oracle fusion security simplified - · pdf fileoracle fusion security simplified . simplifying...

31
Leverage T echnology: Move Your Business Forward™ Enterprise Risk Management Financial Close Monitor Advanced Controls Catalog Enterprise Audit GRC Monitor FulcrumWay Leading Provider of Enterprise Risk Assessment Mitigation and Remediation Solutions Copyright ©. Fulcrum Information Technology, Inc. Give me a lever long enough and a fulcrum on which to place it, and I shall move the world - Archimedes Oracle Fusion Security Simplified

Upload: ngonhan

Post on 10-Mar-2018

226 views

Category:

Documents


0 download

TRANSCRIPT

Leverage T echnology:

Move Your Business Forward™

Enterprise Risk Management Financial Close Monitor Advanced Controls Catalog Enterprise Audit GRC Monitor

FulcrumWay Leading Provider of Enterprise Risk Assessment Mitigation and Remediation Solutions

Copyright ©. Fulcrum Information Technology, Inc. Give me a lever long enough and a fulcrum on which to place it, and I shall move the world - Archimedes

Oracle Fusion Security Simplified

Simplifying Security with Fusion Applications Security Console

Nigel King

Vice President

Ryan Golden

Software Architect

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 3

The following is intended to outline our general product direction. It is intended

for information purposes only, and may not be incorporated into any contract.

It is not a commitment to deliver any material, code, or functionality, and should

not be relied upon in making purchasing decisions. The development, release,

and timing of any features or functionality described for Oracle’s products

remains at the sole discretion of Oracle.

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 4

Program Agenda

Challenges in Security Administration

Shaping Security to Match Your Business

Staying Ahead of Changes

Demo

Q&A

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 5

Challenges in Security Administration

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 6

The Security Diaspora

One tool for role design

One tool for user provisioning

One tool for data security management

One tool for supporting end user access

and authorization issues

One tool for upgrade assessment

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 7

NO GLOBAL VIEW

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 8

Envision a Global View

Single UI for all security activities

Visualization of the entire security model

Assisted search across all security artifacts

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 9

Single Entry Point

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 10

Visualizing the Security Model

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 11

Shape Security to Match Your Business

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 12

Role Design and Customization Challenges

Leverage the Fusion Applications security reference model

Customize roles from a business or menu perspective

Match privileges to on-screen elements

Adjust the reference roles

Test the resulting user interface

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 13

Role Copy

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 14

Menu Simulator

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 15

Stay Ahead of Changes

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 16

Product Upgrade Challenges

Disruptive new functionality

Identifying the new functionality

Fitting new functionality to your existing model

Identifying users that need to be (re)trained

Offering a complete security assessment

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 17

Role Comparison

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 18

Graphic Section Divider

DEMO

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 19

Unified Search

Compare Roles

Security Model Visualization

Solutions

Scenario: Assessing Product Upgrade Impact

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 20

Unified Search

Security Model Visualization

Graph Pivot

Menu Simulator

Copy Role

Scenario: Help Desk User Missing a Menu

Solutions

www.fulcrumway.com Page 21 Copyright © FulcrumWay

Fusion Security and Oracle

Enterprise Governance Risk and

Compliance

by

Tony Olivo

Sr. Client Services Director

FulcrumWay

www.fulcrumway.com Page 22 Copyright © FulcrumWay

GRC Security Components Fusion RBAC

Security

User

Job Role

Duty Role

Privileges

Data Role

Module

Document State

Action

Perspective

www.fulcrumway.com Page 23 Copyright © FulcrumWay

Manage User Security – User

Management

Manage user community across the application.

A user’s access is the combination of all their assigned job roles

Fusion RBAC

Security

www.fulcrumway.com Page 24 Copyright © FulcrumWay

Using Perspectives on Objects

Perspectives are used to secure data.

– A Perspective node is assigned to an object.

– That object is only available to a user that has that

perspective node assigned to their data role for that

object.

Sample Perspective

Fusion RBAC

Security

ABC Company

North America

New York

Chicago

Los Angeles

Latin America

Mexico

Europe

London

Paris

www.fulcrumway.com Page 25 Copyright © FulcrumWay

Using Perspectives on Objects

Perspectives can be associated with various

objects

– AACG / TCG

• Continuous Controls

• Models

• Incidents

– EGRCM

• Process

• Risk

• Control

Fusion RBAC

Security

www.fulcrumway.com Page 26 Copyright © FulcrumWay

EGRC Objects Secured by RBAC

Models

– View and Manage Access

Continuous Controls

– View and Manage Access

Incidents

– View, Manage and Investigator Access

Fusion RBAC

Security

AACG and TCG

www.fulcrumway.com Page 27 Copyright © FulcrumWay

EGRC Objects Secured by RBAC

Following EGRCM objects have View, Manage, Review

and Approve job roles

– Perspective

– Process

– Risk

– Control

– Issue

– Remediation Plans

Fusion RBAC

Security

EGRCM

www.fulcrumway.com Page 28 Copyright © FulcrumWay

Sample Job Roles Fusion RBAC

Security

OOTB INCIDENT RESULT MANAGER JOB ROLE

www.fulcrumway.com Page 29 Copyright © FulcrumWay

Sample Job Roles Fusion RBAC

Security

OOTB INCIDENT RESULT MANAGER JOB DATA ROLE

www.fulcrumway.com Page 30 Copyright © FulcrumWay

Sample Custom Job Roles Fusion RBAC

Security

CUSTOM INCIDENT RESULT MANAGER JOB DATA ROLE

www.fulcrumway.com Page 31 Copyright © FulcrumWay

Thank You! Join us on LinkedIn to view

webinar and discussion Summary and Q&A