What Is Oracle Database Vault?
Oracle Database Vault is a security option for Oracle Database Enterprise Edition that creates a controlled access environment within the database itself. It operates at the database layer to enforce fine-grained access control policies that prevent even privileged users—including database administrators with SYSDBA rights—from accessing sensitive application data without explicit authorization.
Database Vault addresses a critical compliance challenge: the "trusted administrator" problem. Organizations must grant DBAs extensive privileges to manage database infrastructure, backup, recovery, patching, and performance tuning. However, the same privileges that allow DBAs to perform legitimate administration also allow them to bypass application-level security and access sensitive data directly. Database Vault separates administrative privileges from data access privileges, creating a security boundary that application-layer controls cannot achieve.
The solution is particularly valuable for organizations handling regulated data—payment card information, health records, financial statements, personal data—where compliance requirements mandate that system administrators cannot access sensitive data without additional authorization layers.
The Trusted Administrator Problem
Traditional Oracle Database security grants administrative roles based on the principle of least privilege: DBAs receive SYSDBA or SYSOPER roles, which grant complete access to all database objects. Security at the application layer—views, row-level security (RLS), column-level encryption—depends on the assumption that the DBA respects the boundary and does not use administrative privileges to bypass these controls.
Compliance audits, however, identify the DBA as a significant risk. An insider threat—whether malicious or accidental—can execute a query like SELECT * FROM customers WHERE id = 12345 to extract cardholder data, even if the application layer restricts this query. No application-layer control can prevent this because the DBA operates below the application layer.
Database Vault changes this model by enforcing security policies at the database layer itself, ensuring that even administrative access cannot bypass defined security boundaries.
Oracle Database Vault Pricing and Licensing Metrics
Database Vault is a separately licensed option that requires both the base Enterprise Edition licence and an additional Database Vault licence. Understanding the pricing structure and licence matching rules is essential for accurate cost planning.
List Pricing
Oracle publishes the following list prices for Database Vault:
- $11,500 per Processor (annual licence): Applies when the database is licensed using the Processor licence metric. Organizations must purchase one Database Vault Processor licence for each processor licence held for the database.
- $230 per Named User Plus (annual licence): Applies when the database is licensed using the Named User Plus (NUP) metric. Organizations must purchase one Database Vault NUP licence for each NUP licence held for the database.
These are list prices only. In enterprise negotiations, Database Vault is typically discounted 50 to 70 percent below list, particularly when included in broader Oracle contract negotiations.
The Critical Licence Matching Rule
Oracle enforces a strict one-to-one matching rule: Database Vault licences must exactly match the database licensing metric and quantity.
If an organization holds 16 Processor licences for Oracle Database Enterprise Edition, it must purchase exactly 16 Processor licences for Database Vault. If the organization instead holds 5,000 Named User Plus licences for the database, it must purchase 5,000 Database Vault NUP licences.
Critically, organizations cannot mix metrics. If the database is licensed under the Processor metric, Database Vault must also be licensed under the Processor metric. A Processor-licensed database cannot use Named User Plus Database Vault licences, and vice versa.
Annual Support Costs
Database Vault licence fees do not include support. Oracle charges annual support at 22 percent of the net licence fee, with an 8 percent annual compounding increase in year 2 and beyond.
For a 16-processor Database Vault deployment at $11,500 per processor:
- Licence cost: 16 × $11,500 = $184,000 per year
- Year 1 support: $184,000 × 0.22 = $40,480
- Year 2 support: $40,480 × 1.08 = $43,718 (8% increase)
- Year 3 support: $43,718 × 1.08 = $47,216 (8% increase)
- Year 4 support: $47,216 × 1.08 = $50,993 (8% increase)
The 8 percent annual support increase is compounding, meaning support costs escalate significantly over the life of the licence.
Core Features of Oracle Database Vault
Database Vault enforces security through four primary mechanisms: Realms, Command Rules, Factors, and Separation of Duties. Understanding these features is essential for evaluating whether Database Vault meets an organization's compliance requirements.
Realms: Protection Zones Around Database Objects
A Realm is a protection zone around one or more database objects (schemas, tables, views, procedures). Once an object is placed within a Realm, access to that object is restricted to explicitly authorized users and roles, regardless of their system privileges.
For example, an organization might create a Realm called HR_SENSITIVE that includes the EMPLOYEES, SALARIES, and BENEFITS tables. Once these tables are within the Realm, even a user with SYSDBA privileges cannot SELECT, INSERT, UPDATE, or DELETE data within the Realm without explicit Realm authorization.
Realms are transparent to authorized application connections. An application user with the proper Realm authorization can execute queries normally. The Realm only blocks unauthorized access—including administrative access.
Command Rules: Conditional Restrictions on Database Commands
Command Rules allow organizations to restrict which database commands can be executed, who can execute them, and under what conditions. Rules can be configured based on multiple criteria, such as:
- Command type: ALTER TABLE, DROP TABLE, CREATE USER, GRANT, REVOKE, etc.
- User identity: Only specific roles or users can execute the command
- Time of day: Commands are allowed only during business hours or maintenance windows
- Client IP address: Commands are allowed only from specific networks or addresses
- Application name: Commands are allowed only when executed from specific applications
- Authentication method: Commands are allowed only for users authenticated via specific mechanisms (password, certificate, etc.)
For example, an organization can create a Command Rule that prevents CREATE USER commands from executing outside the change control window (e.g., only during Saturday 10 PM to 6 AM) and only from specific IP addresses where change control is performed.
Factors: Contextual Information for Access Decisions
Factors are pieces of contextual information about the database session that can be used to make access control decisions. Database Vault provides predefined factors such as:
- User Identity: The database user executing the command
- IP Address: The network address from which the connection originates
- Authentication Method: How the user authenticated (password, Kerberos, certificate, etc.)
- Session Program: The application or tool initiating the database session
- Host Name: The server name from which the connection originates
Organizations can also define custom factors to include business-specific information, such as whether a specific approval has been granted for a particular change.
Separation of Duties: Role Fragmentation for Security
Database Vault introduces three new roles that fragment the traditional DBA function:
- DV_OWNER: The security administrator who designs and manages Database Vault security policies, Realms, and Command Rules. This role is not responsible for infrastructure management.
- DV_ACCTMGR: The account manager responsible for creating, modifying, and removing database user accounts. Once Database Vault is enabled, only DV_ACCTMGR can create new users; standard SYSDBA users cannot.
- Traditional DBA: Retains infrastructure responsibilities (backup, recovery, patching, performance tuning) but loses direct access to application data through administrative privileges. The DBA executes administrative commands but cannot use those privileges to access data within protected Realms.
This separation ensures that no single role has both administrative privileges and unrestricted data access, reducing the attack surface for insider threats.
What Database Vault Prevents
Database Vault enforcement creates specific restrictions on what privileged users can do without additional authorization:
Unauthorized Data Access by DBAs
The primary use case: a DBA with SYSDBA cannot execute SELECT, INSERT, UPDATE, or DELETE commands on data within a protected Realm without explicit authorization. An attempt to query a protected table returns an error.
Unauthorized Schema Changes
Command Rules can prevent ALTER TABLE, DROP TABLE, CREATE INDEX, and other DDL commands from executing on protected objects, restricting these operations to explicitly authorized users (typically application deployment teams).
Unauthorized Account Creation
Once Database Vault is enabled, the DV_ACCTMGR role is the only role that can create new database user accounts. Standard SYSDBA users cannot create accounts, preventing unauthorized user provisioning.
Unauthorized Grant Operations
Command Rules can restrict GRANT and REVOKE commands, ensuring that privilege changes go through formal change control rather than ad hoc DBA decisions.
What Database Vault Does NOT Prevent
Understanding Database Vault's limitations is equally important for proper implementation:
Authorized Application Users
Database Vault applies access controls at the database layer. Application users with the proper Realm authorization can access protected data normally. Realms do not prevent application access; they restrict who can access data outside the application.
Database Backups
Oracle Recovery Manager (RMAN) backups work normally with Database Vault enabled. A backup administrator can back up the entire database, including protected Realms, because backup is a legitimate administrative function. However, data within protected Realms in the backup remains protected; a user cannot restore the database and then bypass Realms because the Realm configuration remains in place.
Data Pump Exports
Oracle Data Pump exports work normally, provided the user performing the export has Realm authorization to access the data. An authorized DBA or account manager can export data from protected tables. However, an unauthorized user cannot export protected data.
Oracle's Own Support Tools
Oracle Support representatives can access the database to diagnose issues because Oracle has built mechanisms to bypass Database Vault in support scenarios. This is a documented feature, not a security gap.
Physical Database Access
Database Vault does not prevent direct file system access to database files, nor does it prevent operating system privilege escalation. Database Vault is a database-layer security control; it does not protect against physical access, kernel-level attacks, or operating system compromise.
Need help evaluating Database Vault ROI for your compliance requirements?
We've implemented licensing strategies for 500+ Oracle deployments.Database Vault: Enterprise Edition Only
A critical licensing constraint: Oracle Database Vault is available exclusively with Oracle Database Enterprise Edition. It cannot be used with Standard Edition 2 (SE2), Standard Edition (SE), or any other edition below Enterprise Edition.
Why EE Only?
Oracle positions Database Vault as a premium security feature available only in the highest-tier database edition. Organizations running Standard Edition cannot enable Database Vault, regardless of their compliance requirements or security architecture needs.
This creates a licensing decision point: organizations requiring Database Vault must license Enterprise Edition for the entire database, not just for the schemas requiring protection. A database with one small protected Realm requires EE+ Database Vault for all schemas, tables, and objects in the database.
Licence Cost Implications
The edition requirement significantly impacts total licensing cost. For organizations considering Database Vault deployment, the decision should weigh not only the $11,500 per-processor Database Vault cost but also the cost differential between Standard Edition 2 and Enterprise Edition for the same database.
Compliance Use Cases for Database Vault
Database Vault is most commonly deployed in organizations subject to strict data protection and access control regulations. Key compliance drivers include:
PCI-DSS (Payment Card Industry Data Security Standard)
PCI-DSS requirement 2.2.4 mandates restricting access to cardholder data based on "need to know" and restricting direct access to cardholder data to the personnel whose job functions require such access. Requirement 7.1 further states that personnel must have access restricted to database resources (tables, stored procedures) they need for their role.
Database Vault directly addresses this requirement by preventing DBAs from bypassing application-layer access controls to directly query cardholder databases. A Realm around the PCI data tables ensures that even DBAs with SYSDBA cannot SELECT cardholder records without explicit authorization.
HIPAA (Health Insurance Portability and Accountability Act)
HIPAA's Security Rule requires access controls that ensure only authorized personnel can access electronic protected health information (ePHI). Database Vault prevents DBAs and system administrators—who are not authorized to access patient data—from using administrative privileges to view ePHI.
HIPAA compliance audits specifically examine this risk: Can the DBA see patient records? Database Vault allows organizations to answer definitively: No, and we can demonstrate this through Realm definitions.
SOX (Sarbanes-Oxley Act)
SOX section 404 requires effective internal controls over financial reporting. When financial data is stored in Oracle databases, access controls must prevent unauthorized changes. Database Vault's Command Rules can restrict who can modify financial tables and under what conditions, supporting SOX compliance documentation.
GDPR (General Data Protection Regulation)
GDPR article 32 requires implementing appropriate technical and organizational measures to ensure data security. GDPR audits specifically examine whether administrators can access personal data of EU residents. Database Vault addresses this requirement by preventing DBAs from accessing GDPR-protected personal data without authorization.
FedRAMP and Government Security Requirements
Federal agencies and contractors subject to FedRAMP require separation of duties and access controls that prevent system administrators from accessing classified or controlled information. Database Vault meets this requirement through its DV_OWNER, DV_ACCTMGR, and traditional DBA role separation.
Database Vault and Multi-Tenancy (CDB/PDB Architecture)
In Oracle's Multitenant architecture, Database Vault can be enabled at either the Container Database (CDB) level or at individual Pluggable Database (PDB) levels, with significantly different implications for licensing and administration.
CDB-Level Database Vault
When Database Vault is enabled at the CDB level, its policies apply globally across all PDBs within the Container. This model is appropriate for organizations where a single security team manages all PDBs and requires uniform security policies across the database environment.
A single Database Vault licence at the CDB level applies to the entire CDB architecture. From a licensing perspective, this is the most efficient approach.
PDB-Level Database Vault
When Database Vault is enabled at individual PDB levels, each PDB has its own separate Realm and Command Rule definitions, allowing different security policies for different PDBs. This is particularly valuable in Database-as-a-Service (DBaaS) environments where different customers or business units operate separate PDBs and require independent security governance.
Important licensing consideration: Each PDB with Database Vault enabled requires separate Database Vault licences. If an organization runs 10 PDBs and enables Database Vault in 8 of them, 8 full Database Vault licences must be purchased (at 1:1 ratio to database licences).
Database Vault on Active Data Guard
Organizations deploying Oracle Data Guard for high availability often license Active Data Guard, which allows read-only access to the standby database while the primary continues to receive updates. Database Vault licensing on standby databases requires special attention.
Licensing Requirement
If Database Vault is enabled on the primary database and the standby database has Active Data Guard enabled (allowing read access), the standby database requires separate Database Vault licences. The rule is straightforward: the software is running on the standby, therefore it must be licensed.
In a single-processor primary database with Database Vault, if a standby is deployed with Active Data Guard, additional Database Vault licences are required for the standby, doubling the Database Vault cost for the deployment.
Cost Implication for High Availability
This requirement significantly impacts the cost of Database Vault in high-availability configurations. Organizations evaluating Database Vault should factor in the full licensing cost across all database instances: primary, standby, Data Guard, and any additional replicas.
Database Vault in Cloud Environments
Organizations deploying Oracle Database in cloud environments—AWS, OCI, or on-premises—face specific licensing and availability considerations for Database Vault.
Oracle Cloud Infrastructure (OCI)
Database Vault is available as a licensed option on OCI Database services. In some OCI service packages (particularly Oracle Autonomous Database with Advanced Security options), Database Vault may be included in the bundle, but this varies by service tier and should be verified in the OCI contract.
The same licensing rules apply: Database Vault requires matching licences (Processor or NUP) in exact one-to-one ratio to the database. Annual support at 22 percent of net licence fee applies.
AWS RDS for Oracle
Database Vault is available as an option on AWS RDS for Oracle Enterprise Edition. AWS requires customers to bring their own Oracle licences (BYOL) to use Database Vault, and Database Vault is separately licensed even within RDS.
A common compliance driver for RDS deployment: regulations require encryption and access controls that customers believe RDS provides. Database Vault adds an additional layer of access control at the database layer, complementing AWS security controls.
AWS EC2 with Oracle
Organizations running Oracle Database on EC2 instances can license Database Vault through standard Oracle licensing channels. The same Processor or NUP licensing metrics apply, and the same one-to-one matching rule is enforced.
Licensing Verification in Cloud
Oracle's License Management Services (LMS) collection tools operate in cloud environments identically to on-premises. The db_stat.sql and cpuq.sql scripts check V$OPTION for enabled options. If DV_ENABLE_STATUS = TRUE and no Database Vault licences are reported, Oracle will flag non-compliance.
Common Database Vault Licensing Mistakes
Based on enterprise audit findings, several licensing mistakes are frequent:
Mistake 1: Assuming Database Vault Is Included in Enterprise Edition
Organizations enable Database Vault on production databases under the assumption that Enterprise Edition includes all security features. This is incorrect. Database Vault is a separately licensed option, and enabling it without purchasing the corresponding licences creates audit exposure.
Mistake 2: Not Matching Licences Exactly
An organization might purchase 16 Processor licences for the database but only 8 Processor licences for Database Vault, assuming partial coverage. Oracle considers this non-compliance and will claim the full 16 Processor Database Vault licences during audit.
Mistake 3: Mixing Licensing Metrics
An organization might license the database under the Processor metric but attempt to license Database Vault under Named User Plus. Oracle does not permit this. The metrics must match exactly.
Mistake 4: Enabling Database Vault on RDS Without Purchasing the Licence
AWS RDS does not prevent DBAs from enabling Database Vault through ALTER SYSTEM or SQL commands. However, enabling it without purchasing licences creates immediate non-compliance. The feature can be enabled technically, but it must be licensed.
Mistake 5: Not Including Database Vault in Disaster Recovery and High Availability Licensing
Organizations purchase Database Vault licences for the primary database but forget to purchase for standby databases, particularly when Active Data Guard is enabled. Oracle audit findings often identify this gap.
Database Vault vs. Oracle Label Security
Organizations evaluating Database Vault are sometimes confused by Oracle Label Security (OLS), a different, cheaper access control option. Understanding the distinction is important for selecting the right technology.
Pricing Comparison
Oracle Label Security is priced at $5,000 per Processor or $100 per Named User Plus—significantly cheaper than Database Vault at $11,500 per Processor or $230 per NUP.
Functional Differences
Label Security classifies data rows with labels (e.g., "PUBLIC", "CONFIDENTIAL", "SECRET") and restricts user access based on their clearance level for those labels. A user with a clearance level of "CONFIDENTIAL" can see all rows marked "PUBLIC" and "CONFIDENTIAL" but not "SECRET".
Database Vault, by contrast, protects entire database objects (tables, schemas, procedures) and restricts who can execute specific commands under specific conditions. It is not row-based; it is object and command-based.
Complementary Use
Label Security and Database Vault serve different purposes and can be used together. An organization might use Label Security to classify rows by sensitivity level and Database Vault to prevent DBAs from accessing the database at all without authorization. The two controls operate at different layers and complement each other.
Database Vault vs. Oracle Audit Vault and Database Firewall (AVDF)
Another common confusion: Database Vault is not the same as Oracle Audit Vault and Database Firewall (AVDF), which is a completely separate product for monitoring and auditing database activity.
AVDF Is Not Related to Database Vault Licensing
Oracle Audit Vault and Database Firewall is an enterprise auditing and monitoring platform that logs all database activity, detects anomalies, and enforces database firewall rules. It has its own licensing model and pricing, unrelated to Database Vault.
Database Vault is preventive control (access prevention), while AVDF is detective control (activity logging and monitoring). Organizations often deploy both, but they are licensed independently.
How Oracle Detects Unlicensed Database Vault
Oracle's License Management Services (LMS) collection scripts specifically check for Database Vault enablement:
- The db_stat.sql collection script queries V$OPTION to check if DV_ENABLE_STATUS is TRUE
- If DV_ENABLE_STATUS = TRUE and the organization has reported no Database Vault licences, Oracle flags this as non-compliance
- Oracle will calculate the full unlicensed period, from the date Database Vault was enabled until the audit date, and claim the full per-processor cost for that entire period
For a 16-processor database where Database Vault was enabled 18 months ago without licensing, Oracle would claim 18 months of unpaid Database Vault licences: 18 × (16 × $11,500) = approximately $3.3 million, plus interest and penalties.
Implementation Considerations and Best Practices
Database Vault is not simply installed and enabled. It requires careful planning and testing before production deployment.
Realm Design
Defining Realms requires understanding the database schema and identifying which tables, views, and procedures contain sensitive data requiring protection. Poorly designed Realms can block legitimate administrative operations, causing application outages.
Application Impact Testing
Before enabling Database Vault in production, extensive testing is required to ensure that all authorized application users can execute their intended queries. If a Realm prevents an application user from accessing required data, the application fails.
Command Rule Planning
Command Rules that are too restrictive can prevent legitimate administration. For example, a Command Rule that prevents all ALTER TABLE commands on production tables blocks legitimate performance tuning and may prevent critical security patches from being applied.
Separation of Duties Transition
Enabling the DV_ACCTMGR and DV_OWNER roles requires organizational changes. Traditional DBAs must transition to a role that does not include account creation or policy management. This requires clear communication and potentially new staffing or cross-training.
Documentation and Knowledge Transfer
Database Vault policies must be documented thoroughly, including the business justification for each Realm and Command Rule. Future administrators and auditors need clear documentation of what access controls exist and why they exist.
Database Vault Licensing Negotiation Strategy
Database Vault is typically discounted significantly in enterprise negotiations. The list price of $11,500 per processor rarely survives negotiation.
Discount Range
Enterprise customers typically negotiate 50 to 70 percent discounts on Database Vault when it is included in broader Oracle contract negotiations. A 16-processor deployment at 60 percent discount would cost approximately $73,600 per year instead of $184,000.
Negotiation Leverage
Database Vault should be included in broader Oracle contract negotiations, not purchased separately. Compliance requirements that mandate Database Vault should be presented as part of the overall database deployment cost discussion, providing negotiation leverage across the entire contract.
Oracle Fiscal Year Timing
Oracle's fiscal year ends May 31. Q4 (March through May) is typically the best negotiation window, when Oracle has quarterly quotas to meet and is most willing to negotiate aggressively.
Multi-Year Agreements
Organizations negotiating multi-year Oracle Unified Agreements (ULAs), Product-Level ULAs (PULAs), Oracle Cloud Services (OCS) agreements, or Cloud Services Infrastructure (CSI) agreements should explicitly include Database Vault quantities and pricing in the agreement terms. Negotiating Database Vault within a multi-year framework typically yields the best pricing.
Stay Current on Oracle Database Security Licensing
Oracle Database options, feature licensing, and compliance requirements evolve continuously. Subscribe to the Oracle Knowledge Hub for quarterly updates on Database security licensing and enterprise compliance strategy.
Key Takeaways and Action Items
Organizations evaluating or deploying Oracle Database Vault should focus on these critical points:
- Database Vault is separately licensed: Enterprise Edition does not include it. Enabling Database Vault without purchasing the licence creates audit exposure.
- Strict one-to-one matching is required: Database Vault licences must exactly match the database licensing metric (Processor or NUP) and quantity. Mismatches create non-compliance findings.
- Enterprise Edition only: Standard Edition cannot use Database Vault. Organizations requiring this feature must license Enterprise Edition for the entire database.
- Include cloud deployments in licensing plans: OCI, AWS RDS, and AWS EC2 Database Vault deployments require separate licences. High-availability configurations with standby or Active Data Guard require additional Database Vault licences.
- Plan for support costs: Annual support is 22 percent of net licence fee, increasing 8 percent annually. Support costs escalate significantly over multi-year deployments.
- Design and test thoroughly: Database Vault implementation requires careful Realm design, Command Rule planning, and extensive testing before production deployment to avoid blocking legitimate application access.
- Negotiate aggressively: Database Vault is typically discounted 50 to 70 percent in enterprise negotiations. Include it in broader Oracle contract discussions to maximize leverage.
- Audit compliance regularly: Oracle's LMS tools specifically check V$OPTION for Database Vault enablement. Confirm that reported Database Vault licences match the V$OPTION status and the database architecture.