Privilege Analysis in Oracle no additional licensing anymore.

12c New features changed from licensing option to free to use!

When Oracle 12c was released one of the new features was privilege analysis, this is a great features, but initially required additional licensing. But recently (November 2018) this license is not longer required. Which is very nice from Oracle.

 

What is privilege analysis?

Privilege analysis performs a dynamic (not static) analysis of privileges and roles that a user account or database uses over time.

Because it is a dynamic analysis, it captures real privileges and roles that were actually used.

Privilege analysis captures privileges used by database users and applications at runtime. You then can revoke unused grants and other changes to better reflect the access a user requires. This simplifies the work required to implement least privilege practice.

Running inside the Oracle Database kernel, privilege analysis helps reduce the attack surface of applications and increase operational security by identifying used and unused privileges. Privilege analysis can be used after you install Oracle Database Release 12c without any additional configuration steps.

The above is coming from the Oracle manual.

 

Blogs:

Their are several good blog posts explaining how to use privilege analysis, so I don’t want to spend explaining what others already did very well.

Capture Privilege Usage (DBMS_PRIVILEGE_CAPTURE) in Oracle Database 12c Release 1 (12.1)

Role and Privileges Analysis Oracle Database 12C release 1 (12.1)

Keep in-mind that you can also use cloud control to perform this action:

 

Privilege Analysis - Cloud control

 

So take advances of this license free security feature.

 

Below a scripts which I use to demo this feature, simple but explains what is done.

 

col inst_id for 9999
col pdb_name for a20
col file_name for a50
col owner for a15
col object_name for a30

accept host prompt "Enter hostname :"
connect sys@"&&host/&servicename" as sysdba

set linesize 80
set echo on
echo "Privilege analysis performs a dynamic analysis of privileges and roles that a user account or database uses over time."
echo "This demo only works in a PDB or NON-CDB


BEGIN
  DBMS_PRIVILEGE_CAPTURE.CREATE_CAPTURE( name => 'dba_role' , description => 'Check the DBA role' , type=> 2 , roles=> SYS.ROLE_NAME_LIST('DBA'));
END;
/

BEGIN
  DBMS_PRIVILEGE_CAPTURE.CREATE_CAPTURE( name => 'check_user' , description => 'Check privs for this user',
  type => dbms_privilege_capture.g_context,
  condition => 'SYS_CONTEXT(''USERENV'', ''SESSION_USER'')=''BCB''');
END;
/
-- also possible to use module ect: 'SYS_CONTEXT(''USERENV'', ''MODULE'')=''sqlplus'''

pause Display the create capture policy and check if enabled
col name for a20
col enabled for a10
select name,type,enabled from dba_priv_captures;

prompt Enable the capture policy, notice the error, database and 1 other policy can be enabled at one time
pause  Notice able capture is the same as start capture in Cloud control

execute DBMS_PRIVILEGE_CAPTURE.ENABLE_CAPTURE( name => 'check_user',run_name =>'myrun1')
select name,type,enabled from dba_priv_captures;

pause enable also the other policy
execute DBMS_PRIVILEGE_CAPTURE.ENABLE_CAPTURE( name => 'dba_role',run_name =>'myrun2');

create user bcb identified by bcb;
grant create session,dba to bcb;

prompt Now do something in the container as bcb user like create table myemp (a varchar2(10)) -- (user sys will not be analyzed)
pause create a table, drop a table for example, perform a query

pause Disable the privilege capture run
execute DBMS_PRIVILEGE_CAPTURE.DISABLE_CAPTURE( name => 'check_user');

select name,type,enabled from dba_priv_captures;

pause Now push the result to the data dictionary views
execute DBMS_PRIVILEGE_CAPTURE.GENERATE_RESULT( name => 'check_user');

pause Which views are available to check?
col object_name for a30
col object_type for a12
select object_name,object_type from dba_objects where object_name like 'DBA_USED_%' or object_name like 'DBA_UNUSED%';


pause Now we can start to analyse the result, in Cloud control the report functionality is nice.
pause Which system privileges where used during the capture periode?
COLUMN username FORMAT A20
COLUMN sys_priv FORMAT A20

SELECT username, sys_priv FROM dba_used_sysprivs WHERE capture='check_user' ORDER BY username, sys_priv;

pause How where the privileges granted?
COLUMN username FORMAT A20
COLUMN used_role FORMAT A30
COLUMN sys_priv FORMAT A20
COLUMN path FORMAT A50
SET LINESIZE 200

SELECT username, sys_priv, used_role, path FROM dba_used_sysprivs_path WHERE capture='check_user'
ORDER BY username, sys_priv;


pause Which system privileges where NOT used during the capture periode?
COLUMN username FORMAT A20
COLUMN sys_priv FORMAT A20
SELECT sys_priv FROM dba_unused_sysprivs WHERE capture='check_user' and username='BCB' ORDER BY sys_priv;


pause Create the statements to revoke all the privileges which are not required
--Generate statements to revoke permissions
select 'revoke '||OBJ_PRIV||' on '||OBJECT_OWNER||'.'|| OBJECT_NAME||' from ' ||USERNAME||';' from dba_unused_privs where username='BCB';


pause Cleanup/remove the user and privilege capture policy
drop user bcb;
execute DBMS_PRIVILEGE_CAPTURE.DROP_CAPTURE( name => 'dba_role');
execute DBMS_PRIVILEGE_CAPTURE.DROP_CAPTURE( name => 'check_user');

select name,type,enabled from dba_priv_captures;

set echo off

-- end of demo

 

11 januari 2019|12c, 18c, Multitenancy, security|

Geef een reactie