Intro
Recent reports have surfaced about a significant security breach involving Oracle Cloud. A threat actor, identified as "rose87168," claims to have exfiltrated over six million records, potentially affecting more than 140,000 tenants. The compromised data reportedly includes encrypted Single Sign-On (SSO) and Lightweight Directory Access Protocol (LDAP) passwords, Java KeyStores (JKS) files, and Enterprise Manager Java Platform Security (JPS) keys. The attacker is allegedly demanding payments from affected organizations to prevent further exposure.
This incident underscores the critical need for robust encryption key management and security best practices. While Oracle Cloud offers built-in security measures, organizations must proactively safeguard their sensitive credentials and encryption keys. This is where Oracle Key Vault (OKV) plays a crucial role in enhancing data security and mitigating potential threats.
It's not advisable to store your Transparent Data Encryption (TDE) keys locally, as disk corruption could lead to the loss of these critical keys. Managing keys manually across multiple Oracle and MySQL databases with TDE encryption can be challenging and error-prone. That’s why I always encourage customers to back up their keys to an external repository as part of disaster recovery planning. Oracle Key Vault (OKV) serves a crucial role in this context by providing a centralized repository to protect and manage keys. This product is highly mature in terms of security and offers robust protection for sensitive data.
How Oracle Key Vault Can Help
Oracle Key Vault (OKV) is designed to provide centralized and secure storage for encryption keys, certificates, and credentials, reducing the risk of unauthorized access. In light of this breach, organizations leveraging OKV can benefit in the following ways:
Secure Key Management—OKV provides a dedicated environment for securely storing and managing encryption keys, preventing exposure even if other credentials are compromised.
Separation of Duties – By decoupling encryption key storage from application environments, OKV minimizes the risk of key exposure in case of a breach.
End-to-End Encryption – Ensuring that sensitive data, including authentication credentials and cryptographic keys, remains encrypted both in transit and at rest.
Auditing & Compliance – OKV provides robust auditing capabilities, helping organizations track key access and usage to meet regulatory compliance requirements.
Automated Key Rotation – Regular key rotation can help mitigate risks associated with long-term key exposure, making it harder for attackers to exploit stolen credentials.
Initial Step
The first step is to download the Oracle Key Vault (OKV) ISO image from Oracle e-Delivery.
-
Visit Oracle e-Delivery.
-
In the search bar, type Oracle Key Vault and locate the latest version (21.10).
-
Download the ISO file for installation.
- CPU: Minimum: x86-64 16 cores. Recommended: 24-48 cores with cryptographic acceleration support (Intel AESNI).
- Memory: Minimum 16 GB of RAM. Recommended: 32–64 GB.
- Disk: Both BIOS and UEFI boot mode. For a system with a boot disk size greater than 2 TB, Oracle Key Vault supports booting in UEFI mode only.
Installation
After downloading the OKV ISO, boot your system from the ISO image. Once the installation menu appears, simply press Enter to start a fresh installation of Oracle Key Vault.Setup Network
This figure illustrates the final step of the application installation process.
Set up roles and users for OKV.
Admin
-
System Administrator
-
Audit Manager
Alternatively, you can use the same account for all these roles. For this configuration, I will use a single account.
No comments:
Post a Comment