Automating HTML Sanitization in OBIEE: Securing BI Platforms Without Compromising Usability

Authors

  • Preeta Pillai BPUT University

DOI:

https://doi.org/10.47941/ijce.2920

Keywords:

OBIEE, HTML Sanitization, XSS, BI Security, Dashboard Automation, Metadata Protection, Bleach, HTML5lib

Abstract

As Business Intelligence (BI) platforms remain integral to enterprise operations, ensuring their security is a top priority. Platforms like Oracle Business Intelligence Enterprise Edition (OBIEE) are widely used for reporting and analysis but can carry risks from embedded HTML content. This paper presents a scalable and automated approach to mitigate Cross-Site Scripting (XSS) vulnerabilities within OBIEE reports and dashboards. We outline a detailed methodology involving catalog extraction, HTML tag parsing, sanitization using html5lib and bleach, and secure redeployment. Key findings indicate a substantial reduction in remediation time and XSS risk. The study also contributes to practice by offering a replicable DevSecOps integration pipeline. Its theoretical value lies in demonstrating a practical framework for balancing security with usability in enterprise BI systems. Real-world scenarios, technical architecture examples, and implementation guidance are provided.

Downloads

Download data is not yet available.

References

OWASP. "Cross Site Scripting (XSS)." Open Web Application Security Project, November 2020.

Oracle. "System Administrator's Guide for OBIEE 12c." Oracle Documentation, October 2020.

Google Developers. "Secure Coding Practices Guide." September 2020.

Gartner. "Market Guide for BI Security and Governance Tools." October 2020.

SANS Institute. "Best Practices in Defending Web Applications." November 2020.

Downloads

Published

2023-10-11

How to Cite

Pillai, P. (2023). Automating HTML Sanitization in OBIEE: Securing BI Platforms Without Compromising Usability. International Journal of Computing and Engineering, 4(4), 1–5. https://doi.org/10.47941/ijce.2920

Issue

Section

Articles