Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

4 Database Vault Introduction > Database Vault Components

Database Vault Components

Now that we have identified a few areas to improve, let’s look at how DBV addresses these requirements and security should-haves. The objective is here is simply to impart the natural and intuitive architecture for DBV. Having a fundamental understanding of the DBV components—why they are what they are—will help you to employ DBV in an effective manner.

DBV is built largely around a declarative framework that consists of tables that store information that drives the desired security policy and security enforcement. The framework is manipulated by a set of web-based user interfaces and a set of application programming interface (API) calls to the PL/SQL code.

One of the principles that drove the design of DBV was to provide higher assurance through additional security mechanisms that were separate and distinct from the existing database mechanisms. Risks are not always associated with an actual user’s session privileges; they do occur when the code underneath a user’s session is operating in the context of a powerful privilege that could be exploited for malicious use.


  

You are currently reading a PREVIEW of this book.

                                                                                                                    

Get instant access to over $1 million worth of books and videos.

  

Start a Free Trial


  
  • Safari Books Online
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint