Last updated on MAY 14, 2015
Applies to:Oracle Database - Enterprise Edition - Version 220.127.116.11 and later
Information in this document applies to any platform.
To protect "ghost" data in TDE tablespace stored in ASM disk group.
RAC Database with ASM, tables are required to move from a regular tablespace to a transparent data encryption (TDE) tablespace. When an OS command "strings" is performed on the ASM Disks, sensitive data from the original tablespace is visible. OS files can be shredded but ASM files do not have a shred option.
What is method for destroying "ghost" copies from the original tablespace in ASM
Sign In with your My Oracle Support account
Don't have a My Oracle Support account? Click to get started
My Oracle Support provides customers with access to over a
Million Knowledge Articles and hundreds of Community platforms