9 January 2017
UKOUG Database & RAC Cloud, Infrastructure & Availability SIG Thursday 23rd February
Date: Thursday 23rd February 2017
Time: 11:45 - 12:30
Abstract: Most of us have to manage at least a few legacy systems. These don't always conform to the latest (or any) security best practices. Schema owners are used as logins for batch processes, passwords are simple and often hard-coded into scripts, powerful roles and privileges are distributed in a liberal fashion etc. In the presentation I discuss the ways in which I developed a process to audit the security issues present in each of our legacy databases and the painful steps taken to try to remedy some of them.
Presented by: Karen Jex, Jex Solutions
Back to agenda
Published: 06.03.2017 - This document is restricted to members