SlideShare une entreprise Scribd logo
1  sur  31
Télécharger pour lire hors ligne
Oracle Fusion Security Simplified
FulcrumWay Leading Provider of Enterprise Risk Assessment Mitigation and Remediation Solutions

Enterprise Risk Management

Financial Close Monitor

Advanced Controls Catalog

Enterprise Audit

GRC Monitor

Leverage Technology:
Move Your Business Forward™
Give me a lever long enough and a fulcrum on which to place it, and I shall move the world - Archimedes

Copyright ©. Fulcrum Information Technology, Inc.
Simplifying Security
with Fusion Applications
Security Console
Nigel King
Vice President
Ryan Golden
Software Architect
The following is intended to outline our general product direction. It is intended
for information purposes only, and may not be incorporated into any contract.
It is not a commitment to deliver any material, code, or functionality, and should
not be relied upon in making purchasing decisions. The development, release,
and timing of any features or functionality described for Oracle’s products
remains at the sole discretion of Oracle.

3

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
Program Agenda

 Challenges in Security Administration
 Shaping Security to Match Your Business
 Staying Ahead of Changes
 Demo
 Q&A

4

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
Challenges in Security
Administration

5

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
The Security Diaspora

 One tool for role design
 One tool for user provisioning
 One tool for data security management
 One tool for supporting end user access

and authorization issues
 One tool for upgrade assessment

6

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
NO GLOBAL VIEW

7

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
Envision a Global View

 Single UI for all security activities
 Visualization of the entire security model
 Assisted search across all security artifacts

8

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
Single Entry Point

9

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
Visualizing the Security Model

10

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
Shape Security to
Match Your Business

11

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
Role Design and Customization Challenges

 Leverage the Fusion Applications security reference model
 Customize roles from a business or menu perspective
 Match privileges to on-screen elements
 Adjust the reference roles
 Test the resulting user interface

12

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
Role Copy

13

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
Menu Simulator

14

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
Stay Ahead of Changes

15

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
Product Upgrade Challenges

 Disruptive new functionality
 Identifying the new functionality
 Fitting new functionality to your existing model
 Identifying users that need to be (re)trained
 Offering a complete security assessment

16

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
Role Comparison

17

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
Graphic Section Divider

DEMO
18

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
Scenario: Assessing Product Upgrade Impact

Solutions
 Unified Search
 Compare Roles

 Security Model Visualization

19

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
Scenario: Help Desk User Missing a Menu

Solutions
 Unified Search
 Security Model Visualization

 Graph Pivot
 Menu Simulator
 Copy Role

20

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
FulcrumWay

Fusion Security and Oracle
Enterprise Governance Risk and
Compliance

by
Tony Olivo
Sr. Client Services Director
Copyright © FulcrumWay

Page 21

www.fulcrumway.com
Fusion RBAC
Security

GRC Security Components
User
Job Role
Duty Role

Data Role

Privileges

Module
Document
State
Action
Perspective

Copyright © FulcrumWay

Page 22

www.fulcrumway.com
Fusion RBAC
Security

Manage User Security – User
Management

Manage user community across the application.
A user’s access is the combination of all their assigned job roles

Copyright © FulcrumWay

Page 23

www.fulcrumway.com
Fusion RBAC
Security

Using Perspectives on Objects

Perspectives are used to secure data.
– A Perspective node is assigned to an object.
– That object is only available to a user that has that
perspective node assigned to their data role for that
object.

Sample Perspective
ABC
Company
North
America
New York

Latin
America
Mexico

Chicago

Europe

London

Paris

Los Angeles
Copyright © FulcrumWay

Page 24

www.fulcrumway.com
Fusion RBAC
Security

Using Perspectives on Objects

Perspectives can be associated with various
objects
– AACG / TCG
• Continuous Controls
• Models
• Incidents

– EGRCM
• Process
• Risk
• Control

Copyright © FulcrumWay

Page 25

www.fulcrumway.com
Fusion RBAC
Security

EGRC Objects Secured by RBAC
AACG and TCG

Models
– View and Manage Access

Continuous Controls
– View and Manage Access

Incidents
– View, Manage and Investigator Access

Copyright © FulcrumWay

Page 26

www.fulcrumway.com
Fusion RBAC
Security

EGRC Objects Secured by RBAC
EGRCM

Following EGRCM objects have View, Manage, Review
and Approve job roles
–
–
–
–
–
–

Copyright © FulcrumWay

Perspective
Process
Risk
Control
Issue
Remediation Plans

Page 27

www.fulcrumway.com
Fusion RBAC
Security

Sample Job Roles

OOTB INCIDENT RESULT MANAGER JOB ROLE

Copyright © FulcrumWay

Page 28

www.fulcrumway.com
Fusion RBAC
Security

Sample Job Roles

OOTB INCIDENT RESULT MANAGER JOB DATA ROLE

Copyright © FulcrumWay

Page 29

www.fulcrumway.com
Fusion RBAC
Security

Sample Custom Job Roles

CUSTOM INCIDENT RESULT MANAGER JOB DATA ROLE

Copyright © FulcrumWay

Page 30

www.fulcrumway.com
Thank You! Join us on LinkedIn to view
Summary and Q&A
webinar and discussion

Copyright © FulcrumWay

Page 31

www.fulcrumway.com

Contenu connexe

En vedette

Fulcrum way webinar top 10 advanced control to improve bottomline oct 22 2013
Fulcrum way webinar top 10 advanced control to improve bottomline oct 22 2013Fulcrum way webinar top 10 advanced control to improve bottomline oct 22 2013
Fulcrum way webinar top 10 advanced control to improve bottomline oct 22 2013actjax
 
Reduce sod access violations with effective roles management techniques
Reduce sod access violations with effective roles management techniquesReduce sod access violations with effective roles management techniques
Reduce sod access violations with effective roles management techniquesactjax
 
Conocimiento cientifico y tecnologico
Conocimiento cientifico y tecnologicoConocimiento cientifico y tecnologico
Conocimiento cientifico y tecnologicourodneyl
 
History of jamu
History of jamuHistory of jamu
History of jamuherbalfood
 
Annatto leaves
Annatto leavesAnnatto leaves
Annatto leavesherbalfood
 
Basil leaves amadea et al.
Basil leaves amadea et al.Basil leaves amadea et al.
Basil leaves amadea et al.herbalfood
 
White Turmeric
White TurmericWhite Turmeric
White Turmericherbalfood
 
Jintan putih ppt
Jintan putih pptJintan putih ppt
Jintan putih pptherbalfood
 
Health benefits of chrysanthemum
Health benefits of chrysanthemumHealth benefits of chrysanthemum
Health benefits of chrysanthemumherbalfood
 
Describing places
Describing placesDescribing places
Describing placesnuriamen
 

En vedette (17)

Pulowaras
PulowarasPulowaras
Pulowaras
 
Fulcrum way webinar top 10 advanced control to improve bottomline oct 22 2013
Fulcrum way webinar top 10 advanced control to improve bottomline oct 22 2013Fulcrum way webinar top 10 advanced control to improve bottomline oct 22 2013
Fulcrum way webinar top 10 advanced control to improve bottomline oct 22 2013
 
1.suji(2)
1.suji(2)1.suji(2)
1.suji(2)
 
Reduce sod access violations with effective roles management techniques
Reduce sod access violations with effective roles management techniquesReduce sod access violations with effective roles management techniques
Reduce sod access violations with effective roles management techniques
 
Conocimiento cientifico y tecnologico
Conocimiento cientifico y tecnologicoConocimiento cientifico y tecnologico
Conocimiento cientifico y tecnologico
 
History of jamu
History of jamuHistory of jamu
History of jamu
 
Kencur
KencurKencur
Kencur
 
Annatto leaves
Annatto leavesAnnatto leaves
Annatto leaves
 
Basil leaves amadea et al.
Basil leaves amadea et al.Basil leaves amadea et al.
Basil leaves amadea et al.
 
White Turmeric
White TurmericWhite Turmeric
White Turmeric
 
Biji adas
Biji adasBiji adas
Biji adas
 
Gambir
GambirGambir
Gambir
 
Jintan putih ppt
Jintan putih pptJintan putih ppt
Jintan putih ppt
 
Health benefits of chrysanthemum
Health benefits of chrysanthemumHealth benefits of chrysanthemum
Health benefits of chrysanthemum
 
Herbal pala
Herbal palaHerbal pala
Herbal pala
 
Describing places
Describing placesDescribing places
Describing places
 
El Panel de Control
El Panel de ControlEl Panel de Control
El Panel de Control
 

Similaire à FulcrumWay Webinar - Fusion Security

FulcrumWay - Ed. Webinar - Role & Responsibility Design Techniques that Stren...
FulcrumWay - Ed. Webinar - Role & Responsibility Design Techniques that Stren...FulcrumWay - Ed. Webinar - Role & Responsibility Design Techniques that Stren...
FulcrumWay - Ed. Webinar - Role & Responsibility Design Techniques that Stren...FulcrumWay
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - finalOracleIDM
 
Ppt dbsec-oow2013-avdf
Ppt dbsec-oow2013-avdfPpt dbsec-oow2013-avdf
Ppt dbsec-oow2013-avdfMelody Liu
 
Securing Mobile Device Access
Securing Mobile Device AccessSecuring Mobile Device Access
Securing Mobile Device AccessArtur Alves
 
Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824Oracle
 
Security Testing for Testing Professionals
Security Testing for Testing ProfessionalsSecurity Testing for Testing Professionals
Security Testing for Testing ProfessionalsTechWell
 
Oracle ADF Architecture TV - Design - Designing for Security
Oracle ADF Architecture TV - Design - Designing for SecurityOracle ADF Architecture TV - Design - Designing for Security
Oracle ADF Architecture TV - Design - Designing for SecurityChris Muir
 
Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...Oracle
 
Better Security Testing: Using the Cloud and Continuous Delivery
Better Security Testing: Using the Cloud and Continuous DeliveryBetter Security Testing: Using the Cloud and Continuous Delivery
Better Security Testing: Using the Cloud and Continuous DeliveryTechWell
 
200 SNYPR Fundamentals Training Guide.pdf
200 SNYPR Fundamentals Training Guide.pdf200 SNYPR Fundamentals Training Guide.pdf
200 SNYPR Fundamentals Training Guide.pdfPowJr
 
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares theCriterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares theCruzIbarra161
 
Oracle Fusion functional setup manager
Oracle Fusion functional setup managerOracle Fusion functional setup manager
Oracle Fusion functional setup managerBerry Clemens
 
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...mfrancis
 
Future of Oracle Forms AUSOUG 2013
Future of Oracle Forms AUSOUG 2013Future of Oracle Forms AUSOUG 2013
Future of Oracle Forms AUSOUG 2013Chris Muir
 
Secure Engineering Practices for Java
Secure Engineering Practices for JavaSecure Engineering Practices for Java
Secure Engineering Practices for JavaTim Ellison
 
Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - ...
Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - ...Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - ...
Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - ...Nadine Schoene
 
JavaOne2013: Secure Engineering Practices for Java
JavaOne2013: Secure Engineering Practices for JavaJavaOne2013: Secure Engineering Practices for Java
JavaOne2013: Secure Engineering Practices for JavaChris Bailey
 
Edge to AI: Analytics from Edge to Cloud with Efficient Movement of Machine Data
Edge to AI: Analytics from Edge to Cloud with Efficient Movement of Machine DataEdge to AI: Analytics from Edge to Cloud with Efficient Movement of Machine Data
Edge to AI: Analytics from Edge to Cloud with Efficient Movement of Machine DataDataWorks Summit
 
Re-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and Overview
Re-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and OverviewRe-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and Overview
Re-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and OverviewGuatemala User Group
 
Security Testing for Testing Professionals
Security Testing for Testing ProfessionalsSecurity Testing for Testing Professionals
Security Testing for Testing ProfessionalsTechWell
 

Similaire à FulcrumWay Webinar - Fusion Security (20)

FulcrumWay - Ed. Webinar - Role & Responsibility Design Techniques that Stren...
FulcrumWay - Ed. Webinar - Role & Responsibility Design Techniques that Stren...FulcrumWay - Ed. Webinar - Role & Responsibility Design Techniques that Stren...
FulcrumWay - Ed. Webinar - Role & Responsibility Design Techniques that Stren...
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - final
 
Ppt dbsec-oow2013-avdf
Ppt dbsec-oow2013-avdfPpt dbsec-oow2013-avdf
Ppt dbsec-oow2013-avdf
 
Securing Mobile Device Access
Securing Mobile Device AccessSecuring Mobile Device Access
Securing Mobile Device Access
 
Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824
 
Security Testing for Testing Professionals
Security Testing for Testing ProfessionalsSecurity Testing for Testing Professionals
Security Testing for Testing Professionals
 
Oracle ADF Architecture TV - Design - Designing for Security
Oracle ADF Architecture TV - Design - Designing for SecurityOracle ADF Architecture TV - Design - Designing for Security
Oracle ADF Architecture TV - Design - Designing for Security
 
Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...
 
Better Security Testing: Using the Cloud and Continuous Delivery
Better Security Testing: Using the Cloud and Continuous DeliveryBetter Security Testing: Using the Cloud and Continuous Delivery
Better Security Testing: Using the Cloud and Continuous Delivery
 
200 SNYPR Fundamentals Training Guide.pdf
200 SNYPR Fundamentals Training Guide.pdf200 SNYPR Fundamentals Training Guide.pdf
200 SNYPR Fundamentals Training Guide.pdf
 
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares theCriterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
 
Oracle Fusion functional setup manager
Oracle Fusion functional setup managerOracle Fusion functional setup manager
Oracle Fusion functional setup manager
 
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
 
Future of Oracle Forms AUSOUG 2013
Future of Oracle Forms AUSOUG 2013Future of Oracle Forms AUSOUG 2013
Future of Oracle Forms AUSOUG 2013
 
Secure Engineering Practices for Java
Secure Engineering Practices for JavaSecure Engineering Practices for Java
Secure Engineering Practices for Java
 
Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - ...
Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - ...Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - ...
Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - ...
 
JavaOne2013: Secure Engineering Practices for Java
JavaOne2013: Secure Engineering Practices for JavaJavaOne2013: Secure Engineering Practices for Java
JavaOne2013: Secure Engineering Practices for Java
 
Edge to AI: Analytics from Edge to Cloud with Efficient Movement of Machine Data
Edge to AI: Analytics from Edge to Cloud with Efficient Movement of Machine DataEdge to AI: Analytics from Edge to Cloud with Efficient Movement of Machine Data
Edge to AI: Analytics from Edge to Cloud with Efficient Movement of Machine Data
 
Re-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and Overview
Re-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and OverviewRe-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and Overview
Re-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and Overview
 
Security Testing for Testing Professionals
Security Testing for Testing ProfessionalsSecurity Testing for Testing Professionals
Security Testing for Testing Professionals
 

Dernier

Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jNeo4j
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...FIDO Alliance
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimaginedpanagenda
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?Paolo Missier
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 

Dernier (20)

Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 

FulcrumWay Webinar - Fusion Security

  • 1. Oracle Fusion Security Simplified FulcrumWay Leading Provider of Enterprise Risk Assessment Mitigation and Remediation Solutions Enterprise Risk Management Financial Close Monitor Advanced Controls Catalog Enterprise Audit GRC Monitor Leverage Technology: Move Your Business Forward™ Give me a lever long enough and a fulcrum on which to place it, and I shall move the world - Archimedes Copyright ©. Fulcrum Information Technology, Inc.
  • 2. Simplifying Security with Fusion Applications Security Console Nigel King Vice President Ryan Golden Software Architect
  • 3. The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle. 3 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
  • 4. Program Agenda  Challenges in Security Administration  Shaping Security to Match Your Business  Staying Ahead of Changes  Demo  Q&A 4 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
  • 5. Challenges in Security Administration 5 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
  • 6. The Security Diaspora  One tool for role design  One tool for user provisioning  One tool for data security management  One tool for supporting end user access and authorization issues  One tool for upgrade assessment 6 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
  • 7. NO GLOBAL VIEW 7 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
  • 8. Envision a Global View  Single UI for all security activities  Visualization of the entire security model  Assisted search across all security artifacts 8 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
  • 9. Single Entry Point 9 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
  • 10. Visualizing the Security Model 10 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
  • 11. Shape Security to Match Your Business 11 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
  • 12. Role Design and Customization Challenges  Leverage the Fusion Applications security reference model  Customize roles from a business or menu perspective  Match privileges to on-screen elements  Adjust the reference roles  Test the resulting user interface 12 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
  • 13. Role Copy 13 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
  • 14. Menu Simulator 14 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
  • 15. Stay Ahead of Changes 15 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
  • 16. Product Upgrade Challenges  Disruptive new functionality  Identifying the new functionality  Fitting new functionality to your existing model  Identifying users that need to be (re)trained  Offering a complete security assessment 16 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
  • 17. Role Comparison 17 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
  • 18. Graphic Section Divider DEMO 18 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
  • 19. Scenario: Assessing Product Upgrade Impact Solutions  Unified Search  Compare Roles  Security Model Visualization 19 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
  • 20. Scenario: Help Desk User Missing a Menu Solutions  Unified Search  Security Model Visualization  Graph Pivot  Menu Simulator  Copy Role 20 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
  • 21. FulcrumWay Fusion Security and Oracle Enterprise Governance Risk and Compliance by Tony Olivo Sr. Client Services Director Copyright © FulcrumWay Page 21 www.fulcrumway.com
  • 22. Fusion RBAC Security GRC Security Components User Job Role Duty Role Data Role Privileges Module Document State Action Perspective Copyright © FulcrumWay Page 22 www.fulcrumway.com
  • 23. Fusion RBAC Security Manage User Security – User Management Manage user community across the application. A user’s access is the combination of all their assigned job roles Copyright © FulcrumWay Page 23 www.fulcrumway.com
  • 24. Fusion RBAC Security Using Perspectives on Objects Perspectives are used to secure data. – A Perspective node is assigned to an object. – That object is only available to a user that has that perspective node assigned to their data role for that object. Sample Perspective ABC Company North America New York Latin America Mexico Chicago Europe London Paris Los Angeles Copyright © FulcrumWay Page 24 www.fulcrumway.com
  • 25. Fusion RBAC Security Using Perspectives on Objects Perspectives can be associated with various objects – AACG / TCG • Continuous Controls • Models • Incidents – EGRCM • Process • Risk • Control Copyright © FulcrumWay Page 25 www.fulcrumway.com
  • 26. Fusion RBAC Security EGRC Objects Secured by RBAC AACG and TCG Models – View and Manage Access Continuous Controls – View and Manage Access Incidents – View, Manage and Investigator Access Copyright © FulcrumWay Page 26 www.fulcrumway.com
  • 27. Fusion RBAC Security EGRC Objects Secured by RBAC EGRCM Following EGRCM objects have View, Manage, Review and Approve job roles – – – – – – Copyright © FulcrumWay Perspective Process Risk Control Issue Remediation Plans Page 27 www.fulcrumway.com
  • 28. Fusion RBAC Security Sample Job Roles OOTB INCIDENT RESULT MANAGER JOB ROLE Copyright © FulcrumWay Page 28 www.fulcrumway.com
  • 29. Fusion RBAC Security Sample Job Roles OOTB INCIDENT RESULT MANAGER JOB DATA ROLE Copyright © FulcrumWay Page 29 www.fulcrumway.com
  • 30. Fusion RBAC Security Sample Custom Job Roles CUSTOM INCIDENT RESULT MANAGER JOB DATA ROLE Copyright © FulcrumWay Page 30 www.fulcrumway.com
  • 31. Thank You! Join us on LinkedIn to view Summary and Q&A webinar and discussion Copyright © FulcrumWay Page 31 www.fulcrumway.com