Abstract

The next three chapters are about privileged access control (PAC) applied to Oracle RDBMS. This chapter will outline the theoretical foundations underpinning PAC, as well as the business drivers justifying PAC projects. Practical implementations will be described in Chapter 13. Chapter 13 will also demonstrate generic security weaknesses of privileged access control implementations, before moving onto Chapter 14 and solutions for securing PAC installs.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call