifying the DBMS_TSDP_PROTECT.ADD_POLICY Procedure
The DBMS_TSDP_PROTECT.ADD_POLICY
procedure names the TSDP policy and executes the FEATURE_OPTIONS
and POLICY_CONDITIONS
settings.
redact_feature_options
and the policy_conditions
settings work together: When the policy is enabled (using any of the DBMS_TSDP_PROTECT.ENABLE_PROTECTION
* procedures) on the target object, then the redact_feature_options
settings apply only if the corresponding policy_condition
settings are satisfied.
13.6.5 Step 5: Associate the Policy with a Sensitive Type
The DBMS_TSDP_PROTECT.ASSOCIATE_POLICY
procedure associates a TSDP policy with a sensitive type.
Parent topic: Creating Transparent Sensitive Data Protection Policies
13.6.6 Step 6: Enable the Transparent Sensitive Data Protection Policy
You can enable the TSDP policy for the current database in a protected source, a specific table column, or a specific column type.
- Enabling Protection for the Current Database in a Protected Source
You can enable transparent sensitive data protection for the current database in a protected source. - Enabling Protection for a Specific Table Column
You can enable transparent sensitive data protection for a specific column in a table. - Enabling Protection for a Specific Column Type
You can enable transparent sensitive data protection for a specific column type, such as all columns that use theVARCHAR2
data type.
Parent topic: Creating Transparent Sensitive Data Protection Policies
13.6.6.1 Enabling Protection for the Current Database in a Protected Source
You can enable transparent sensitive data protection for the current database in a protected source.
If you must disable the protection, then you can run the DBMS_TSDP_PROTECT.DISABLE_PROTECTION_SOURCE
procedure.
-
Run the
DBMS_TSDP_PROTECT.ENABLE_PROTECTION_SOURCE
procedure to enable this type of protection.
For example, to enable transparent sensitive data protection policies for the orders_db
database.
BEGIN DBMS_TSDP_PROTECT.ENABLE_PROTECTION_SOURCE( discovery_source => 'orders_db'); END; /
13.6.6.2 Enabling Protection for a Specific Table Column
You can enable transparent sensitive data protection for a specific column in a table.
Remember that you can enable only one policy per table. If you must disable the protection, then you can run the DBMS_TSDP_PROTECT.DISABLE_PROTECTION_COLUMN
procedure.
-
Run the
DBMS_TSDP_PROTECT.ENABLE_PROTECTION_COLUMN
procedure to enable this type of protection.
For example, to enable the transparent sensitive data protection policy redact_partial_cc
for a specific table column:
BEGIN DBMS_TSDP_PROTECT.ENABLE_PROTECTION_COLUMN( schema_name => 'OE', table_name => 'CUST_CC', column_name => 'CREDIT_CARD', policy => 'redact_partial_cc'); END; /
If an ORA-45622: warnings generated during policy enforcement
error appears, then check the configuration of the policy. In this example, the redact_partial_cc
policy is enabled on a column if this column is of the NUMBER
data type and has a length of 16
. Even though the OE.CUST_CC.CREDIT_CARD
column is associated with the redact_partial_cc
policy, the policy is not enabled if this column fails to satisfy the conditions (data type and length).
13.6.6.3 Enabling Protection for a Specific Column Type
You can enable transparent sensitive data protection for a specific column type, such as all columns that use the VARCHAR2
data type.
If you must disable the protection, then you can run the DBMS_TSDP_PROTECT.DISABLE_PROTECTION_TYPE
procedure.
-
Run the
DBMS_TSDP_PROTECT.ENABLE_PROTECTION_TYPE
procedure to enable this type of protection.
For example, to enable transparent sensitive data protection for all columns that use the credit_card_num_type
sensitive type:
BEGIN DBMS_TSDP_PROTECT.ENABLE_PROTECTION_TYPE( sensitive_type => 'credit_card_num_type'); END; /
13.7 Altering Transparent Sensitive Data Protection Policies
The DBMS_TSDP_PROTECT.ALTER_POLICY
procedure can alter a TSDP policy.
DBA_TSDP_POLICY_FEATURE
data dictionary view.
Parent topic: Using Transparent Sensitive Data Protection
13.8 Disabling Transparent Sensitive Data Protection Policies
The DBMS_TSDP_PROTECT.DISABLE_PROTECTION_COLUMN
procedure disables one or all TSDP policies.
Parent topic: Using Transparent Sensitive Data Protection
13.9 Dropping Transparent Sensitive Data Protection Policies
You can drop an entire TSDP policy or a condition-enable-options combination from the policy.
If the policy only has one condition-enable-options combination, then Oracle Database drops the entire policy. You do not need to disable a policy before dropping it, but you do need to drop its associated sensitive column first, then its sensitive type.
Parent topic: Using Transparent Sensitive Data Protection
13.10 Using the Predefined REDACT_AUDIT Policy to Mask Bind Values
The predefined REDACT_AUDIT
policy masks bind values, which can appear in trace files when an event is set.
- About the REDACT_AUDIT Policy
The predefinedREDACT_AUDIT
transparent sensitive data protection policy masks bind values. - Variables Associated with Sensitive Columns
Bind variables affect the use of sensitive columns with conditions,SELECT
items, andINSERT
orUPDATE
operations. - How Bind Variables on Sensitive Columns Behave with Views
A bind variable that appears in a query on a view is considered sensitive if the view column references a sensitive column. - Disabling the REDACT_AUDIT Policy
By default, theREDACT_AUDIT
policy is enabled for all sensitive columns. - Enabling the REDACT_AUDIT Policy
You can enable theREDACT_AUDIT
policy for a specific sensitive column or for all columns in the database.
Parent topic: Using Transparent Sensitive Data Protection
13.10.1 About the REDACT_AUDIT Policy
The predefined REDACT_AUDIT
transparent sensitive data protection policy masks bind values.
The bind values of the bind variables that are used in SQL statements can appear in audit records when auditing is configured. Similarly, bind values can appear in trace files when the appropriate event is set. Bind values can also appear when you query the V$SQL_BIND_DATA
dynamic view.
The REDACT_AUDIT
transparent sensitive data protection policy displays the data as an asterisk (*
) in audit records, trace files, and in V$SQL_BIND_DATA
view queries. By default the REDACT_AUDIT
policy is associated with every sensitive type in the database. When you identify a column as sensitive, by default, the REDACT_AUDIT
policy is enabled for it.
You can disable and enable the REDACT_AUDIT
policy, but you cannot alter or drop it.
13.10.2 Variables Associated with Sensitive Columns
Bind variables affect the use of sensitive columns with conditions, SELECT
items, and INSERT
or UPDATE
operations.
- About Variables Associated with Sensitive Columns
You can associate variables with sensitive columns in TSDP policies. - Bind Variables and Sensitive Columns in the Expressions of Conditions
You can include sensitive columns in SQL queries that haveWHERE
clauses. - A Bind Variable and a Sensitive Column Appearing in the Same SELECT Item
If a column in aSELECT
item is sensitive, then all the binds in theSELECT
item are considered sensitive. - Bind Variables in Expressions Assigned to Sensitive Columns in INSERT or UPDATE Operations
You can assign multiple bind variables to different columns in oneINSERT
orUPDATE
statement.
13.10.2.1 About Variables Associated with Sensitive Columns
You can associate variables with sensitive columns in TSDP policies.
A bind variable can be considered to be sensitive or "associated" with a sensitive column if the bind variable occurs in the same comparison condition as a sensitive column, if it occurs in a SELECT
statement alongside a sensitive column, or if it occurs in an INSERT
or UPDATE
operation that involves a sensitive column.
Parent topic: Variables Associated with Sensitive Columns
13.10.2.2 Bind Variables and Sensitive Columns in the Expressions of Conditions
You can include sensitive columns in SQL queries that have WHERE
clauses.
A SQL query that contains a WHERE
clause can include sensitive columns and bind variables for use with comparison operators such as =
, IS
, IS NOT
, LIKE
, BETWEEN
, and IN
, as well as in subqueries.
In the following comparison query, the bind value in VAR1
is masked because VAR1
and the sensitive column SALARY
appear in the expression that is compared using the comparison condition >
.
SELECT EMPLOYEE_ID FROM HR.EMPLOYEES WHERE SALARY > :VAR1;
In the next query, the bind values in VAR1
and VAR2
are masked because VAR1
, VAR2
, and the sensitive column SALARY
appear in the expression that uses the comparison equality condition =
.
SELECT EMPLOYEE_ID FROM HR.EMPLOYEES WHERE SALARY + :VAR1 = TO_NUMBER(:VAR2, '9G999D99');
For floating point conditions, the sensitive column and the bind variable appear in the expression that is evaluated. In the following example, the bind value in VAR1
is masked because VAR1
and the sensitive column SALARY
appear in the expression for the IS NOT NAN
condition.
SELECT COUNT( ) FROM HR.EMPLOYEES WHERE (SALARY * :VAR1) IS NOT NAN;
In pattern matching conditions, the sensitive column and the bind variable appear as arguments. In the following example, the bind value in VAR1
is masked because VAR1
and the sensitive column LAST_NAME
are the arguments for the LIKE
condition.
SELECT LAST_NAME FROM HR.EMPLOYEES WHERE LAST_NAME LIKE :VAR1;
For BETWEEN
conditions, the sensitive column and the bind variable appear in the expressions that are arguments. In the following example, bind values in VAR1
and VAR2
are masked because VAR1
, VAR2
, and SALARY
appear in expressions that are arguments to the BETWEEN
condition.
SELECT EMPLOYEE_ID FROM HR.EMPLOYEES WHERE SALARY BETWEEN :VAR1 AND :VAR2;
In the next example, the sensitive column and the bind variable are the arguments of the IN
condition. Here, the bind values in VAR1
and VAR2
are masked because VAR1
, VAR2
, and the sensitive column SALARY
appear as arguments to the IN
condition.
SELECT COUNT( ) FROM HR.EMPLOYEES WHERE SALARY IN ( :VAR1, :VAR2);
When a condition has a nested subquery as an argument, the bind variables and sensitive columns that appear in the nested subquery are not considered to be associated with the condition. In the following query, the sensitive column SALARY
and the subquery are expressions for the greater-than condition >
.
SELECT EMPLOYEE_ID FROM HR.EMPLOYEES WHERE SALARY > (SELECT SALARY FROM HR.EMPLOYEES WHERE MANAGER_ID = :VAR1);
However, variable VAR1
is associated with column MANAGER_ID
as variable VAR1
and MANAGER_ID
appears in expressions being compared using the condition =
. Because MANAGER_ID
is not a sensitive column, variable VAR1
is not considered sensitive. The variable VAR1
is not considered to be associated with the sensitive column SALARY
.
In the case of the logical conditions, model conditions, multiset conditions, XML conditions, compound conditions, IS OF
type conditions, and EXISTS
conditions, there can be no cases where a bind variable and a sensitive column are associated with each other. This is due to the structure or the nature of these conditions.
Parent topic: Variables Associated with Sensitive Columns
13.10.2.3 A Bind Variable and a Sensitive Column Appearing in the Same SELECT Item
If a column in a SELECT
item is sensitive, then all the binds in the SELECT
item are considered sensitive.
For example, assume that HR.EMPLOYEES.SALARY
and HR.EMPLOYEES.COMMISSION_PCT
are sensitive columns. In the following query, the bind variable VAR1
is considered sensitive because it appears in the same SELECT
item as the sensitive column SALARY
, so its bind value is masked.
SELECT (SALARY * :VAR1) AS BONUS AS FROM HR.EMPLOYEES WHERE EMPLOYEE_ID = :VAR2;
In the next example, the bind variable VAR1
is considered sensitive because it appears in the same SELECT
item as SALARY
. VAR2
is considered sensitive because it appears in the same SELECT
item as the sensitive column COMMISSION_PCT
.
SELECT (SALARY * :VAR1), (COMMISSION_PCT * :VAR2), (EMPNO + :VAR3) AS BONUS AS FROM PAYROLL.ACCOUNT;
Parent topic: Variables Associated with Sensitive Columns
13.10.2.4 Bind Variables in Expressions Assigned to Sensitive Columns in INSERT or UPDATE Operations
You can assign multiple bind variables to different columns in one INSERT
or UPDATE
statement.
Consider the following INSERT
statement:
INSERT INTO PAYROLL.ACCOUNT (ACCOUNT_NUM, SALARY) VALUES (:VAR1 * :VAR2 , :VAR3);
In this INSERT
statement, the following takes place:
-
The bind variables
VAR1
andVAR2
appear in the expression (:VAR1 * :VAR2
), which is assigned to the sensitive columnACCOUNT_NUM
. -
The bind variable
VAR3
is assigned to sensitive columnSALARY
.
Consider the following UPDATE
statement:
UPDATE PAYROLL.ACCOUNT SET ACCOUNT_NUM = :VAR1, SALARY = :VAR2;
In this UPDATE
statement, the following takes place:
-
The bind variable
VAR1
is assigned to sensitive columnACCOUNT_NUM
. -
The bind variable
VAR2
is assigned to sensitive columnSALARY
.
Parent topic: Variables Associated with Sensitive Columns
13.10.3 How Bind Variables on Sensitive Columns Behave with Views
A bind variable that appears in a query on a view is considered sensitive if the view column references a sensitive column.
For example, suppose you identify the SALARY
column in the HR.EMPLOYEES
table as sensitive. Then you create the view EMPLOYEES_VIEW
as follows:
CREATE OR REPLACE VIEW HR.EMPLOYEES_VIEW AS SELECT * FROM HR.EMPLOYEES;
When a user references the SALARY
column from this view in a SQL statement, any bind variable that has been associated with the SALARY
column is considered sensitive and its bind value then masked.
SELECT EMPLOYEE_ID FROM HR.EMPLOYEES_VIEW WHERE SALARY = :VAR1;
In this case, the bind variable VAR1
is masked because it is associated with the HR.EMPLOYEES_VIEW.SALARY
column, which references the sensitive column HR.EMPLOYEES.SALARY
.
13.10.4 Disabling the REDACT_AUDIT Policy
By default, the REDACT_AUDIT
policy is enabled for all sensitive columns.
You can disable it for a specific sensitive column or all sensitive columns, and when needed, re-enable it. Remember that you cannot alter or delete the REDACT_AUDIT
policy.
-
To disable the
REDACT_AUDIT
policy, use theDBMS_TSDP_PROTECT.DISABLE_PROTECTION_COLUMN
procedure.
For example, to disable the REDACT_AUDIT
policy for the SALARY
column of HR.EMPLOYEES
:
BEGIN DBMS_TSDP_PROTECT.DISABLE_PROTECTION_COLUMN( schema_name => 'HR', table_name => 'EMPLOYEES', column_name => 'SALARY', policy => 'REDACT_AUDIT'); END; /
The following example shows how to disable the REDACT_AUDIT
policy for all sensitive columns in the current database.
BEGIN DBMS_TSDP_PROTECT.DISABLE_PROTECTION_COLUMN( policy => 'REDACT_AUDIT'); END; /
13.10.5 Enabling the REDACT_AUDIT Policy
You can enable the REDACT_AUDIT
policy for a specific sensitive column or for all columns in the database.
-
To enable the
REDACT_AUDIT
policy, use theDBMS_TSDP_PROTECT.DISABLE_PROTECTION_COLUMN
procedure.
For example, to re-enable the REDACT_AUDIT
policy for the SALARY
column of HR.EMPLOYEES
:
BEGIN DBMS_TSDP_PROTECT.ENABLE_PROTECTION_COLUMN( schema_name => 'HR', table_name => 'EMPLOYEES', column_name => 'SALARY', policy => 'REDACT_AUDIT'); END; /
The following example shows how to enable the REDACT_AUDIT
policy for all sensitive columns in the current database.
BEGIN DBMS_TSDP_PROTECT.ENSABLE_PROTECTION_COLUMN( policy => 'REDACT_AUDIT'); END; /
13.11 Transparent Sensitive Data Protection Policies with Data Redaction
Oracle Data Redaction features work with transparent sensitive data protection policies.
The Data Redaction function types, function parameters, and expressions can be used in the TSDP policy definition. For example, you can set the enable the TSDP policy to use FULL
or PARTIAL
data redaction. This chapter uses Data Redaction for examples of managing TSDP policies.
13.12 Using Transparent Sensitive Data Protection Policies with Oracle VPD Policies
You can combine protections from TSDP and Oracle Virtual Private Database into one policy.
- About Using TSDP Policies with Oracle Virtual Private Database Policies
To incorporate Oracle Virtual Private Database protection with transparent sensitive data protection policies, you must use theDBMS_TSDP_PROTECT
andDBMS_RLS
packages. - DBMS_RLS.ADD_POLICY Parameters That Are Used for TSDP Policies
Oracle Database provides a set of parameters for fine-tuning the behavior of TSDP policies. - Tutorial: Creating a TSDP Policy That Uses Virtual Private Database Protection
This tutorial demonstrates how to incorporate Oracle Virtual Private Database protection with a transparent sensitive data protection policy.
Parent topic: Using Transparent Sensitive Data Protection
13.12.1 About Using TSDP Policies with Oracle Virtual Private Database Policies
To incorporate Oracle Virtual Private Database protection with transparent sensitive data protection policies, you must use the DBMS_TSDP_PROTECT
and DBMS_RLS
packages.
This feature works as follows:
-
You create a VPD policy function with a suitable predicate. Later on, when you create the TSDP policy, you will refer to this VPD policy function by using the
policy_function
setting of theDBMS_RLS.ADD_POLICY
procedure for thefeature_options
parameter of theDBMS_TSDP_PROTECT.ADD_POLICY
procedure. -
You create a TSDP policy with the necessary VPD settings similar to the VPD policy function.
The TSDP policy uses parameter settings from the
DBMS_RLS.ADD_POLICY
procedure to provide VPD protection. Be aware that parameters from theDBMS_RLS.ADD_GROUPED_POLICY
policy are not supported. -
You associate the TSDP policy with the necessary sensitive types by using the
DBMS_TSDP_PROTECT.ASSOCIATE_POLICY
procedure. -
You then enable TSDP protection by using any of the
DBMS_TSDP_PROTECT.ENABLE_PROTECTION_
* procedures. -
You enable the TSDP policy. At this point, Oracle Database creates an internal VPD policy that uses the function that you created.
The name of the internal policy begins with
ORA$VPD
followed by an identifier (for example,ORA$VPD_6J6L3RSJSN2VAN0XF)
. You can find this policy by querying thePOLICY_NAME
column of theDBA_POLICIES
data dictionary view. -
When users query the table, the output for the column is based on both the VPD protections and the TSDP policy that are now in place.
-
These protections remain in place until you disable the TSDP policy for this column. At that point, Oracle Database automatically drops the internal VPD policy, because it is no longer needed. If you reenable the TSDP policy, then the internal VPD policy is recreated.
13.12.2 DBMS_RLS.ADD_POLICY Parameters That Are Used for TSDP Policies
Oracle Database provides a set of parameters for fine-tuning the behavior of TSDP policies.
Table 13-1 describes the DBMS_RLS.ADD_POLICY
parameters that are permissible in the FEATURE_OPTIONS
parameter when you use the DBMS_TSDP_PROTECT.ADD_POLICY
or DBMS_TSDP_PROTECT.ALTER_POLICY
procedure.
Table 13-1 DBMS_RLS.ADD_POLICY Parameters Used for TSDP Policies
Parameter | Description | Default |
---|---|---|
|
Schema of the policy function (current default schema, if |
|
|
Name of a function that generates a predicate for the policy. If the function is defined within a package, then you must include the name of the package (for example, |
|
|
Statement types to which the policy applies. It can be any combination of |
|
|
Optional argument for The check applies only to the security relevant columns that are included in the policy definition. In other words, the |
|
|
If you set this value to |
|
|
Default is |
|
|
Default is |
|
|
If you specify this parameter, then transparent sensitive data protection inputs the sensitive column on which the protection is enabled to the Allowed values are for
|
|
13.12.3 Tutorial: Creating a TSDP Policy That Uses Virtual Private Database Protection
This tutorial demonstrates how to incorporate Oracle Virtual Private Database protection with a transparent sensitive data protection policy.
- Step 1: Create the hr_appuser User Account
First, you must create a sample user account and then grant this user the appropriate privileges. - Step 2: Identify the Sensitive Columns
As the sample usertsdp_admin
, you are ready to identify sensitive columns to protect. - Step 3: Create an Oracle Virtual Private Database Function
TSDP will associate the Oracle VPD policy function with the VPD policy that is automatically created when the TSDP policy is enabled. - Step 4: Create and Enable a Transparent Sensitive Data Protection Policy
After you have created the VPD policy function, you can associate it with a transparent sensitive data protection policy. - Step 5: Test the Transparent Sensitive Data Protection Policy
Now, you are ready to test the transparent sensitive data protection policy. - Step 6: Remove the Components of This Tutorial
If you no longer need the components of this tutorial, then you can remove them.
13.12.3.1 Step 1: Create the hr_appuser User Account
First, you must create a sample user account and then grant this user the appropriate privileges.
Related Topics
13.12.3.2 Step 2: Identify the Sensitive Columns
As the sample user tsdp_admin
, you are ready to identify sensitive columns to protect.
13.12.3.3 Step 3: Create an Oracle Virtual Private Database Function
TSDP will associate the Oracle VPD policy function with the VPD policy that is automatically created when the TSDP policy is enabled.
-
To create the VPD policy function, use the
CREATE OR REPLACE FUNCTION
procedure, as follows:CREATE OR REPLACE FUNCTION vpd_function ( v_schema IN VARCHAR2, v_objname IN VARCHAR2) RETURN VARCHAR2 AS BEGIN RETURN 'SYS_CONTEXT(''USERENV'',''SESSION_USER'') = ''HR_APPUSER'''; END vpd_function; /
13.12.3.4 Step 4: Create and Enable a Transparent Sensitive Data Protection Policy
After you have created the VPD policy function, you can associate it with a transparent sensitive data protection policy.
13.12.3.5 Step 5: Test the Transparent Sensitive Data Protection Policy
Now, you are ready to test the transparent sensitive data protection policy.
13.13 Using Transparent Sensitive Data Protection Policies with Unified Auditing
The transparent sensitive data protection and unified auditing procedures can combine the protections of these two features.
- About Using TSDP Policies with Unified Audit Policies
You can configure transparent sensitive data protection policies to audit object actions using unified auditing. - Unified Audit Policy Settings That Are Used with TSDP Policies
Audit policy settings can be used in thePOLICY_ENABLE_OPTIONS
parameter for theDBMS_TSDP_PROTECT.ADD_POLICY
orDBMS_TSDP_PROTECT.ALTER_POLICY
procedure.
Parent topic: Using Transparent Sensitive Data Protection
13.13.1 About Using TSDP Policies with Unified Audit Policies
You can configure transparent sensitive data protection policies to audit object actions using unified auditing.
The DBMS_TSDP_PROTECT.ADD_POLICY
and DBMS_TSDP_PROTECT.ALTER_POLICY
procedures enable you to specify settings from the CREATE AUDIT POLICY
, ALTER AUDIT POLICY
, AUDIT POLICY
, and COMMENT
SQL statements. The TSDP policy enables the creation of action audit-options for object-specific options in the policy, such as INSERT
or DELETE
operations. System-wide audit options are not supported. Therefore, the audited object type is always TABLE
. Only standard actions (such as INSERT
) are permitted. Component actions, such as creating policies for Oracle Label Security or other Oracle Database features, are not supported.
This feature works as follows:
-
You create a TSDP policy with the necessary unified audit settings.
The TSDP policy uses parameter settings from the
CREATE AUDIT POLICY
,AUDIT POLICY
, andCOMMENT
statements. -
You associate the TSDP policy with the necessary sensitive types by using the
DBMS_TSDP_PROTECT.ASSOCIATE_POLICY
procedure. -
You then enable TSDP protection by using any of the
DBMS_TSDP_PROTECT.ENABLE_PROTECTION_
* procedures. -
You enable the TSDP policy. As part of the TSDP policy enablement process, Oracle Database internally creates a unified audit policy and then enables it on the list of target users and roles that you specified in the
DBMS_TSDP_PROTECT.ADD_POLICY
procedure.The name of the internal policy begins with
ORA$UNIFIED_AUDIT_
followed by a random alpha-numeric string (for example,ORA$UNIFIED_AUDIT_6J6L3RSJSN2VAN0XF
). You can find this policy by querying thePOLICY_NAME
column of theAUDIT_UNIFIED_POLICIES
data dictionary view. To find the names of the users and roles on which this internally created TSDP unified audit policy is enforced, query theAUDIT_UNIFIED_ENABLED_POLICIES
view. -
When users try to perform an action on the table that is being protected by the TSDP policy, then based on the TSDP unified audit policy configuration, a unified audit record is written to the unified audit trail for this object access. You can then query the
UNIFIED_AUDIT_TRAIL
view to see the unified audit record that was created because of the TSDP unified audit policy enforcement. -
These protections remain in place until you disable the TSDP policy for this column. At that point, Oracle Database automatically disables and then drops the internal policy, because it is no longer necessary. (A unified audit policy must be disabled before it can be dropped.) If you re-enable the TSDP policy, then the internal policy is recreated.
13.13.2 Unified Audit Policy Settings That Are Used with TSDP Policies
Audit policy settings can be used in the POLICY_ENABLE_OPTIONS
parameter for the DBMS_TSDP_PROTECT.ADD_POLICY
or DBMS_TSDP_PROTECT.ALTER_POLICY
procedure.
These audit policy settings are from the AUDIT
, CREATE AUDIT POLICY
, and ALTER AUDIT POLICY
statements.
The following table describes these settings.
Table 13-2 Unified Audit Policy Settings Used for TSDP Policies
Parameter | Description | Default |
---|---|---|
|
A string containing a comma-separated list of SQL actions. Valid actions are: To configure the policy to audit all of these actions, specify the keyword |
|
|
In this syntax, If the audit condition contains a single quotation mark, then specify two single quotation marks instead of one, and enclose the 'SYS_CONTEXT(''USERENV'', ''CLIENT_IDENTIFIER'') = ''myclient''' |
|
|
Can be one of the following:
|
|
|
A string that contains a comma-separated list of users or roles. If you omit this parameter, then the audit policy is enabled for all users. |
|
|
Applies only if the
|
|
|
A string that describes the unified audit policy that will be created |
|
13.14 Using Transparent Sensitive Data Protection Policies with Fine-Grained Auditing
The transparent sensitive data protection and fine-grained auditing procedures can combine the protections of these two features.
- About Using TSDP Policies with Fine-Grained Auditing
You can configure a Transparent Sensitive Data Protection policy for fine-grained auditing. - Fine-Grained Auditing Parameters That Are Used with TSDP Policies
DBMS_FGA.ADD_POLICY
settings can be used in thePOLICY_ENABLE_OPTIONS
parameter for theDBMS_TSDP_PROTECT.ADD_POLICY
orDBMS_TSDP_PROTECT.ALTER_POLICY
procedure.
Parent topic: Using Transparent Sensitive Data Protection
13.14.1 About Using TSDP Policies with Fine-Grained Auditing
You can configure a Transparent Sensitive Data Protection policy for fine-grained auditing.
The DBMS_TSDP_PROTECT.ADD_POLICY
and DBMS_TSDP_PROTECT.ALTER_POLICY
procedures enable you to specify settings from the DBMS_FGA.ADD_POLICY
procedure.
This feature works as follows:
-
You create a TSDP policy with the necessary fine-grained audit settings.
The TSDP policy uses parameter settings from the
DBMS_FGA.ADD_POLICY
procedure. -
You associate the TSDP policy with the necessary sensitive types by using the
DBMS_TSDP_PROTECT.ASSOCIATE_POLICY
procedure. -
You then enable TSDP protection by using any of the
DBMS_TSDP_PROTECT.ENABLE_PROTECTION_
* procedures. -
You enable the TSDP policy. As part of the TSDP policy enablement process, Oracle Database internally creates a fine-grained audit policy that you specified in the
DBMS_TSDP_PROTECT.ADD_POLICY
procedure.The name of the internal policy begins with
ORA$FGA_
followed by a random alpha-numeric string (for example,ORA$FGA_6J6L3RSJSN2VAN0XF
). You can find this policy by querying thePOLICY_NAME
column of theDBA_POLICIES
data dictionary view. -
When users try to perform an action on the table that is being protected by the TSDP policies, then based on the policy configuration, a fine-grained audit record is generated in the
DBA_FGA_AUDIT_TRAIL
data dictionary view for this object access. -
These protections remain in place until you disable the TSDP policy for this column. At that point, Oracle Database automatically drops the internal policy, because it is no longer needed. If you reenable the TSDP policy, then the internal policy is recreated.
13.14.2 Fine-Grained Auditing Parameters That Are Used with TSDP Policies
DBMS_FGA.ADD_POLICY
settings can be used in the POLICY_ENABLE_OPTIONS
parameter for the DBMS_TSDP_PROTECT.ADD_POLICY
or DBMS_TSDP_PROTECT.ALTER_POLICY
procedure.
The following table describes these settings.
Table 13-3 Fine-Grained Audit Policy Settings Used for TSDP Policies
Parameter | Description | Default |
---|---|---|
|
Specifies a Boolean value to indicate a monitoring condition, using the following syntax: operator value For example: |
|
|
Schema that contains the event handler. The default, |
|
|
Function name of the event handler. Include the package name if necessary. This function is invoked only after the first row that matches the audit condition in the query is processed. If the procedure fails with an exception, then the user’s SQL statement fails as well. |
|
|
You can specify one of the following statement types: |
|
|
If you have not yet migrated the database to full unified auditing, then use this setting to set the destination of the audit records: If full unified auditing is enabled, then Oracle Database ignores this parameter and writes the audit records to the unified audit trail. |
|
|
The schema that corresponds to the sensitive column |
Schema that contains the sensitive column |
|
The table that contains the sensitive column |
The object (table or view) that contains the sensitive column |
|
A system-generated name for the internal fine-grained audit policy |
Internal fine-grained audit policy system-generated name |
|
The sensitive column |
The sensitive column |
|
Determines whether to audit all or specific columns |
|
|
Enable status for the TSDP policy; can be either |
|
|
User who invokes the |
Current user |
13.15 Using Transparent Sensitive Data Protection Policies with TDE Column Encryption
The TSDP procedures and Transparent Data Encryption column encryption statements can combine the protections of these two features.
- About Using TSDP Policies with TDE Column Encryption
A TSDP policy can enable the encryption of columns that use Transparent Data Encryption. - TDE Column Encryption ENCRYPT Clause Settings Used with TSDP Policies
TheCREATE TABLE
andALTER TABLE
statementENCRYPT
clause settings can be used in thePOLICY_ENABLE_OPTIONS
parameter for theDBMS_TSDP_PROTECT.ADD_POLICY
orDBMS_TSDP_PROTECT.ALTER_POLICY
procedure.
Parent topic: Using Transparent Sensitive Data Protection
13.15.1 About Using TSDP Policies with TDE Column Encryption
A TSDP policy can enable the encryption of columns that use Transparent Data Encryption.
The DBMS_TSDP_PROTECT.ADD_POLICY
and DBMS_TSDP_PROTECT.ALTER_POLICY
procedures enable you to specify the ENCRYPT
clause settings from the CREATE TABLE
or ALTER TABLE
statement.
This feature works as follows:
-
You can create a TSDP policy by using the
DBMS_TSDP_PROTECT.ADD_POLICY
procedure. In theADD_POLICY
procedure, you can configure the policy for column encryption by setting theSECURITY_FEATURE
parameter toDBMS_TSDP_PROTECT.COLUMN_ENCRYPTION
. This setting enables encryption on the sensitive column when the TSDP policy is enabled on the object. -
You create a TSDP policy with the necessary table encryption settings.
The TSDP policy uses TDE column encryption
ENCRYPT
clause parameter settings from theCREATE TABLE
orALTER TABLE
SQL statement. -
You associate the TSDP policy with the necessary sensitive types by using the
DBMS_TSDP_PROTECT.ASSOCIATE_POLICY
procedure. -
You then enable TSDP protection by using any of the
DBMS_TSDP_PROTECT.ENABLE_PROTECTION_
* procedures. -
You enable the TSDP policy. At this point, Oracle Database creates an internal TSDP policy that uses the encrypted table settings that you created earlier in this procedure.
The name of the internal policy begins with
ORA$TDECE_
followed by a random alpha-numeric string (for example,ORA#TDECE_6J6L3RSJSN2VAN0XF
). You can find this policy by querying theTSDP_POLICY
column ofDBA_TSDP_POLICY_PROTECTION
view. -
When users try to perform an action on the table that is being protected by the policies, the output for the column is based on both the TDE column protections and the TSDP policy that are now in place. You can check if the column has been encrypted after you enabled the TSDP policy by querying the
ENCRYPTION_ALG
column of theDBA_ENCRYPTED_COLUMNS
view. -
These protections remain in place until you disable the TSDP policy for this column. At that point, Oracle Database internally issues an
ALTER TABLE
statement on the table that contains the sensitive column, so that the sensitive column is decrypted. If you reenable the TSDP policy, then TSDP internally executes theALTER TABLE
statement with theENCRYPT
clause for the column.
Note:
It is possible to create two policies on the same column with each policy specifying a different encryption algorithm. In this case, the stronger of the two algorithms is enforced on the sensitive column.
13.15.2 TDE Column Encryption ENCRYPT Clause Settings Used with TSDP Policies
The CREATE TABLE
and ALTER TABLE
statement ENCRYPT
clause settings can be used in the POLICY_ENABLE_OPTIONS
parameter for the DBMS_TSDP_PROTECT.ADD_POLICY
or DBMS_TSDP_PROTECT.ALTER_POLICY
procedure.
The following table describes these settings.
Table 13-4 TDE Column Encryption ENCRYPT Settings Used for TSDP Policies
Parameter | Description | Default |
---|---|---|
|
Available values
|
|
|
Available values:
|
|
|
Available values:
|
|
13.16 Transparent Sensitive Data Protection Data Dictionary Views
Oracle Database provides data dictionary views that list information about transparent sensitive data protection policies.
Table 13-5 describes these views. Before you can use these views, you must be granted the SELECT_CATALOG_ROLE
role.
Table 13-5 Transparent Sensitive Data Protection Views
View | Description |
---|---|
|
Describes discovery import information with regard to transparent sensitive data protection policies |
|
Describes the sensitive column types that have been defined for the current database |
|
Describes the sensitive columns in the database |
|
Shows information regarding the errors encountered during import of discovery result. It shows information with regard to the error code, schema name, table name, column name, and sensitive type. |
|
Describes the transparent sensitive data protection policy and condition mapping. This view also lists the property-value pairs for the condition. |
|
Shows the transparent sensitive data protection policy security feature mapping. (At this time, only Oracle Data Redaction and Oracle Virtual Private Database are supported.) |
|
Describes the parameters of transparent sensitive data protection policies |
|
Shows the list of columns that have been protected through transparent sensitive data protection |
|
Shows the policy to sensitive column type mapping |
Related Topics
Parent topic: Using Transparent Sensitive Data Protection