Planning Security for an Administrative Domain
Oracle Secure Backup meets these requirements in its default configuration. By
default, all hosts that run Oracle Secure Backup must have their identity verified
before they can join the administrative domain. A host within the domain uses an
X.509
certificate
connection is established between hosts, control and data messages are encrypted
when transmitted over the network. SSL protects the administrative domain from
eavesdropping, message tampering or forgery, and replay attacks.
Network backup software such as Oracle Secure Backup is only one component of a
secure backup network. Oracle Secure Backup can supplement but not replace the
physical and network security provided by administrators.
Planning Security for an Administrative Domain
If security is of primary concern in your environment, then you might find it helpful to
plan for network security in the following stages:
Identifying Assets and Principals
■
Identifying Your Backup Environment Type
■
Choosing Secure Hosts for the Administrative and Media Servers
■
Determining the Distribution Method of Host Identity Certificates
■
After completing these stages, you can proceed to the implementation phase as
described in
Identifying Assets and Principals
The first step in planning security for an
assets and principals associated with the domain. The assets of the domain include:
Database and file-system data requiring backup
■
Metadata about the database and file-system data
■
Passwords
■
Identities
■
Hosts and storage devices
■
Principals are users who either have access to the assets associated with the
administrative domain or to a larger network that contains the domain. Principals
include the following users:
Backup administrators
■
These Oracle Secure Backup users have administrative
access to the tapes containing backup data, and the rights required to perform
backup and restore operations.
Database administrators
■
Each database administrator has complete access to his or her own database.
Host owners
■
Each host owner has complete access to its file system.
System administrators
■
These users might have access to the corporate network and to the hosts in the
administrative domain (although not necessarily root access).
6-2 Oracle Secure Backup Installation and Configuration Guide
for
host
authentication. After a
"Configuring Security for the Administrative Domain"
Secure Sockets Layer (SSL)
administrative domain
rights
on page 6-16.
is determining the
in the domain,
Need help?
Do you have a question about the Secure Backup and is the answer not in the manual?
Questions and answers