ASM Disk File Contains Pre TDE Ghost Files Of Sensitive Data
(Doc ID 1995248.1)
Last updated on DECEMBER 28, 2019
Applies to:Oracle Database - Enterprise Edition - Version 126.96.36.199 and later
Oracle Database Cloud Schema Service - Version N/A and later
Oracle Database Exadata Cloud Machine - Version N/A and later
Oracle Cloud Infrastructure - Database Service - Version N/A and later
Oracle Database Exadata Express Cloud Service - Version N/A and later
Information in this document applies to any platform.
To protect "ghost" data in TDE tablespace stored in ASM disk group.
RAC Database with ASM, tables are required to move from a regular tablespace to a transparent data encryption (TDE) tablespace. When an OS command "strings" is performed on the ASM Disks, sensitive data from the original tablespace is visible. OS files can be shredded but ASM files do not have a shred option.
What is method for destroying "ghost" copies from the original tablespace in ASM
To view full details, sign in with your My Oracle Support account.
Don't have a My Oracle Support account? Click to get started!
In this Document