{"id":213,"date":"2024-03-20T09:52:53","date_gmt":"2024-03-20T13:52:53","guid":{"rendered":"https:\/\/home.hamptonu.edu\/iac\/?page_id=213"},"modified":"2024-03-20T10:30:54","modified_gmt":"2024-03-20T14:30:54","slug":"database-security","status":"publish","type":"page","link":"https:\/\/home.hamptonu.edu\/iac\/database-security\/","title":{"rendered":"Database Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"213\" class=\"elementor elementor-213\">\n\t\t\t\t<div class=\"elementor-element elementor-element-40ed973 e-flex e-con-boxed e-con e-parent\" data-id=\"40ed973\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ee7fad2 elementor-widget elementor-widget-text-editor\" data-id=\"ee7fad2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1 class=\"pagetitle\">Database Security<\/h1><h2>Database Security<\/h2><ul><li><strong>Oracle Database Security <\/strong>(<a href=\"https:\/\/web.archive.org\/web\/20210620132045\/https:\/\/www.oracle.com\/database\/security\/index.html\" target=\"_blank\" rel=\"noopener\">https:\/\/www.oracle.com\/database\/security\/index.html<\/a>)\u00a0Oracle provides a comprehensive portfolio of security solutions to ensure data privacy, protect against insider threats, and enable regulatory compliance for both Oracle and non-Oracle databases.\u00a0<\/li><li><strong>Database Hardening Best Practices<\/strong> (<a href=\"https:\/\/web.archive.org\/web\/20210620132045\/https:\/\/security.berkeley.edu\/resources\/best-practices-how-articles\/database-hardening-best-practices\" target=\"_blank\" rel=\"noopener\">https:\/\/security.berkeley.edu\/resources\/best-practices-how-articles\/database-hardening-best-practices<\/a>) This link provide\u00a0a checklist was developed by IST system administrators to provide guidance for securing databases storing sensitive or restricted data. Implementing these security controls will help to prevent data loss, leakage, or unauthorized access to your databases.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Database Security Database Security Oracle Database Security (https:\/\/www.oracle.com\/database\/security\/index.html)\u00a0Oracle provides a comprehensive portfolio of security solutions to ensure data privacy, protect against insider threats, and enable regulatory compliance for both Oracle and non-Oracle databases.\u00a0 Database Hardening Best Practices (https:\/\/security.berkeley.edu\/resources\/best-practices-how-articles\/database-hardening-best-practices) This link provide\u00a0a checklist was developed by IST system administrators to provide guidance for securing databases storing [&hellip;]<\/p>\n","protected":false},"author":147,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-213","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Database Security - Information Assurance Center<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Database Security - Information Assurance Center\" \/>\n<meta property=\"og:description\" content=\"Database Security Database Security Oracle Database Security (https:\/\/www.oracle.com\/database\/security\/index.html)\u00a0Oracle provides a comprehensive portfolio of security solutions to ensure data privacy, protect against insider threats, and enable regulatory compliance for both Oracle and non-Oracle databases.\u00a0 Database Hardening Best Practices (https:\/\/security.berkeley.edu\/resources\/best-practices-how-articles\/database-hardening-best-practices) This link provide\u00a0a checklist was developed by IST system administrators to provide guidance for securing databases storing [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/home.hamptonu.edu\/iac\/database-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Information Assurance Center\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-20T14:30:54+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/database-security\\\/\",\"url\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/database-security\\\/\",\"name\":\"Database Security - Information Assurance Center\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/#website\"},\"datePublished\":\"2024-03-20T13:52:53+00:00\",\"dateModified\":\"2024-03-20T14:30:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/database-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/database-security\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/database-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Database Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/#website\",\"url\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/\",\"name\":\"Information Assurance Center\",\"description\":\"At the HU School of Science\",\"publisher\":{\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/#organization\",\"name\":\"Information Assurance Center\",\"url\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/wp-content\\\/uploads\\\/sites\\\/105\\\/2026\\\/03\\\/HU_logo_white_227x113.png\",\"contentUrl\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/wp-content\\\/uploads\\\/sites\\\/105\\\/2026\\\/03\\\/HU_logo_white_227x113.png\",\"width\":227,\"height\":113,\"caption\":\"Information Assurance Center\"},\"image\":{\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Database Security - Information Assurance Center","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Database Security - Information Assurance Center","og_description":"Database Security Database Security Oracle Database Security (https:\/\/www.oracle.com\/database\/security\/index.html)\u00a0Oracle provides a comprehensive portfolio of security solutions to ensure data privacy, protect against insider threats, and enable regulatory compliance for both Oracle and non-Oracle databases.\u00a0 Database Hardening Best Practices (https:\/\/security.berkeley.edu\/resources\/best-practices-how-articles\/database-hardening-best-practices) This link provide\u00a0a checklist was developed by IST system administrators to provide guidance for securing databases storing [&hellip;]","og_url":"https:\/\/home.hamptonu.edu\/iac\/database-security\/","og_site_name":"Information Assurance Center","article_modified_time":"2024-03-20T14:30:54+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/home.hamptonu.edu\/iac\/database-security\/","url":"https:\/\/home.hamptonu.edu\/iac\/database-security\/","name":"Database Security - Information Assurance Center","isPartOf":{"@id":"https:\/\/home.hamptonu.edu\/iac\/#website"},"datePublished":"2024-03-20T13:52:53+00:00","dateModified":"2024-03-20T14:30:54+00:00","breadcrumb":{"@id":"https:\/\/home.hamptonu.edu\/iac\/database-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/home.hamptonu.edu\/iac\/database-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/home.hamptonu.edu\/iac\/database-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/home.hamptonu.edu\/iac\/"},{"@type":"ListItem","position":2,"name":"Database Security"}]},{"@type":"WebSite","@id":"https:\/\/home.hamptonu.edu\/iac\/#website","url":"https:\/\/home.hamptonu.edu\/iac\/","name":"Information Assurance Center","description":"At the HU School of Science","publisher":{"@id":"https:\/\/home.hamptonu.edu\/iac\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/home.hamptonu.edu\/iac\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/home.hamptonu.edu\/iac\/#organization","name":"Information Assurance Center","url":"https:\/\/home.hamptonu.edu\/iac\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/home.hamptonu.edu\/iac\/#\/schema\/logo\/image\/","url":"https:\/\/home.hamptonu.edu\/iac\/wp-content\/uploads\/sites\/105\/2026\/03\/HU_logo_white_227x113.png","contentUrl":"https:\/\/home.hamptonu.edu\/iac\/wp-content\/uploads\/sites\/105\/2026\/03\/HU_logo_white_227x113.png","width":227,"height":113,"caption":"Information Assurance Center"},"image":{"@id":"https:\/\/home.hamptonu.edu\/iac\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/home.hamptonu.edu\/iac\/wp-json\/wp\/v2\/pages\/213","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/home.hamptonu.edu\/iac\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/home.hamptonu.edu\/iac\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/home.hamptonu.edu\/iac\/wp-json\/wp\/v2\/users\/147"}],"replies":[{"embeddable":true,"href":"https:\/\/home.hamptonu.edu\/iac\/wp-json\/wp\/v2\/comments?post=213"}],"version-history":[{"count":4,"href":"https:\/\/home.hamptonu.edu\/iac\/wp-json\/wp\/v2\/pages\/213\/revisions"}],"predecessor-version":[{"id":285,"href":"https:\/\/home.hamptonu.edu\/iac\/wp-json\/wp\/v2\/pages\/213\/revisions\/285"}],"wp:attachment":[{"href":"https:\/\/home.hamptonu.edu\/iac\/wp-json\/wp\/v2\/media?parent=213"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}