SlideShare une entreprise Scribd logo
1  sur  31
Télécharger pour lire hors ligne
Oracle Fusion Security Simplified
FulcrumWay Leading Provider of Enterprise Risk Assessment Mitigation and Remediation Solutions

Enterprise Risk Management

Financial Close Monitor

Advanced Controls Catalog

Enterprise Audit

GRC Monitor

Leverage Technology:
Move Your Business Forward™
Give me a lever long enough and a fulcrum on which to place it, and I shall move the world - Archimedes

Copyright ©. Fulcrum Information Technology, Inc.
Simplifying Security
with Fusion Applications
Security Console
Nigel King
Vice President
Ryan Golden
Software Architect
The following is intended to outline our general product direction. It is intended
for information purposes only, and may not be incorporated into any contract.
It is not a commitment to deliver any material, code, or functionality, and should
not be relied upon in making purchasing decisions. The development, release,
and timing of any features or functionality described for Oracle’s products
remains at the sole discretion of Oracle.

3

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
Program Agenda

 Challenges in Security Administration
 Shaping Security to Match Your Business
 Staying Ahead of Changes
 Demo
 Q&A

4

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
Challenges in Security
Administration

5

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
The Security Diaspora

 One tool for role design
 One tool for user provisioning
 One tool for data security management
 One tool for supporting end user access

and authorization issues
 One tool for upgrade assessment

6

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
NO GLOBAL VIEW

7

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
Envision a Global View

 Single UI for all security activities
 Visualization of the entire security model
 Assisted search across all security artifacts

8

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
Single Entry Point

9

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
Visualizing the Security Model

10

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
Shape Security to
Match Your Business

11

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
Role Design and Customization Challenges

 Leverage the Fusion Applications security reference model
 Customize roles from a business or menu perspective
 Match privileges to on-screen elements
 Adjust the reference roles
 Test the resulting user interface

12

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
Role Copy

13

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
Menu Simulator

14

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
Stay Ahead of Changes

15

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
Product Upgrade Challenges

 Disruptive new functionality
 Identifying the new functionality
 Fitting new functionality to your existing model
 Identifying users that need to be (re)trained
 Offering a complete security assessment

16

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
Role Comparison

17

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
Graphic Section Divider

DEMO
18

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
Scenario: Assessing Product Upgrade Impact

Solutions
 Unified Search
 Compare Roles

 Security Model Visualization

19

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
Scenario: Help Desk User Missing a Menu

Solutions
 Unified Search
 Security Model Visualization

 Graph Pivot
 Menu Simulator
 Copy Role

20

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
FulcrumWay

Fusion Security and Oracle
Enterprise Governance Risk and
Compliance

by
Tony Olivo
Sr. Client Services Director
Copyright © FulcrumWay

Page 21

www.fulcrumway.com
Fusion RBAC
Security

GRC Security Components
User
Job Role
Duty Role

Data Role

Privileges

Module
Document
State
Action
Perspective

Copyright © FulcrumWay

Page 22

www.fulcrumway.com
Fusion RBAC
Security

Manage User Security – User
Management

Manage user community across the application.
A user’s access is the combination of all their assigned job roles

Copyright © FulcrumWay

Page 23

www.fulcrumway.com
Fusion RBAC
Security

Using Perspectives on Objects

Perspectives are used to secure data.
– A Perspective node is assigned to an object.
– That object is only available to a user that has that
perspective node assigned to their data role for that
object.

Sample Perspective
ABC
Company
North
America
New York

Latin
America
Mexico

Chicago

Europe

London

Paris

Los Angeles
Copyright © FulcrumWay

Page 24

www.fulcrumway.com
Fusion RBAC
Security

Using Perspectives on Objects

Perspectives can be associated with various
objects
– AACG / TCG
• Continuous Controls
• Models
• Incidents

– EGRCM
• Process
• Risk
• Control

Copyright © FulcrumWay

Page 25

www.fulcrumway.com
Fusion RBAC
Security

EGRC Objects Secured by RBAC
AACG and TCG

Models
– View and Manage Access

Continuous Controls
– View and Manage Access

Incidents
– View, Manage and Investigator Access

Copyright © FulcrumWay

Page 26

www.fulcrumway.com
Fusion RBAC
Security

EGRC Objects Secured by RBAC
EGRCM

Following EGRCM objects have View, Manage, Review
and Approve job roles
–
–
–
–
–
–

Copyright © FulcrumWay

Perspective
Process
Risk
Control
Issue
Remediation Plans

Page 27

www.fulcrumway.com
Fusion RBAC
Security

Sample Job Roles

OOTB INCIDENT RESULT MANAGER JOB ROLE

Copyright © FulcrumWay

Page 28

www.fulcrumway.com
Fusion RBAC
Security

Sample Job Roles

OOTB INCIDENT RESULT MANAGER JOB DATA ROLE

Copyright © FulcrumWay

Page 29

www.fulcrumway.com
Fusion RBAC
Security

Sample Custom Job Roles

CUSTOM INCIDENT RESULT MANAGER JOB DATA ROLE

Copyright © FulcrumWay

Page 30

www.fulcrumway.com
Thank You! Join us on LinkedIn to view
Summary and Q&A
webinar and discussion

Copyright © FulcrumWay

Page 31

www.fulcrumway.com

Contenu connexe

En vedette

Fulcrum way webinar top 10 advanced control to improve bottomline oct 22 2013
Fulcrum way webinar top 10 advanced control to improve bottomline oct 22 2013Fulcrum way webinar top 10 advanced control to improve bottomline oct 22 2013
Fulcrum way webinar top 10 advanced control to improve bottomline oct 22 2013
actjax
 
Reduce sod access violations with effective roles management techniques
Reduce sod access violations with effective roles management techniquesReduce sod access violations with effective roles management techniques
Reduce sod access violations with effective roles management techniques
actjax
 
Basil leaves amadea et al.
Basil leaves amadea et al.Basil leaves amadea et al.
Basil leaves amadea et al.
herbalfood
 
Health benefits of chrysanthemum
Health benefits of chrysanthemumHealth benefits of chrysanthemum
Health benefits of chrysanthemum
herbalfood
 

En vedette (17)

Pulowaras
PulowarasPulowaras
Pulowaras
 
Fulcrum way webinar top 10 advanced control to improve bottomline oct 22 2013
Fulcrum way webinar top 10 advanced control to improve bottomline oct 22 2013Fulcrum way webinar top 10 advanced control to improve bottomline oct 22 2013
Fulcrum way webinar top 10 advanced control to improve bottomline oct 22 2013
 
1.suji(2)
1.suji(2)1.suji(2)
1.suji(2)
 
Reduce sod access violations with effective roles management techniques
Reduce sod access violations with effective roles management techniquesReduce sod access violations with effective roles management techniques
Reduce sod access violations with effective roles management techniques
 
Conocimiento cientifico y tecnologico
Conocimiento cientifico y tecnologicoConocimiento cientifico y tecnologico
Conocimiento cientifico y tecnologico
 
History of jamu
History of jamuHistory of jamu
History of jamu
 
Kencur
KencurKencur
Kencur
 
Annatto leaves
Annatto leavesAnnatto leaves
Annatto leaves
 
Basil leaves amadea et al.
Basil leaves amadea et al.Basil leaves amadea et al.
Basil leaves amadea et al.
 
White Turmeric
White TurmericWhite Turmeric
White Turmeric
 
Biji adas
Biji adasBiji adas
Biji adas
 
Gambir
GambirGambir
Gambir
 
Jintan putih ppt
Jintan putih pptJintan putih ppt
Jintan putih ppt
 
Health benefits of chrysanthemum
Health benefits of chrysanthemumHealth benefits of chrysanthemum
Health benefits of chrysanthemum
 
Herbal pala
Herbal palaHerbal pala
Herbal pala
 
Describing places
Describing placesDescribing places
Describing places
 
El Panel de Control
El Panel de ControlEl Panel de Control
El Panel de Control
 

Similaire à FulcrumWay Webinar - Fusion Security

Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares theCriterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
CruzIbarra161
 
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
mfrancis
 

Similaire à FulcrumWay Webinar - Fusion Security (20)

FulcrumWay - Ed. Webinar - Role & Responsibility Design Techniques that Stren...
FulcrumWay - Ed. Webinar - Role & Responsibility Design Techniques that Stren...FulcrumWay - Ed. Webinar - Role & Responsibility Design Techniques that Stren...
FulcrumWay - Ed. Webinar - Role & Responsibility Design Techniques that Stren...
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - final
 
Ppt dbsec-oow2013-avdf
Ppt dbsec-oow2013-avdfPpt dbsec-oow2013-avdf
Ppt dbsec-oow2013-avdf
 
Securing Mobile Device Access
Securing Mobile Device AccessSecuring Mobile Device Access
Securing Mobile Device Access
 
Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824
 
Security Testing for Testing Professionals
Security Testing for Testing ProfessionalsSecurity Testing for Testing Professionals
Security Testing for Testing Professionals
 
Oracle ADF Architecture TV - Design - Designing for Security
Oracle ADF Architecture TV - Design - Designing for SecurityOracle ADF Architecture TV - Design - Designing for Security
Oracle ADF Architecture TV - Design - Designing for Security
 
Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...
 
Better Security Testing: Using the Cloud and Continuous Delivery
Better Security Testing: Using the Cloud and Continuous DeliveryBetter Security Testing: Using the Cloud and Continuous Delivery
Better Security Testing: Using the Cloud and Continuous Delivery
 
200 SNYPR Fundamentals Training Guide.pdf
200 SNYPR Fundamentals Training Guide.pdf200 SNYPR Fundamentals Training Guide.pdf
200 SNYPR Fundamentals Training Guide.pdf
 
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares theCriterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
 
Oracle Fusion functional setup manager
Oracle Fusion functional setup managerOracle Fusion functional setup manager
Oracle Fusion functional setup manager
 
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
 
Future of Oracle Forms AUSOUG 2013
Future of Oracle Forms AUSOUG 2013Future of Oracle Forms AUSOUG 2013
Future of Oracle Forms AUSOUG 2013
 
Secure Engineering Practices for Java
Secure Engineering Practices for JavaSecure Engineering Practices for Java
Secure Engineering Practices for Java
 
Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - ...
Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - ...Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - ...
Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - ...
 
JavaOne2013: Secure Engineering Practices for Java
JavaOne2013: Secure Engineering Practices for JavaJavaOne2013: Secure Engineering Practices for Java
JavaOne2013: Secure Engineering Practices for Java
 
Edge to AI: Analytics from Edge to Cloud with Efficient Movement of Machine Data
Edge to AI: Analytics from Edge to Cloud with Efficient Movement of Machine DataEdge to AI: Analytics from Edge to Cloud with Efficient Movement of Machine Data
Edge to AI: Analytics from Edge to Cloud with Efficient Movement of Machine Data
 
Re-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and Overview
Re-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and OverviewRe-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and Overview
Re-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and Overview
 
Security Testing for Testing Professionals
Security Testing for Testing ProfessionalsSecurity Testing for Testing Professionals
Security Testing for Testing Professionals
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

FulcrumWay Webinar - Fusion Security

  • 1. Oracle Fusion Security Simplified FulcrumWay Leading Provider of Enterprise Risk Assessment Mitigation and Remediation Solutions Enterprise Risk Management Financial Close Monitor Advanced Controls Catalog Enterprise Audit GRC Monitor Leverage Technology: Move Your Business Forward™ Give me a lever long enough and a fulcrum on which to place it, and I shall move the world - Archimedes Copyright ©. Fulcrum Information Technology, Inc.
  • 2. Simplifying Security with Fusion Applications Security Console Nigel King Vice President Ryan Golden Software Architect
  • 3. The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle. 3 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
  • 4. Program Agenda  Challenges in Security Administration  Shaping Security to Match Your Business  Staying Ahead of Changes  Demo  Q&A 4 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
  • 5. Challenges in Security Administration 5 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
  • 6. The Security Diaspora  One tool for role design  One tool for user provisioning  One tool for data security management  One tool for supporting end user access and authorization issues  One tool for upgrade assessment 6 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
  • 7. NO GLOBAL VIEW 7 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
  • 8. Envision a Global View  Single UI for all security activities  Visualization of the entire security model  Assisted search across all security artifacts 8 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
  • 9. Single Entry Point 9 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
  • 10. Visualizing the Security Model 10 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
  • 11. Shape Security to Match Your Business 11 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
  • 12. Role Design and Customization Challenges  Leverage the Fusion Applications security reference model  Customize roles from a business or menu perspective  Match privileges to on-screen elements  Adjust the reference roles  Test the resulting user interface 12 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
  • 13. Role Copy 13 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
  • 14. Menu Simulator 14 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
  • 15. Stay Ahead of Changes 15 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
  • 16. Product Upgrade Challenges  Disruptive new functionality  Identifying the new functionality  Fitting new functionality to your existing model  Identifying users that need to be (re)trained  Offering a complete security assessment 16 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
  • 17. Role Comparison 17 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
  • 18. Graphic Section Divider DEMO 18 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
  • 19. Scenario: Assessing Product Upgrade Impact Solutions  Unified Search  Compare Roles  Security Model Visualization 19 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
  • 20. Scenario: Help Desk User Missing a Menu Solutions  Unified Search  Security Model Visualization  Graph Pivot  Menu Simulator  Copy Role 20 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
  • 21. FulcrumWay Fusion Security and Oracle Enterprise Governance Risk and Compliance by Tony Olivo Sr. Client Services Director Copyright © FulcrumWay Page 21 www.fulcrumway.com
  • 22. Fusion RBAC Security GRC Security Components User Job Role Duty Role Data Role Privileges Module Document State Action Perspective Copyright © FulcrumWay Page 22 www.fulcrumway.com
  • 23. Fusion RBAC Security Manage User Security – User Management Manage user community across the application. A user’s access is the combination of all their assigned job roles Copyright © FulcrumWay Page 23 www.fulcrumway.com
  • 24. Fusion RBAC Security Using Perspectives on Objects Perspectives are used to secure data. – A Perspective node is assigned to an object. – That object is only available to a user that has that perspective node assigned to their data role for that object. Sample Perspective ABC Company North America New York Latin America Mexico Chicago Europe London Paris Los Angeles Copyright © FulcrumWay Page 24 www.fulcrumway.com
  • 25. Fusion RBAC Security Using Perspectives on Objects Perspectives can be associated with various objects – AACG / TCG • Continuous Controls • Models • Incidents – EGRCM • Process • Risk • Control Copyright © FulcrumWay Page 25 www.fulcrumway.com
  • 26. Fusion RBAC Security EGRC Objects Secured by RBAC AACG and TCG Models – View and Manage Access Continuous Controls – View and Manage Access Incidents – View, Manage and Investigator Access Copyright © FulcrumWay Page 26 www.fulcrumway.com
  • 27. Fusion RBAC Security EGRC Objects Secured by RBAC EGRCM Following EGRCM objects have View, Manage, Review and Approve job roles – – – – – – Copyright © FulcrumWay Perspective Process Risk Control Issue Remediation Plans Page 27 www.fulcrumway.com
  • 28. Fusion RBAC Security Sample Job Roles OOTB INCIDENT RESULT MANAGER JOB ROLE Copyright © FulcrumWay Page 28 www.fulcrumway.com
  • 29. Fusion RBAC Security Sample Job Roles OOTB INCIDENT RESULT MANAGER JOB DATA ROLE Copyright © FulcrumWay Page 29 www.fulcrumway.com
  • 30. Fusion RBAC Security Sample Custom Job Roles CUSTOM INCIDENT RESULT MANAGER JOB DATA ROLE Copyright © FulcrumWay Page 30 www.fulcrumway.com
  • 31. Thank You! Join us on LinkedIn to view Summary and Q&A webinar and discussion Copyright © FulcrumWay Page 31 www.fulcrumway.com