5. Review the Risk summary tab.
- It shows you how much risk you have across all target databases in the specified compartment.
- You can compare the number of high, medium, low, advisory, and evaluate risk findings across all target databases, and view which risk categories have the greatest numbers.
- Risk categories include Target databases, User accounts, Privileges and roles, Authorization control, Fine-grained access control, Data encryption, Auditing, and Database configuration.
6. Review the Target summary tab.
- It shows you the security posture of each target database.
- You can view the number of high, medium, low, advisory, and evaluate risk findings for each target database.
- You can view the latest assessment date and find out if the latest assessment deviates from a baseline (if one is set).
- You can access the latest assessment report for each target database.
Task #2: View the latest Security Assessment for your Target Database
1. On the Target summary tab, locate your target database and click View report.
The latest security assessment for your target database is displayed.
2. Review the top 5 common security controls that Oracle considers to be the most important to the security of your target databases. You can click the links to quickly navigate to more details below.
3. Review the information in the Summary table. This table compares the number of findings for each category in the report and counts the number of findings per risk level.
4. Click the Assessment information tab to view details about the security assessment, like OCID, compartment name, target database name, target database version, assessment date and time, schedule, name, and name of the baseline assessment.
5. Scroll down and view the Assessment details section.
This section shows you all the findings for each risk category. Risks are color-coded to help you easily identify categories that have high-risk findings (red).
Under Filters by risks on the left, you can select the risk levels that you want displayed. Also, you can filter by reference security standards.
6. Expand categories and review the findings.
In this demo, the Transparent Data Encryption finding is low risk (orange) and has three references.
Task #3: Adjust Finding Risk Level
You can defer or change the risk level of a risk finding. In this demo, we will defer the Users with Unlimited Concurrent Sessions risk finding.
1. Click the pencil icon for the Users with Unlimited Concurrent Sessions finding.
2. In the Update risk for finding panel, select Defer risk. Optionally, enter a justification and set an expiration date. Click Save. Notice that the risk finding is recategorized in the Assessment details section.
Setting an expiration date is optional. Upon expiry, the next assessment resumes evaluating the finding and displays it as found. With no expiration date, the risk finding is deferred indefinitely.
Task #4: Set the latest Assessment as a Baseline
1. At the top of the Assessment report page, click Set as baseline. Click Yes to confirm.
Task #5: Create a risk on the Target Database
1. Access the SQL worksheet in Database Actions of your Autonomous AI Database.
2. As ADMIN, execute the following grant command.
grant ALTER ANY ROLE to PUBLIC;
Task #6: Refresh the latest Security Assessment and analyze the results
1. At the top of the latest security assessment report page, click Refresh now to get the latest data. The Refresh now panel is displayed. Leave the default name as is, and click Refresh now. Wait for the status to read as SUCCEEDED.
2. Click the Assessment information tab. Notice that the assessment date and time is right now, and that Complies with baseline is equal to No.
3. Scroll down and expand the Finding System Privileges Granted to PUBLIC. Notice this is a high-risk finding.
Task #7: Compare the new Assessment with the Baseline
1. With the latest security assessment displayed, under Resources on the left, click Compare with baseline.
2. From the Baseline drop-down list, select your baseline. Click Compare.
3. When the comparison operation is completed, scroll down the page to the Comparison with baseline section and review the information.
- You can identify where the changes have occurred on your target database by viewing cells that contain the word Modified. The number represents the total count of new, remediated, and modified risks on the target database.
- In the details table, you can view the risk level for each finding, the category to which the finding belongs, the finding name, and a description of what has changed on your target database. The Comparison Report column is important because it explains what is changed, added, or removed from the target database since the baseline report was generated.