fusion apps security_con8714_pdf_8714_0001

93
1 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. Graphic Section Divider

Upload: jucaab

Post on 11-May-2015

376 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: Fusion apps security_con8714_pdf_8714_0001

1 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Graphic Section Divider

Page 2: Fusion apps security_con8714_pdf_8714_0001

2 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Fusion Applications Secure

Out of the Box

Nigel King, VP Fusion Applications

Functional Architecture

Page 3: Fusion apps security_con8714_pdf_8714_0001

3 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Safe Harbor Statement

"Safe Harbor" Statement: Statements in this press release relating to Oracle's or its Board of Directors’ future plans, intentions

and prospects are "forward-looking statements" and are subject to material risks and uncertainties. Many factors could affect

our current expectations and our actual results, and could cause actual results to differ materially. We presently consider the

following to be among the important factors that could cause actual results to differ materially from expectations: (1)

Economic, political and market conditions, including the recent global economic and financial crisis, could adversely affect our

business, operating results or financial condition, including our revenue growth and profitability, through reductions in

customer IT budgets and expenditures and through the general tightening of access to credit. (2) We may fail to achieve our

financial forecasts due to such factors as delays or size reductions in transactions, fewer large transactions in a particular

quarter, unanticipated fluctuations in currency exchange rates, delays in delivery of new products or releases or a decline in

our renewal rates for software license updates and product support. (3) We cannot assure market acceptance of new products

or services or new versions of existing or acquired products or services. (4) We have an active acquisition program and our

acquisitions may not be successful, may involve unanticipated costs or other integration issues or may disrupt our existing

operations. (5) Our international sales and operations subject us to additional risks that can adversely affect our operating

results, including risks relating to foreign currency gains and losses and risks relating to compliance with international and

U.S. laws that apply to our international operations. (6) Intense competitive forces demand rapid technological advances and

frequent new product introductions and could require us to reduce prices or cause us to lose customers. A detailed discussion

of these factors and other risks that affect our business is contained in our SEC filings, including our most recent reports on

Form 10-K and Form 10-Q, particularly under the heading "Risk Factors." Copies of these filings are available online from the

SEC or by contacting Oracle Corporation's Investor Relations Department at (650) 506-4073 or by clicking on SEC Filings on

Oracle’s Investor Relations website at http://www.oracle.com/investor. All information set forth in this release is current as of

October 7, 2009. Oracle undertakes no duty to update any statement in light of new information or future events.

Page 4: Fusion apps security_con8714_pdf_8714_0001

4 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Program Agenda

• About Fusion Applications Security

• Secure Out of the Box

• Demonstration: Chief Security Officer

• Q&A

Page 5: Fusion apps security_con8714_pdf_8714_0001

5 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Fusion Applications Security

Who Does What?

Role-Based Access

Reference Implementation

Oracle Identity Management

Role-Based Access + Comprehensive & Integrated Process

Page 6: Fusion apps security_con8714_pdf_8714_0001

6 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Fusion Applications

• Complete

• Open

• Integrated

• Best-in-class

Powered by Fusion Middleware

Page 7: Fusion apps security_con8714_pdf_8714_0001

7 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Fusion Security Delivers

Reduced

Risk

Reduced

Administrative Costs

Increased

Productivity

o Secure “Out of the Box” o Secure across tools and

transformations

o Secure across the

information lifecycle

o Integrated SOD Testing

o Self service provisioning

and automated on-boarding

o Transparent security

policies

o Standards based and

integrated security model

o Easier to make new

employees productive

o Regulatory compliance is

easier and cheaper

o Easier for management to

review and approve access

o Single sign on across apps

Page 8: Fusion apps security_con8714_pdf_8714_0001

8 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Fusion Applications Security The model is not so different…

• Yes, we externalized security to Fusion Middleware, LDAP and OPSS

• But we paid a lot of attention to the consistency in Fusion

E-Business Suite

Job Role

Data Role

Duty Role

Privilege

Permission

PeopleSoft

Top Level Menu

Employee ID + Role

Role(s)

Permission Lists

Executable

Top Level Menu

Responsibility

Sub Menu

Form Function

Executable

Page 9: Fusion apps security_con8714_pdf_8714_0001

9 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Program Agenda

• About Fusion Applications Security

• Secure Out of the Box

• Demonstration : Making a New Hire Productive

• Q&A

Page 10: Fusion apps security_con8714_pdf_8714_0001

10 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Secure Out of the Box

1. Role Based Access

2. Integration with Governance Risk and Compliance

3. Transparent Security Policies

4. Pervasive Privacy Protections

5. Secure Across the Information Lifecycle

6. Automated Workflows for Account and Role Provisioning

7. Enforcement Across Tools and Transformations

8. Comprehensive Reference Implementation

9. Complete Audit of Security Changes

10. Co-existing with your current Security Infrastructure

Page 11: Fusion apps security_con8714_pdf_8714_0001

11 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

You need to hire a “Procurement Manager”

for your German Operations…

Vision

Enterprises

Vision Germany Vision US

You have

Operations in

Germany & the US

Role Based Access

Page 12: Fusion apps security_con8714_pdf_8714_0001

12 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

1

1 2

2 3

3

4 4

4 4

All Duties assigned under Job Role

Job Posting FA Job Def Screen

Job Title Job Role

Line in Job Description Duty

Page 13: Fusion apps security_con8714_pdf_8714_0001

13 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Fusion Automatically Creates Business Unit

specific Roles

Job Role Data Role = Job + Data Access

Procurement Manager Procurement Manager – Germany

Procurement Manager – US

Page 14: Fusion apps security_con8714_pdf_8714_0001

14 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Meet Doris

She applies for the

job…

Page 15: Fusion apps security_con8714_pdf_8714_0001

15 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Doris is hired…

For doing the job she was hired for..

For doing what all employees do

•Expense Reports

• Purchase Requisitioner

Duty Roles

Job Roles

Procurement Manager

Buyer Mgt Duty

PO Changes Duty

Procurement

Manager -

Germany

Procurement

Manager -

US Data Roles

Duty Roles

Abstract Role

Employee

Enter Expenses Enter

Requisitions

Page 16: Fusion apps security_con8714_pdf_8714_0001

16 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

What can Doris do and view ?

Duties

Provide

Access to

Screens,

Reports,

Dashboards

Via

Privileges

Roles Provide

Access to data

behind the

screens

Via Data

Security

Page 17: Fusion apps security_con8714_pdf_8714_0001

17 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Doris Starts Using Fusion Apps

She starts work…

Sees only the Tasks she is entitled to.

Sees only data for Vision Germany.

Page 18: Fusion apps security_con8714_pdf_8714_0001

18 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Menu Items

Page 19: Fusion apps security_con8714_pdf_8714_0001

19 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Tasks

Page 20: Fusion apps security_con8714_pdf_8714_0001

20 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Buttons, Regions and Actions

20

Controls access to work areas, dashboards, task flows, reports, services

Page 21: Fusion apps security_con8714_pdf_8714_0001

21 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Segregation of Duties

(SOD)

respected during role

provisioning

you choose enforcement

Secure OOTB: Integration with GRC

Page 22: Fusion apps security_con8714_pdf_8714_0001

22 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Secure OOTB: Transparent Security Policies

Page 23: Fusion apps security_con8714_pdf_8714_0001

23 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Secure OOTB: Pervasive Privacy Protections

• Fusion Applications always protect personally identifiable

information (PII)

• PII = any piece of information which can potentially be used

to uniquely identify, contact, or locate a single person.

– Social Security Number (SSN)

– Driver’s license number

– State or National Identifier (Identification Card number)

– Passport Number

– Account number, credit card number (CCN) or debit card number

– Home or Physical address (e.g street address)

– Email address

– Telephone number

Page 24: Fusion apps security_con8714_pdf_8714_0001

24 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Secure OOTB: Secure Across Info Lifecycle

• Sensitive data in file system and backups (data-at-rest) protected using Transparent Data Encryption

• Sensitive data in cloned, non-production databases protected using Oracle Data Masking

• Sensitive data protected from database administrators and other privileged users using Oracle Database Vault

Page 25: Fusion apps security_con8714_pdf_8714_0001

25 Copyright © 2011, Oracle and/or its affiliates. All rights reserved.

Secure OOTB: Account & Role Provisioning

• Lower Risks

• Lower Costs

• Greater Productivity

Fusion HR System

Provisioning Approval Workflows

Employee Joins / Leaves

Applications

GRANT

REVOKE

GRANT

REVOKE

GRANT

REVOKE

Oracle Identity Manager

Risk

Compliance

Governance

Fusion GRC Controls

Page 26: Fusion apps security_con8714_pdf_8714_0001

26 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Secure OOTB: Enforcement Across Tools

• Defined Once. Used Everywhere.

• Same policies used across technologies

– ADF

– Enterprise Search

– Business Intelligence

– Reporting

– Mobile

– Web Services

Common Security Services

Page 27: Fusion apps security_con8714_pdf_8714_0001

27 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Secure OOTB: Reference Implementation

roles you will recognize

as jobs

hierarchy of duties

data security policies

SOD Policies

Provisioning Events Authorization Policy Manager

APM

to extend

new jobs

new duties

OOTB

Page 28: Fusion apps security_con8714_pdf_8714_0001

28 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Secure OOTB: Audit of Security Changes

• Who made what

changes, when

Manage Audit Policies

Oracle Platform Security Services

Page 29: Fusion apps security_con8714_pdf_8714_0001

29 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Secure OOTB: Co-existing with your current

Security Infrastructure

29

Identity Provider

Existing

Identity

Management

Infrastructure

Custom

Applications

Service Providers

authentication

Service access

Allows a user to log in once & access all

applications…

OID

Federation

Enabled

Applications

Unlimited

Page 30: Fusion apps security_con8714_pdf_8714_0001

30 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Secure Out of the Box

1. Role Based Access

2. Integration with Governance Risk and Compliance

3. Transparent Security Policies

4. Pervasive Privacy Protections

5. Secure Across the Information Lifecycle

6. Automated Workflows for Account and Role Provisioning

7. Enforcement Across Tools and Transformations

8. Comprehensive Reference Implementation

9. Complete Audit of Security Changes

10. Co-existing with your current Security Infrastructure

Page 31: Fusion apps security_con8714_pdf_8714_0001

31 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Program Agenda

• About Fusion Applications Security

• Secure Out of the Box

• Demonstration: Making a New Hire Productive

• Q&A

Page 32: Fusion apps security_con8714_pdf_8714_0001

32 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Demonstration

Page 33: Fusion apps security_con8714_pdf_8714_0001

33 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Security Flow

• Set up security profile

• Create data role

• Create role provisioning rule

• Create Employee

Page 34: Fusion apps security_con8714_pdf_8714_0001

34 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 35: Fusion apps security_con8714_pdf_8714_0001

35 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 36: Fusion apps security_con8714_pdf_8714_0001

36 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 37: Fusion apps security_con8714_pdf_8714_0001

37 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 38: Fusion apps security_con8714_pdf_8714_0001

38 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 39: Fusion apps security_con8714_pdf_8714_0001

39 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 40: Fusion apps security_con8714_pdf_8714_0001

40 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 41: Fusion apps security_con8714_pdf_8714_0001

41 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 42: Fusion apps security_con8714_pdf_8714_0001

42 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 43: Fusion apps security_con8714_pdf_8714_0001

43 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 44: Fusion apps security_con8714_pdf_8714_0001

44 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 45: Fusion apps security_con8714_pdf_8714_0001

45 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Security Flow

• Set up security profile

• Create data role

• Create role provisioning rule

• Create Employee

Page 46: Fusion apps security_con8714_pdf_8714_0001

46 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 47: Fusion apps security_con8714_pdf_8714_0001

47 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 48: Fusion apps security_con8714_pdf_8714_0001

48 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 49: Fusion apps security_con8714_pdf_8714_0001

49 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 50: Fusion apps security_con8714_pdf_8714_0001

50 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 51: Fusion apps security_con8714_pdf_8714_0001

51 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 52: Fusion apps security_con8714_pdf_8714_0001

52 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 53: Fusion apps security_con8714_pdf_8714_0001

53 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 54: Fusion apps security_con8714_pdf_8714_0001

54 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 55: Fusion apps security_con8714_pdf_8714_0001

55 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 56: Fusion apps security_con8714_pdf_8714_0001

56 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 57: Fusion apps security_con8714_pdf_8714_0001

57 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 58: Fusion apps security_con8714_pdf_8714_0001

58 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 59: Fusion apps security_con8714_pdf_8714_0001

59 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 60: Fusion apps security_con8714_pdf_8714_0001

60 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 61: Fusion apps security_con8714_pdf_8714_0001

61 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 62: Fusion apps security_con8714_pdf_8714_0001

62 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 63: Fusion apps security_con8714_pdf_8714_0001

63 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 64: Fusion apps security_con8714_pdf_8714_0001

64 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 65: Fusion apps security_con8714_pdf_8714_0001

65 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 66: Fusion apps security_con8714_pdf_8714_0001

66 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 67: Fusion apps security_con8714_pdf_8714_0001

67 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 68: Fusion apps security_con8714_pdf_8714_0001

68 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 69: Fusion apps security_con8714_pdf_8714_0001

69 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 70: Fusion apps security_con8714_pdf_8714_0001

70 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 71: Fusion apps security_con8714_pdf_8714_0001

71 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 72: Fusion apps security_con8714_pdf_8714_0001

72 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Security Flow

• Set up security profile

• Create data role

• Create role provisioning rule

• Create Employee

Page 73: Fusion apps security_con8714_pdf_8714_0001

73 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 74: Fusion apps security_con8714_pdf_8714_0001

74 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 75: Fusion apps security_con8714_pdf_8714_0001

75 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 76: Fusion apps security_con8714_pdf_8714_0001

76 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Security Flow

• Set up security profile

• Create data role

• Create role provisioning rule

• Create Employee

Page 77: Fusion apps security_con8714_pdf_8714_0001

77 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 78: Fusion apps security_con8714_pdf_8714_0001

78 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 79: Fusion apps security_con8714_pdf_8714_0001

79 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 80: Fusion apps security_con8714_pdf_8714_0001

80 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 81: Fusion apps security_con8714_pdf_8714_0001

81 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 82: Fusion apps security_con8714_pdf_8714_0001

82 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 83: Fusion apps security_con8714_pdf_8714_0001

83 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 84: Fusion apps security_con8714_pdf_8714_0001

84 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 85: Fusion apps security_con8714_pdf_8714_0001

85 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 86: Fusion apps security_con8714_pdf_8714_0001

86 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 87: Fusion apps security_con8714_pdf_8714_0001

87 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 88: Fusion apps security_con8714_pdf_8714_0001

88 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 89: Fusion apps security_con8714_pdf_8714_0001

89 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Fusion Security Delivers

Reduced

Risk

Reduced

Administrative Costs

Increased

Productivity

Page 90: Fusion apps security_con8714_pdf_8714_0001

90 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Q&A

Page 91: Fusion apps security_con8714_pdf_8714_0001

91 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 92: Fusion apps security_con8714_pdf_8714_0001

92 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Page 93: Fusion apps security_con8714_pdf_8714_0001

93 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.