Oracle Database Licensing · Database Vault Option

Oracle Database Vault Licensing: Separation of Duties, Privilege Analysis & the $47,500 Per-Processor Compliance Trap

Oracle Database Vault is the database option that controls what privileged users — including DBAs with SYSDBA rights — can actually do inside the database. At $47,500 per processor (perpetual list), it is Oracle's most expensive standalone database option. The compliance trap is that Database Vault's Privilege Analysis component, which many security-conscious DBAs enable specifically to understand what privileges are actually being used, is itself a Database Vault licensed feature. Enterprises that enable Privilege Analysis as a security hygiene exercise — not realising it requires a Database Vault licence — receive Oracle audit claims that can exceed $2M for a modest Oracle estate. Former Oracle insiders explain what Database Vault covers, how it is detected, and how to defend against inadvertent-enablement audit claims.

📅 March 2026 ⏱ 13 min read 🏷 Oracle Database · Security · Audit Defence · Database Vault
Audit Defence Service → Compliance Review

What Oracle Database Vault Covers

Oracle Database Vault is an Enterprise Edition database option that enforces access controls above and beyond Oracle's standard privilege and role model. Its primary purpose is to prevent privileged database users — including users with SYSDBA, DBA, or system administrator roles — from accessing application data that they technically have permission to view but should be restricted from in the context of separation-of-duties requirements.

The core components of Oracle Database Vault are:

Oracle Database Vault: Core Components

  • Realms — logical protection zones applied to schemas, objects, or roles; restrict access even for users with database administrative privileges; DBAs cannot SELECT from realm-protected schemas without explicit realm authorisation
  • Command Rules — policy-based controls on SQL commands; restrict who can execute DDL (CREATE TABLE, ALTER USER), DML (INSERT, UPDATE, DELETE), or system commands based on factors like time of day, IP address, or session attributes
  • Rule Sets — collections of rules that can be associated with realms and command rules; evaluate conditions such as whether a user is connecting from an approved IP range or during a permitted maintenance window
  • Secure Application Roles — roles that can only be enabled by authorised applications; prevents privilege escalation through role-based access outside of the intended application context
  • Simulation Mode — allows Database Vault policies to be tested without enforcement; records what would have been blocked without actually blocking access; used during deployment validation
  • Privilege Analysis — tracks what privileges and roles have actually been used by each database user and application; generates reports showing unused privileges that can be revoked to reduce the attack surface (separately discussed below)

Oracle Database Vault also includes the Database Vault Administrator (DVA) application, a web-based interface for managing realms, rules, and policies. The DVA is accessed through Oracle Enterprise Manager or as a standalone APEX application within the database.

$47,500 Database Vault perpetual list price per processor
$10,450 Annual support per processor at Oracle's 22% rate
$190,000 Database Vault perpetual cost for 4-processor EE database

Privilege Analysis: The Most Dangerous Component for Compliance

Oracle Privilege Analysis is the Database Vault component that creates the most frequent inadvertent compliance exposure. It is a feature that security teams and DBAs actively want to use — and which Oracle's own security documentation recommends as a privilege hygiene tool — but it requires a Database Vault licence to operate.

Privilege Analysis works by capturing privilege usage data during a defined capture period. The DBA creates a capture policy, specifies the scope (the entire database, specific schemas, or specific role usage), and enables the capture. Oracle then records every privilege and role that is used during the capture period, along with which user or application used it. At the end of the capture period, the DBA reviews a report showing which granted privileges were actually used and which were never exercised — the unused privileges can then be safely revoked, reducing the attack surface.

This workflow is exactly what security frameworks like CIS Benchmarks, PCI DSS's principle of least privilege, and SOX general IT controls recommend. Security-conscious DBAs who implement it without knowing that Privilege Analysis is a Database Vault licensed feature expose their organisation to a licence claim at $47,500 per processor for the full duration of any capture period — regardless of whether any Database Vault realms, command rules, or enforcement capabilities were ever configured.

Oracle Audit Warning: Oracle's LMS audit scripts detect Privilege Analysis usage through the DV$POLICY_OBJECT, DVSYS schema presence, and dba_feature_usage_statistics entries for "Privilege Analysis." Oracle does not distinguish between "we used Privilege Analysis but not the enforcement components" — the mere presence of Privilege Analysis usage in the feature usage data is treated as a Database Vault Option usage event, triggering the full $47,500/processor list price assertion.

Database Vault Pricing and Licence Structure

Oracle Database Vault is licensed as an Enterprise Edition option on the Processor metric. It cannot be licensed on a Named User Plus (NUP) metric. The perpetual list price is $47,500 per processor — the same per-processor price as Oracle Database Enterprise Edition itself. Annual Oracle support is approximately $10,450 per processor at the 22% support rate.

Database Vault must be licensed for each processor in the database host that runs Oracle Database EE with any Database Vault component enabled. This means that if a four-processor server runs Oracle Database EE and any Database Vault feature has been used, Oracle asserts four Database Vault processor licences — $190,000 in perpetual licences and $41,800 per year in support.

For enterprises with large Oracle Database estates — 20, 50, or 100+ processors across multiple database servers — Database Vault audit claims can reach $1M–$5M before any negotiation. Oracle's LMS team is aware that these claims are large enough to motivate enterprise licence deal closures, which is why Database Vault audit findings frequently appear alongside Oracle sales engagement discussions about EA or ULA structures.

Understanding this dynamic is essential to defending against Oracle Database Vault audit claims. Our Oracle Audit Defence team has represented enterprises in situations where Oracle's audit claim included Database Vault findings that were then used as leverage to push an EA renewal. In every such case, separating the audit defence from the commercial negotiation — and challenging the Database Vault findings on their technical merits — produced significantly better outcomes than accepting Oracle's combined audit-and-deal proposal.

Oracle's LMS Team Found Database Vault Usage in Your Environment?

Oracle's audit claim may be significantly overstated. Our Audit Defence service reviews the technical evidence, challenges Oracle's detection methodology, and quantifies your defensible position before you engage Oracle's settlement team.

Challenge the Claim →

How Oracle LMS Detects Database Vault Usage

Oracle's LMS audit scripts detect Database Vault usage through multiple mechanisms in the Oracle data dictionary. The detection is comprehensive — Oracle's scripts look for evidence of Database Vault installation, Privilege Analysis execution, and any historical activation of Database Vault components:

Oracle LMS Database Vault Detection Points

  • DVSYS schema presence — the Database Vault schema (DVSYS) is created in the database when Database Vault is installed; its presence is detected regardless of whether any policies have been created
  • dba_feature_usage_statistics — records feature usage for "Oracle Database Vault" and "Privilege Analysis" with first-use date, last-use date, and usage count; Oracle uses this data to assert the licence obligation from the first recorded usage date
  • DBA_DV_STATUS view — indicates whether Database Vault is enabled (ENABLED or DISABLED); a DISABLED status does not eliminate Oracle's historical usage claim if dba_feature_usage_statistics shows prior usage
  • CAPTURE$ and CAPTURE_RUN$ tables in DVSYS — contain records of Privilege Analysis capture policies and their execution history; directly evidences Privilege Analysis usage
  • Oracle Enterprise Manager repository — if OEM monitoring agents are deployed, Oracle's USMM may also capture Database Vault configuration data from the OEM repository

The most important detection point from a defence perspective is dba_feature_usage_statistics. This view records Oracle feature usage on a 60-day sampling basis, but the FIRST_USAGE_DATE and LAST_USAGE_DATE columns capture the historical window of use. Oracle's audit claim will be calculated from FIRST_USAGE_DATE — which may be years in the past for organisations where a DBA briefly enabled Privilege Analysis and then forgot about it.

Challenging Oracle's historical Database Vault claims requires demonstrating either that the feature usage statistics data was inaccurate, that the specific features used fell outside the Database Vault licence requirement, or that the usage occurred during a period where an applicable licence entitlement covered the environment (for example, during a ULA term). Our Oracle Audit Defence team performs forensic analysis of FIRST_USAGE_DATE data against historical licence positions in every Database Vault engagement.

The Inadvertent Enablement Trap: How Database Vault Gets Installed Without Intent

Oracle Database Vault's inadvertent enablement problem stems from three common scenarios that security and DBA teams encounter in normal operating conditions:

Scenario 1: Database Vault installed as part of default Oracle installation. In certain Oracle Database installation configurations — particularly when installing from Oracle's full installation media or when database templates with security profiles are selected — Oracle Database Vault is installed and the DVSYS schema is created even if the administrator did not specifically request it. The presence of DVSYS is enough for Oracle's LMS scripts to flag Database Vault installation, even if nothing was ever configured.

Scenario 2: Privilege Analysis enabled by security team following Oracle's own recommendations. Oracle's security hardening documentation and the CIS Oracle Database Benchmark explicitly describe Privilege Analysis as a tool for implementing least-privilege access control. Security teams following these recommendations enable Privilege Analysis capture policies without realising it requires a Database Vault licence. The usage records in dba_feature_usage_statistics then surface during an Oracle audit.

Scenario 3: Database Vault installed in non-production environments shared with production audit data. Some enterprises install Oracle Database Vault in development or test environments to test Database Vault policies before production deployment. If Oracle's USMM audit scripts are run across all environments — including dev/test — Database Vault usage in non-production may be included in Oracle's audit claim if the USMM output is not carefully reviewed before submission to Oracle's LMS team.

Before Submitting USMM Output to Oracle LMS: Every USMM output package should be reviewed by an independent Oracle licensing expert before it is provided to Oracle's LMS team. Database Vault usage in non-production environments, transient Privilege Analysis captures, and DVSYS schema presence without any policy configuration are all items that can inflate Oracle's audit claim. Our Audit Defence team reviews USMM output before submission as part of standard audit defence engagement scope.

Challenging Oracle Database Vault Audit Claims: The Defence Framework

Oracle Database Vault audit claims are among the most defensible of Oracle's database option findings, for several reasons: the inadvertent enablement scenarios are common and documentable; the gap between DVSYS installation and functional Database Vault use is genuine and technically demonstrable; and Oracle's own installation documentation has, at various points, been ambiguous about when Database Vault installation triggers a licence requirement.

A structured Database Vault audit defence follows this framework:

  • Evidence collection: Extract dba_feature_usage_statistics data, DVSYS schema creation timestamps, Privilege Analysis capture records, and Database Vault enablement history. Map these against the USMM data Oracle received.
  • Functional use analysis: Distinguish between Database Vault installation (DVSYS schema present) and functional Database Vault use (realms configured, command rules active, Privilege Analysis captures executed). Oracle's licence obligation is triggered by functional use — the defensible argument is narrowing "use" to features that require the option.
  • Privilege Analysis scope challenge: If the claim is solely for Privilege Analysis usage, challenge whether Oracle's contractual definition of Database Vault Option encompasses Privilege Analysis as a separately triggered element or as a component that requires all Database Vault features to be in active use.
  • Non-production exclusion: Identify any Database Vault usage that occurred exclusively in development, test, or DR environments that may be excludable under your Master Agreement's non-production licence terms.
  • Historical licence mapping: Review whether any ULA, EA, or licence agreement in effect during the period of alleged Database Vault usage might have covered the option. Some enterprise agreements include Database Vault in a broader security option bundle.

The Healthcare: Compliance Remediation case study documents an engagement where Oracle's initial Database Vault audit claim of $3.2M was reduced to $480,000 through functional use analysis that demonstrated Privilege Analysis captures had occurred in a test environment only, and that production Database Vault usage had been enabled for less than 90 days before being decommissioned following a security architecture review.

Proactively Review Your Oracle Database Vault Position

Before Oracle's LMS team arrives, our Oracle Compliance Review identifies Database Vault usage across your estate, documents functional use versus installation, and establishes the defensible position — giving you control of the narrative in any subsequent audit.

Get Compliance Review →

Database Vault for Regulatory Compliance: PCI DSS, SOX & GDPR

Oracle Database Vault has genuine regulatory compliance value — it is one of the most effective technical controls for demonstrating separation of duties for privileged access to sensitive databases. PCI DSS Requirement 7 (restrict access to system components and cardholder data by business need-to-know) and SOX ITGC (IT General Controls) requirements for privileged access management are both strengthened by Database Vault's realm and command rule capabilities.

For organisations where Database Vault is genuinely required by regulatory compliance obligations, the licence cost — while significant — must be evaluated against the risk of non-compliance with the underlying regulation and the cost of alternative technical controls. Our Oracle Licence Optimisation advisory has conducted TCO analyses for enterprise clients considering Database Vault acquisition versus alternative privileged access management solutions, and the comparison is not always straightforward. Database Vault's native integration with Oracle Database makes it technically superior to external PAM solutions for specific Oracle use cases, but the per-processor perpetual cost model creates a significant ongoing cost.

The regulatory compulsion argument — similar to the one deployed in Oracle ASO/TDE audit defences — is relevant for Database Vault claims where the usage was driven by a regulatory audit finding or external security assessment that specifically required separation-of-duties controls at the database level. Document the regulatory requirement and the security assessment finding that drove the Database Vault deployment; this documentation forms part of a proportionality defence in Oracle audit settlement negotiations.

Resolving Database Vault Exposure Through Commercial Negotiation

For enterprises with genuine Database Vault usage that cannot be challenged on technical grounds, negotiating the settlement or forward licence purchase is the primary remediation path. Database Vault is rarely purchased as a standalone option — Oracle's preference is to include it in a broader database option bundle (Oracle Database Security Pack) or as part of an EA structure.

Oracle's Database Security Pack typically bundles Database Vault, Advanced Security Option, Data Masking and Subsetting Pack, and Database Lifecycle Management Pack at a combined price significantly below purchasing each option individually. For organisations that genuinely use multiple security-related database options, the Security Pack pricing can represent 30–40% savings versus individual option procurement.

In EA negotiations where Database Vault is included as a new entitlement — for example, resolving an audit finding through the EA structure — Oracle's standard audit resolution discount for Database Vault ranges from 50–65% off list price when the customer has credible technical challenges to Oracle's audit claim and when the negotiation is conducted with appropriate preparation. Our Oracle Contract Negotiation advisory has resolved Database Vault audit findings at an average of 57% below Oracle's initial settlement offer when independent technical analysis was used to challenge the scope and duration of Oracle's claim.

Key Takeaways

  • Oracle Database Vault is priced at $47,500 per processor — the same as Oracle Database EE itself — making it one of the most expensive database options in Oracle's portfolio
  • Privilege Analysis is a Database Vault licensed component; enabling it for security hygiene purposes without a Database Vault licence creates audit exposure from the first usage date recorded in dba_feature_usage_statistics
  • Oracle's LMS scripts detect Database Vault through DVSYS schema presence, dba_feature_usage_statistics entries, and Privilege Analysis capture records — historical usage from the FIRST_USAGE_DATE forms the basis of Oracle's audit claim
  • Inadvertent enablement is common: Database Vault is installed as part of default Oracle installation configurations; security teams enable Privilege Analysis following Oracle's own security recommendations without knowing it requires a licence
  • Database Vault audit claims are among the most defensible database option findings — functional use analysis, non-production exclusions, and historical licence mapping regularly reduce Oracle's initial claim by 40–70%
  • Review all USMM output with an independent expert before submitting to Oracle's LMS team — Database Vault evidence in USMM packages should be understood and documented before Oracle builds its audit claim

Oracle Audit Defence Manual

Complete guide to defending Oracle audit claims — including database option findings, LMS script analysis, evidence frameworks for challenging Oracle's audit methodology, and negotiation tactics for back-licence settlements.

Download Free Guide →
Oracle Licensing Intelligence

Database Options Compliance Briefings

Oracle's database option audit activity is increasing — Database Vault, ASO, Diagnostics Pack, and Partitioning findings are at multi-year highs. Stay informed with our weekly Oracle licensing intelligence newsletter.

No spam. Unsubscribe anytime. Not affiliated with Oracle Corporation.

Oracle Licensing Experts Team — Former Oracle executives, LMS auditors, and contract managers with 25+ years of Oracle licensing experience, now working exclusively on the buyer side. Not affiliated with Oracle Corporation. Learn about our team →

Free Research

Download our Oracle OCI Licensing Guide — expert analysis from former Oracle insiders, 100% buyer-side.

Download the OCI Licensing Guide →