75
Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 1 Nigel King, Vice President, Oracle In-Depth Seminars D11 The 10 Principles of Security in Modern Cloud Applications

The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Embed Size (px)

Citation preview

Page 1: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 1

Nigel King, Vice President, Oracle

In-Depth Seminars – D11

The 10 Principles of Security in Modern Cloud Applications

Page 2: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 2

Safe Harbor Statement

The following is intended to outline our general product direction. It is

intended for information purposes only, and may not be incorporated into

any contract. It is not a commitment to deliver any material, code, or

functionality, and should not be relied upon in making purchasing decisions.

The development, release, and timing of any features or functionality

described for Oracle’s products remains at the sole discretion of Oracle.

Page 3: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 3

The Context for Applications

Page 4: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 4

HR Generalist

Procurement Manager

CFO Payables Supervisor

Applications Admin

VP of Sales Marketing Manager

Engineer

The Enterprise

Page 5: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 5

Fusion Financials

Fusion Human Capital Management

Fusion Procurement

Fusion Sales & Marketing

Fusion Project Portfolio Management

Fusion Supply Chain Management

Fusion Governance, Risk & Compliance

Functional Footprint – Role Based Access Control

Page 6: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 6

Fusion Procurement

• Buyer • Category Manager • Procurement Manager • Procurement Contracts Administrator • Procurement Catalog Administrator • Procurement Applications

Administrator • Supplier Administrator

• Sourcing Project Collaborator

• Supplier Bidder • Supplier Accounts Receivable Specialist • Supplier Customer Service

Representative • Supplier Demand Planner • Supplier Sales Representative • Supplier Self Service Administrator • Supplier Self Service Clerk

190 Seeded Job Roles across over 83 Applications

Functional Footprint – Role Based Access Control

Page 7: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 7

• Secure Out of The Box • Across Tools • Across the Info Lifecycle • SOD

•Role Provisioning •Transparent Policies •Standards Based

•Clean Access Model •Seamless Transition to IDM

• Faster On boarding • SSO •Management Approval Workflows •Easier Regulatory Compliance

Page 8: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 8

The 10 Principles

Page 9: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 9

Fusion Applications Security

1. Role Based Access

2. Account and Role Provisioning Events & Workflows

3. Enforcement Across Tools and Transformations

4. Pervasive Privacy Protections

5. Integration with Governance Risk and Compliance

6. Transparent Security Policies

7. Complete Audit of Security Changes

8. Secure Across the Information Lifecycle

9. Co-existing with your current Security Infrastructure

10. Comprehensive Extensible Reference Implementation

Page 10: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 10

Fusion Applications Security

E-Business Suite

Job Role

Data Role

Duty Role

Entitlement

Permission

PeopleSoft

Top Level Menu

Employee ID + Role

Role(s)

Permission Lists

Executable

Top Level Menu

Responsibility

Sub Menu

Form Function

Executable

Page 11: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 11

1

1 2

2 3

3

4 4

4 4

A Role is a Job Description

A Duty is what you do in that Role.

Page 12: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 12

Once a New Employee is inducted, You grant them a Role

Employee Joins As Purchasing Manager of Vision Germany

Vision

Enterprises

Vision Germany Vision US

Employee is Granted the Purchasing Manager Role with Data Secured by Vision Germany. We call these roles: Data Roles

Roles not tied to Job but to Employee, such as • Employee (ERs) • Purchase Requisitioner We call these roles: Abstract Roles

Page 13: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 13

What can the new Employee Do and View ?

Based on their Role assignment the Employee has duties. Each of these duties provides access to functionality in Fusion

Apps. This Access to Functionality is what we call Entitlements

Page 14: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 14

Now the New Employee Starts Using the System

When the Employee starts using Fusion Apps She will be able to access the Menu Tasks

she is entitled to.

Page 15: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 15

Menu Items

Page 16: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 16

Tasks

Page 17: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 17

Buttons, Regions and Actions

Page 18: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 18

Fusion Applications Security

1. Role Based Access

2. Account and Role Provisioning Events & Workflows

3. Enforcement Across Tools and Transformations

4. Pervasive Privacy Protections

5. Integration with Governance Risk and Compliance

6. Transparent Security Policies

7. Complete Audit of Security Changes

8. Secure Across the Information Lifecycle

9. Co-existing with your current Security Infrastructure

10. Comprehensive Extensible Reference Implementation

Page 19: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 19

Manual Process

-No Auto Provisioning

Page 20: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 20

Account and Role Provisioning Events & Workflows

Page 21: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 21

Secure Out of the Box

1. Role Based Access

2. Account and Role Provisioning Events & Workflows

3. Enforcement Across Tools and Transformations

4. Pervasive Privacy Protections

5. Integration with Governance Risk and Compliance

6. Transparent Security Policies

7. Complete Audit of Security Changes

8. Secure Across the Information Lifecycle

9. Co-existing with your current Security Infrastructure

10. Comprehensive Extensible Reference Implementation

Page 22: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

22 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Secure OOTB: Enforcement Across Tools

Business Intelligence

Universal Content Management

ADF UI

Page 23: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

23 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Secure OOTB: Enforcement Across Tools

Trasactional UIs

Business Intelligence

Universal Content Management

Defined Once. Used Everywhere !

- ADF

- Enterprise Search

- Business Intelligence

- Reporting

- Mobile

- Web Services

- Content Management

Page 24: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 24

Fusion Applications Security

1. Role Based Access

2. Account and Role Provisioning Events & Workflows

3. Enforcement Across Tools and Transformations

4. Pervasive Privacy Protections

5. Integration with Governance Risk and Compliance

6. Transparent Security Policies

7. Complete Audit of Security Changes

8. Secure Across the Information Lifecycle

9. Co-existing with your current Security Infrastructure

10. Comprehensive Extensible Reference Implementation

Page 25: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

25 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Secure OOTB: Pervasive Privacy Protections

• Fusion Applications protect personally identifiable information

(PII)

• PII = any piece of information which can potentially be used

to uniquely identify, contact, or locate a single person.

– Social Security Number (SSN)

– Driver’s license number

– State or National Identifier (Identification Card number)

– Passport Number

– Account number, credit card number (CCN) or debit card number

– Home or Physical address (e.g street address)

– Email address

– Telephone number

Page 26: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

26 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Secure OOTB: Pervasive Privacy Protections

A Supplier Manager can

maintain supplier tax identifier

for the business units in which

they are authorized

Application UI (ADF)

Table

RBAC

Defined once ..

Used in UI

Used in VPD policy Bypasses UI and gets direct access to database

Page 27: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 27

Fusion Applications Security

1. Role Based Access

2. Account and Role Provisioning Events & Workflows

3. Enforcement Across Tools and Transformations

4. Pervasive Privacy Protections

5. Integration with Governance Risk and Compliance

6. Transparent Security Policies

7. Complete Audit of Security Changes

8. Secure Across the Information Lifecycle

9. Co-existing with your current Security Infrastructure

10. Comprehensive Extensible Reference Implementation

Page 28: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 28

Preventive AND Detective Access

Controls

Simulation for Role Design

Preventive Provisioning

Pre-built Content and Reports

Manage Access & Segregation of Duties

Solution

Page 29: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 29

Preventive Provisioning

Proc Manager- DE Create Invoices

Create Payments

….

Proc Manager- US

Create Pos

….

GRC Control Name Enforcement

Type

Create Invoices , Create

Payments

Approval Required

Create Purchase Orders

, Create Invoices

Prevent

Page 30: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 30

Fusion Applications Security

1. Role Based Access

2. Account and Role Provisioning Events & Workflows

3. Enforcement Across Tools and Transformations

4. Pervasive Privacy Protections

5. Integration with Governance Risk and Compliance

6. Transparent Security Policies

7. Complete Audit of Security Changes

8. Secure Across the Information Lifecycle

9. Co-existing with your current Security Infrastructure

10. Comprehensive Extensible Reference Implementation

Page 31: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 31

Transparent Security Policies

Page 32: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 32

Fusion Applications Security

1. Role Based Access

2. Account and Role Provisioning Events & Workflows

3. Enforcement Across Tools and Transformations

4. Pervasive Privacy Protections

5. Integration with Governance Risk and Compliance

6. Transparent Security Policies

7. Complete Audit of Security Changes

8. Secure Across the Information Lifecycle

9. Co-existing with your current Security Infrastructure

10. Comprehensive Extensible Reference Implementation

Page 33: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 33

Audit of Security Changes Who made what changes, and when

• Audit of Changes in the definition of a role

• Audit of Changes to the roles assigned to a

user

• Audit of the logins of highly privileged

accounts • Implementation Consultant

• Security Manager

• Payroll Administrator

• Audit of the use of a highly privileged function

• Voiding of a Check

Page 34: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 34

IT Audit - Security Show User and Roles from Oracle Identity Manager (OIM)

Page 35: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 35

IT Audit - Security Show User and Role Change Reporting

Page 36: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 36

Fusion Applications Security

1. Role Based Access

2. Account and Role Provisioning Events & Workflows

3. Enforcement Across Tools and Transformations

4. Pervasive Privacy Protections

5. Integration with Governance Risk and Compliance

6. Transparent Security Policies

7. Complete Audit of Security Changes

8. Secure Across the Information Lifecycle

9. Co-existing with your current Security Infrastructure

10. Comprehensive Extensible Reference Implementation

Page 37: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

37 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Secure OOTB: Secure Across Info Lifecycle

• Sensitive data in file system and backups (data-at-rest) protected using Transparent Data Encryption

• Sensitive data in cloned, non-production databases protected using Oracle Data Masking

• Sensitive data protected from database administrators and other privileged users using Oracle Database Vault

Page 38: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

38 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Protect Data

in Motion with

Network

Encryption using

Advanced Security

Option

uthenti^(

Select SALARY from USERS;

Protect Data from

View and Alteration

as well as Insider

Threat using

Database Vault

Alter table ….

Operational

DBA

SMITH 345-67-8912 SCOTT 987-65-4321 KING 123-45-6789

$ 53,700 $229,500 $125,000

LNAME SSN SALARY

%5#ROB-!9(2

A0dubLvc

A0d$Gb)c

D$KfXa

(_f@eM

Gf&@eP

Select SALARY

from users;

Alter system.

Alter table..

X

Operational

DBA

Database

Vault

X

Data DBA /

Manager

* Example roles and privs

Secure OOTB: Secure Across Info Lifecycle

Sensitive Data in cloned instance

protected by Data Masking

SMITH 333-33-3333 SCOTT 222-22-2222 KING 111-11-1111

$77,000 $888,000 $99,000

LNAME SSN SALARY Protect User and Sensitive Data

at Rest by Encrypting Database

Columns using

Transparent Data Encryption

Page 39: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 39

1. Role Based Access

2. Account and Role Provisioning Events & Workflows

3. Enforcement Across Tools and Transformations

4. Pervasive Privacy Protections

5. Integration with Governance Risk and Compliance

6. Transparent Security Policies

7. Complete Audit of Security Changes

8. Secure Across the Information Lifecycle

9. Co-existing with your current Security Infrastructure

10. Comprehensive Extensible Reference Implementation

Fusion Applications Security

Page 40: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

40 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Secure OOTB: Co-existing with your current

Security Infrastructure

40

Identity Provider

Existing

Identity

Management

Infrastructure

Custom

Applications

Service Providers

authentication

Service access

Allows a user to log in once & access all

applications…

OID

Federation

Enabled

Applications

Unlimited

Page 41: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 41

Fusion Applications Security

1. Role Based Access

2. Account and Role Provisioning Events & Workflows

3. Enforcement Across Tools and Transformations

4. Pervasive Privacy Protections

5. Integration with Governance Risk and Compliance

6. Transparent Security Policies

7. Complete Audit of Security Changes

8. Secure Across the Information Lifecycle

9. Co-existing with your current Security Infrastructure

10. Comprehensive Extensible Reference Implementation

Page 42: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

42 Copyright © 2011, Oracle and/or its affiliates. All rights

reserved.

Secure OOTB: Reference Implementation

roles you will recognize

as jobs

hierarchy of duties

data security policies

SOD Policies

Provisioning Events Security Console

To extend

new jobs

new duties

OOTB

Page 43: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 43

Configuration Flexibility

“What if I want to expand what reports the channel directors can see?”

Page 44: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 44

Configuration Flexibility

Duty Role

Job Role Channel Director

Sales Transaction Analysis Duty

Add a Duty Role

+

Page 45: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 45

Page 46: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 46

Page 47: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 47

Configuration Flexibility

“Most business groups have their sales reps do forecasting, but I know of one where the sales managers do that, not the sales reps. What should I do?”

Page 48: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 48

Configuration Flexibility

Duty Role

Job Role Sales Representative

Sales Forecasting Duty

Remove a Duty Role

X

Page 49: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 49

Page 50: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 50

Configuration Flexibility

Policies

Duty Role

Job Role Sales Representative

Sales Representative Duty

Opportunity Sales Representative Duty

Security Policies

Custom Opportunity Read Only Duty

Security Policies

Remove Duty Role and Add Custom Duty Role

+ x ADD POLICIES

WITH VIEW

PRIVILEGES

ONLY

Page 51: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 51

Page 52: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 52

Page 53: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 53

Securing the Database

Page 54: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 54

JAN ‘14

Copyright © 2014, Oracle and/or its affiliates. All rights reserved. 54

MAR ‘14

DEC ‘13 SEP ‘13

FEB ‘14 OCT ‘13

Page 55: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 55

Considerations for Maximum Security Preventive and Detective Controls

Page 56: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 56

Masking & Subsetting

Privileged User Controls

Encryption & Redaction

PREVENTIVE

Activity Monitoring

Database Firewall

Auditing & Reporting

DETECTIVE

SECURITYMaximum Security for Critical Infrastructure

ADMINISTRATIVE

Privilege & Data Discovery

Configuration Management

Key Management

Page 57: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 57

Privilege Analysis

Data Redaction

Real Application Security

Conditional and Unified Auditing

SQL Grammar based Database Firewall

Privileged User Controls

SQL Command Controls

At-source Data Masking

Sensitive Data Discovery

Transparent Data Encryption

Label-based Access Control

Virtual Private Database

Oracle Database Security Innovations

Page 58: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 58

Masking & Subsetting

Privileged User Controls

Encryption & Redaction

PREVENTIVE

Activity Monitoring

Database Firewall

Auditing & Reporting

DETECTIVE

SECURITYMaximum Security for Critical Infrastructure

ADMINISTRATIVE

Privilege & Data Discovery

Configuration Management

Key Management

Page 59: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 59

Transparent data encryption

Prevents access to data at rest

Requires no application changes

Built-in two-tier key management

“Near Zero” overhead with hardware

Integrations with Oracle technologies

– e.g. Exadata, Advanced Compression, ASM, GoldenGate, DataPump, etc.

Advanced Security

Encryption is the Foundation Preventive Control for Oracle Databases

Disk

Backups

Exports

Off-Site

Facilities

Applications

Page 60: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 60

Real-time redaction based upon user,

IP, app context, session factors, …

Applies to columns on tables/views

Full/partial, random/fixed redaction

No impact on operational activities

Advanced Security

Redaction of Sensitive Data Displayed Preventive Control for Oracle Database 12c and 11g (11.2.0.4)

Credit Card Numbers

4451-2172-9841-4368

5106-8395-2095-5938

7830-0032-0294-1827

Redaction Policy

xxxx-xxxx-xxxx-4368 4451-2172-9841-4368

Billing Department Call Center Application

Page 61: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 61

Replace sensitive application data

Referential integrity detected/preserved

Extensible template library and formats

Application templates available

Support for masking data in non-Oracle

databases

Data Masking

Masking Data for Non-Production Use Preventive Control for Oracle Databases

LAST_NAME SSN SALARY

ANSKEKSL 323—23-1111 60,000

BKJHHEIEDK 252-34-1345 40,000

LAST_NAME SSN SALARY

AGUILAR 203-33-3234 40,000

BENSON 323-22-2943 60,000

Production

Non-Production

Dev

Test Production

Page 62: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 62

Realms around sensitive schemas or objects

Restrict DBA access to realm data

Support multi-factor SQL command rules

Enforce separation of duties

Block threats targeting privileged DB accounts

Restrict all access unless explicitly authorized with Mandatory Realms (New)

Database Vault

Preventive Controls Inside the Oracle Database Preventive Control for Oracle Databases

Finance

HR

Procurement

select * from procurement.bids

HR

Admin

Applications

Security

DBA

DBA

Page 63: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 63

Real Application Security

HR Application

Shared, All-Powerful

Connection Direct,

Uncontrolled

Access

Business Logic

Security Policy

Users and Roles

Business Logic

CRM Application

Security Policy

Users and Roles

Light-weight

Sessions

Security enforced on

direct connections

Identity/Policy Store

Page 64: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 64

Masking & Subsetting

Privileged User Controls

Encryption & Redaction

PREVENTIVE

Activity Monitoring

Database Firewall

Auditing & Reporting

DETECTIVE

SECURITYMaximum Security for Critical Infrastructure

ADMINISTRATIVE

Privilege & Data Discovery

Configuration Management

Key Management

Page 65: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 65

New Conditional Auditing Framework Detective Control for Oracle Database 12c

New policy and condition-based syntax

What: CREATE, ALTER, ALL, …

Where: Set of Privileges, Roles, objects

When: IP_ADDRESS !=“10.288.241.88”

Exceptions: Except HR

Group audit settings for manageability

New roles: Audit Viewer and Audit Admin

Out-of-box audit policies

Single unified database audit trail

Database Auditing

Page 66: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 66

Page 67: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 67

Audit Vault and Database Firewall

Audit, Report, and Alert in Real-Time Detective Control for Oracle and non-Oracle Databases

Audit Data & Event Logs

OS & Storage

Directories

Databases

Oracle Database Firewall

Custom

Collect and Analyze audit/event data

Centralized secure audit repository

Consolidated multi-source reporting

Out-of-the box and custom reports

Conditional real-time alerts

Fine-grain separation of duties

Secure, scalable software appliance

Policies

Reports

Alerts !

Security

Analyst

Auditor

SOC

Page 68: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 68

Audit Vault and Database Firewall

Database Activity Monitoring and Firewall Detective Control for Oracle and non-Oracle Databases

Monitor network traffic, detect and block

unauthorized database activity

Detect/stop SQL injection attacks

Highly accurate SQL grammar analysis

Whitelist approach to enforce activity

Blacklists for managing high risk activity

Scalable secure software appliance

Block

Log

Allow

Alert

Substitute

Whitelist Blacklist

SQL Analysis Policy

Factors

Page 69: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 69

Apps

Users

OS & Storage Directories Databases Custom

Audit Data & Event Logs

Database Firewall

Oracle Audit Vault and Database Firewall Detective Controls

Reports

Alerts

Audit Vault

Policies

Events

Page 70: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 70

Masking & Subsetting

Privileged User Controls

Encryption & Redaction

PREVENTIVE

Activity Monitoring

Database Firewall

Auditing & Reporting

DETECTIVE

SECURITYMaximum Security for Critical Infrastructure

ADMINISTRATIVE

Privilege & Data Discovery

Configuration Management

Key Management

Page 71: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 71

Database Lifecycle Management

Configuration Management Administrative Control for Oracle Databases

Discover

Scan & Monitor

Patch

Discover and classify databases

Scan for best practices, standards

Detect unauthorized changes

Patching and provisioning

Page 72: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 72

Database Vault

Discover Use of Privileges and Roles Administrative Control for Oracle Database 12c

Create…

Drop…

Update…

DBA role

APPADMIN role

Capture privileges used per session,

across sessions, per specific context, or

full database

Report on privileges/roles used/unused

Help revoke unnecessary privileges

Enforce least privilege and reduce risks

Increase security without disruption

Unused

Update

APPADMIN

Privilege

Analysis

Page 73: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 73

New Oracle Enterprise Manager Security Menu

Create Privilege Analysis policy and enable it

Oracle Database Vault

Page 74: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 74

Masking & Subsetting

Privileged User Controls

Encryption & Redaction

PREVENTIVE

Activity Monitoring

Database Firewall

Auditing & Reporting

DETECTIVE

SECURITYMaximum Security for Critical Infrastructure

ADMINISTRATIVE

Privilege & Data Discovery

Configuration Management

Key Management

Page 75: The 10 Principles of Security in Modern Cloud Applicationssfisaca.org/images/FC14Presentations/D11.pdf · Fusion Project Portfolio Management ... 190 Seeded Job Roles across over

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 75

Apps

Users

Advanced Security

Data Redaction

Data

Masking Advanced

Security TDE

Database Vault

Privilege Analysis

Database Vault

Privileged User Controls

OS & Storage Directories Databases Custom

Audit Data & Event Logs

Database Firewall

Oracle Database Maximum Security Architecture

Reports

Alerts

Audit Vault

Policies

Events