Assign multiple layers of protection, within the limits of what can be managed, to ensure the security of the encryption keys. The combination of methods will be dependent on how and where the keys are stored. Use multiple layers of protection when storing keys with the data in a separate database. Employ wrapping to protect all code used to protect, generate keys for, or encrypt keys. If security dictates, hardware devices can be used for encryption key storage. Keys, at minimum, should follow password selection standards in areas of minimum length, use of special characters and non-dictionary words. NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.as manual verification is required to ensure Oracle Label Security is used where appropriate.
Solution
Use a virtual private database (VPD) to protect rows by implementing Oracle Label Security(OLS)