Privileged Access Control Foundations
The next three chapters are about privileged access control (PAC) applied to Oracle RDBMS. This chapter will outline the theoretical foundations underpinning PAC, as well as the business drivers justifying PAC projects. Practical implementations will be described in Chapter 13. Chapter 13 will also demonstrate generic security weaknesses of privileged access control implementations, before moving onto Chapter 14 and solutions for securing PAC installs.