Exercise 08: Audit Database Activity
In this exercise, you will use Oracle Data Safe to audit database activity in your Autonomous Database (ADB). Auditing helps monitor actions performed within the database, providing insights into user activity and helping detect any suspicious or unauthorized actions.
Objectives
- Enable and configure auditing in Oracle Data Safe.
- Review and analyze database activity logs to monitor user actions.
Environment
Perform this exercise within the following environment:
- Compartment:
OCI-SEC-WS-LAB-nn
- Region: Germany Central (Frankfurt)
- OCI Console URL: OCI Console Frankfurt - Login
- OCI User: lab-oci-sec-wsNN
- OCI Password: provided by trainer
Ensure you are in the correct compartment and region. New resources, such as Cloud Shell configurations and ADB access settings, should be created within your designated compartment.
Solution
Step 1: Enable and Configure Auditing in Oracle Data Safe
- Access the Data Safe Dashboard:
- Navigate to Data Safe → Audit in the OCI Console.
- Enable Auditing for the Target Database:
- Select the target Autonomous Database (ADB) from the list.
- If auditing is not already enabled, follow these steps:
- Click Enable Auditing.
- Confirm that audit data collection is enabled for the selected database.
- Configure Audit Policies:
- Go to the Audit Policies tab in the Data Safe interface.
- Enable specific audit policies for your ADB:
- Login/Logout Events: Tracks user sessions.
- Privilege Usage: Captures the use of system or object privileges.
- Data Manipulation (DML): Logs INSERT, UPDATE, and DELETE operations.
- Schema Changes: Monitors CREATE, DROP, and ALTER statements.
- Save the Configuration:
- Ensure that the appropriate audit policies are applied to the database for logging key activities.
Step 2: Review and Analyze Database Activity Logs
- Access the Audit Reports:
- Navigate to Data Safe → Audit Reports.
- Filter Logs by Criteria:
- Use the filters to view specific activities, such as:
- Time Period: Specify a date and time range for recent activities.
- Users: Focus on actions performed by specific users.
- Events: Filter for particular event types, such as failed logins or schema changes.
- Use the filters to view specific activities, such as:
- Analyze Audit Logs:
- Review details of the audit logs, including:
- Event Type: Type of action performed (e.g., login, DML operations).
- User: Who performed the action.
- Timestamp: When the action occurred.
- Object Affected: Database objects involved in the operation.
- Review details of the audit logs, including:
- Identify Suspicious Activities:
- Look for anomalies or risks, such as:
- Unusual login attempts from unexpected IP addresses.
- Privilege escalation events.
- Unauthorized schema changes.
- Look for anomalies or risks, such as:
- Generate an Audit Report:
- Create a custom audit report for your findings:
- Select specific events and users.
- Export the report in PDF or CSV format for further analysis.
- Create a custom audit report for your findings:
Summary
In this exercise, you:
- Enabled and configured auditing for your Autonomous Database in Oracle Data Safe.
- Applied audit policies to track key database activities, such as logins, privilege usage, and schema changes.
- Reviewed and analyzed database activity logs to monitor user actions and identify potential security risks.
You are now ready to proceed to the next exercise, where you will explore additional Oracle Data Safe features, such as generating alerts and notifications.
- Previous Exercise: Exercise 07: Assess Database Users
- Next Exercise: Exercise 09: Generate Alerts