3 minute read

Exercise 06: Assess Database Configurations

In this exercise, you will use Oracle Data Safe to perform a configuration assessment on your Autonomous Database (ADB). This assessment checks the database settings for compliance with security best practices, helping to identify potential vulnerabilities and areas for improvement.

Objectives

  • Run a configuration assessment using Oracle Data Safe.
  • Identify security risks and areas for improvement based on database settings.

Environment

Perform this exercise within the following environment:

  • Compartment: OCI-SEC-WS-LAB-nn
  • Region: Germany Central (Frankfurt)
  • OCI Console URL: OCI Console Frankfurt - Login
  • OCI User: lab-oci-sec-wsNN
  • OCI Password: provided by trainer

Ensure you are in the correct compartment and region. New resources, such as Cloud Shell configurations and ADB access settings, should be created within your designated compartment.

Solution

Step 1: Explore Security Assessment

  1. Navigate to the Oracle Data Safe Dashboard in the OCI Console.
    • Go to Data Safe -> Security Assessments.
  2. View the overview of the Security Assessment for your Autonomous Database (ADB).
    • Select the target ADB you registered in the previous exercises.
    • Explore the summary metrics such as:
      • Total findings (e.g., high, medium, low risks).
      • Configuration compliance score.

    >> step_1

  3. Go to the tab Target summary and click on the latest assessment report for the ADB to review the detailed findings.
    • Observe categories such as Privileges and roles, Database configuration, and Auditing.
    • Note any highlighted risks or warnings in the findings.

    Target summary

    Security Assessment Details

Step 2: Adjust the Risk Level of a Risk Finding

  1. From the Security Assessment Report, identify a risk finding that you want to adjust.
    • For example: Users with Grant Option
  2. Click on the finding to view its details.
    • Note the current risk level (e.g., high, medium, or low).

      Security Assessment Details

  3. Adjust the risk level:
    • Click on Edit Risk or Adjust Risk Level.
    • Select a new risk level (e.g., from “Low” to “Medium”) and provide a justification for the change (e.g., “Compliance Requirement “).

      Adjust Risk Level for Users with Grant Option

  4. Save the changes.

Step 3: Set Baseline

  1. Go back to the top of the page of the latest assessment report for the ADB.

    Security Assessment Details

  2. Click on Set Baseline:
    • The baseline captures the current configuration and security settings as a reference point.
  3. Confirm the baseline creation.
    • This baseline will be used for future comparisons to identify any deviations.

    Set Security Assessment Baseline

Step 4: Create a Risk on the Target Database

  1. Simulate a security risk by modifying a configuration on the target ADB.
  2. Access the SQL worksheet in Database Actions. If your session has expired, sign in again as the ADMIN user.
  3. If needed, clear the worksheet and the Script Output tab.
  4. On the worksheet, enter the following command:

    GRANT alter any role TO public;
    CREATE USER scott IDENTIFIED BY NO AUTHENTICATION;
    

    Create a Risk using SQL worksheet

Step 5: Refresh the Latest Security Assessment and Analyze the Results

  1. Navigate back the top of the page of the latest assessment report for the ADB.

  2. Click Refresh Assessment:
    • Wait for the assessment to complete.
    • The new assessment should reflect the risk you introduced in Step 4.

    Refresh Security Assessment

  3. Analyze the updated assessment report:
    • Look for the new risk findings created by your changes.
    • Review the affected areas and recommendations provided by Data Safe.

Step 6: Compare Your Assessment with the Baseline

  1. From the Security Assessments page, select the Baseline Comparison option.

  2. Compare the latest assessment results with the previously set baseline.
    • Identify any deviations or new risks.
    • Note changes such as:
      • Configuration setting differences.
      • Additional risk findings introduced in Step 4.
  3. Document the results of the comparison:
    • Highlight any areas of concern that should be addressed.
    • Reset the baseline if the new state is acceptable and reflects the desired configuration.

Summary

In this exercise, you:

  • Performed a configuration assessment with Oracle Data Safe to evaluate database settings.
  • Identified potential vulnerabilities and areas to enhance security compliance.

You are now ready to continue with the next exercise, where you will assess database users to further strengthen your security posture.