Oracle & Tibero Database Integration
Overview
This integration collects database audit logs from Oracle Database and Tibero for privileged access monitoring, data exfiltration detection, and ISMS-P compliance. Oracle is widely used in Korean financial institutions and large enterprises, while Tibero (by TmaxSoft) is the leading Oracle-compatible database for Korean government systems under the domestic software mandate.
Supported versions: Oracle 19c/21c, Tibero 6/7
Prerequisites
- A KYRA MDR Collector installed and running (Installation Guide)
- DBA-level access on the Oracle or Tibero instance
- A scheduled script to export audit records (neither database supports native syslog output)
- Network connectivity from the database server to the collector on port 514
Configuration
Oracle Unified Audit (12c+)
Enable unified auditing and create a policy for sensitive tables:
ALTER SYSTEM SET AUDIT_TRAIL = DB, EXTENDED SCOPE=SPFILE;
CREATE AUDIT POLICY kyra_policy ACTIONS SELECT, INSERT, UPDATE, DELETE ON HR.EMPLOYEES, HR.DEPARTMENTS;AUDIT POLICY kyra_policy;Audit records are stored in DBA_UNIFIED_AUDIT_TRAIL.
Tibero Audit
ALTER SYSTEM SET AUDIT_TRAIL = DB;AUDIT SELECT, INSERT, UPDATE, DELETE ON schema.table;Audit records are stored in SYS.DBA_AUDIT_TRAIL.
Syslog Export Script
Since neither Oracle nor Tibero supports native syslog output, use a scheduled script to extract and forward audit records:
# Runs every 5 minutes via cron*/5 * * * * /opt/kyra/scripts/db-audit-to-syslog.shThe script queries the audit trail view, formats records, and sends them to the collector via syslog.
Collected Log Types
| Log Type | Security Use | Priority |
|---|---|---|
| Login failures (ORA-01017) | Brute force detection | High |
| SYS/SYSDBA access | Privileged account monitoring | Critical |
| Large SELECT operations | Data exfiltration detection | High |
| DDL changes (DROP, ALTER, TRUNCATE) | Schema tampering detection | High |
| Privilege changes (GRANT DBA) | Privilege escalation detection | Critical |
| DB Link creation | External data channel detection | High |
Troubleshooting
No Audit Records
- Verify auditing is enabled:
SHOW PARAMETER audit_trail(Oracle) or checkDBA_AUDIT_TRAIL(Tibero) - Confirm the audit policy is applied to the target tables
- Check the cron job is running:
crontab -l - Ensure the export script has database connectivity
High Storage Usage
- Unified audit trail can grow quickly; configure a retention policy
- Periodically purge old records:
DBMS_AUDIT_MGMT.CLEAN_AUDIT_TRAIL(Oracle)
For additional help, contact kyra@seekerslab.com.