Oracle database admins acknowledge security gaps

Database security is rife with pitfalls, according to 430 Oracle database administrators surveyed by the Independent Oracle Users Group.

According to the results of the survey released last month, fewer than 30% encrypt personally identifiable information in all their databases, while about 75% acknowledge their organizations do not have a means to prevent privileged database users from reading or tampering with human resources, financial or other business application data in their databases.

“There are still a lot of holes,” says Andrew Flower, president of the IOUG president and vice president LoganBritton. “One of the biggest risks is stealing data internally,” he acknowledges, saying the survey shows organizations aren’t applying sufficient resources to improve security, and that there’s been little change in the results from last year’s survey.

About two-thirds of the survey respondents admitted there was no way in their organizations to detect or prove that the database administrators were not abusing their privileges.

In addition, close to half of the respondents said a user with “common desktop tools” either could gain unauthorized direct access to sensitive information stored in databases or they weren’t sure about it. Another 64% said they don’t monitor database activity — and less than one-third of those monitoring are watching for sensitive reads and writes.

The IOUG respondents responding in the survey hail from the telecom sector, education, government, financial services, healthcare, manufacturing and the retail industry. A fair number work in organizations with large numbers of databases, with 35% claiming their organizations have 11 to 100 databases, and 13% having more than 1,000 databases.

About 6 in 10 said they don’t offshore the database application administrative function, 5% didn’t know but the remainder responded they did offshore to some extent.

Patch management is problematic for Oracle database administrators, with 37% saying they generally patch within one to three months, though most patch after three months.

In the survey, 6% said they were aware of an enterprise data breach, compromise or tampering over the past year, 16% said they didn’t know and 79% said they weren’t aware of it.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now