Database security has to evolve as well to become a layered solution with a defense in depth which means multiple overlapping controls Prevent access by non-database users for data at rest, in motion, and storageIncrease database user identity assuranceStrict access control to application data even from privileged usersEnforce multi-factor authorizationAudit database activity, and create reportsMonitor database traffic and prevent threats from reaching the databaseEnsure database production environment is secure and prevent driftMask sensitive data in non-production environments
Mobile device security begins with an Identity Platform.It’s a build slide and for each block we describe what the Block does for Mobile security – perhaps for each block tell a story of a customer applying the technology to a mobile strategyFor Access--- Describe capabilities of OIC and Adaptive accessFor Directory -- Talk high scale auth -- Location services Governance -- Risk analytics & compliance-- Self service and support cost
Link to aberdeen paper.. But most already know the story herehttp://www.oracle.com/go/?&Src=7319991&Act=11&pcode=WWMK11053701MPP015
I want to repeat our offer to assist. The best approach is to get guidance from people who have gone through the process Speak with our customers We invite you to speak with one of our customers who has created a business case and taken a platform approach. Contact a sales rep or reach out to someone here at the event and we can discuss how to help setup a follow on conversation for you.Setup a Free WorkshopOur Sales consultants have created a repeatable workshop to help customers assess their current environment and determine how to get started. Schedule a DemonstrationThe best way to get a feel for how a platform approach works is to setup a demonstration to see all of the components running together. Develop an ROI analysis Over the course of may deployments we have collected data to examine the return on investment customers have received. We have compiled this information into an ROI tool that can be leveraged to provide a baseline . Work with our reps to help develop an ROI analysis for your environment.
A better waytosecureapps-finalv1
<Insert Picture Here>Better Way to Secure Financial Services ApplicationsAmit JasujaGroup Vice President, Identity Management, Oracle
This document is for informational purposes. It is not a commitmentto deliver any material, code, or functionality, and should not be reliedupon in making purchasing decisions. The development, release,and timing of any features or functionality described in this documentremains at the sole discretion of Oracle. This document in any form,software or printed matter, contains proprietary information that is theexclusive property of Oracle. This document and informationcontained herein may not be disclosed, copied, reproduced ordistributed to anyone outside Oracle without prior written consent ofOracle. This document is not part of your license agreement nor canit be incorporated into any contractual agreement with Oracle or itssubsidiaries or affiliates.
Agenda• The Oracle Lens• Application Security Value Chain• A Platform Approach
Financial Service Applications Risks48% 86%Fraud Caused By Of hacking involvesInsiders compromised credentials Unauthorized Trading No Policy Visibility Hardcoded Security Internal Fraud Complex Certification No Role Structure Limited Forensics Costly Compliance Brittle Access Control 2010 Data Breach Investigations Report
Entitlements And PoliciesThe Rights to Application Data & Transactions IT VIEW: CAN A TRADER Entitlement SUBMIT A TRADE OF A CERTAIN SIZE AT A SPECIFC TIME OF DAY BUSINESS VIEW: WHAT IS THE AUDIT OBJECTIVE AND Transaction Data Forms THE ASSOCIATED RISK Authorization Policy
Application Security is Fragmented Multiple Brittle HardcodedEntitlement Catalogs Access Control Authorization Inflexible authorization increases complexity, reduces agility
The Challenge is Scale Focused on Reducing Risk • A Few App Administrators Driven to Reduce Cost Rolling or Monthly Attestation • Handful of Audit Staff
Define & Catalog Enterprise Roles • Common Data Model • Catalog Entitlements Entitlements, Roles & Policies • Enrich Meta-data • Define Roles &SoD
Enforce and Monitor Context and Dynamic AuthorizationAudit & Risk Custom COTS Application Owners Apps Apps Developers Application Security Platform Location Time Device
Audit & Certify Entitlement • Active Conflict Analysis Report SOD Checking • Simulation Entitlement • Risk Aggregation Auto- Review Remediate Aggregate Risk Score • 360 Degree Visibility • Closed Loop Reduce Remediation Time toMinutes Instead of Days or Weeks
Secure Application Data At The Application In The Database Authorize Mask Externalize Encrypt Centralize Audit
Comprehensive Database Security Control Encrypt Data Audit User Monitor SQL Privileged Activity Users Mask Test Block Attacks Data Compliance Cloud Enforce SoD ReportsNon-Oracle Databases Database Firewall Auditing OracleDatabases Encryption & Masking Authorization Authentication Defense in Depth
The Identity PlatformComplete, Innovative and Integrated Identity Governance •User Lifecycle •Risk Analytics • Access Provisioning • Access Certification • Delegated Admin • Role Management Access Access Directory •Fraud Detection •Location Data • Single-Sign On • Centralized Auth • Mobile, Social Intg • Device & User Data
Platform Reduces Cost vs. Point Solutions Oracle IAM Suite Benefits Advantage • Emergency Access • 11% faster48% Increased End- Cost Savings User Productivity • End-user Self Service • 30% faster Reduced Risk • Suspend/revoke/de-provision • 46% faster46% end user access More Responsive Enhanced Agility • Integrate a new app faster with the IAM infrastructure • 64% faster • Integrate a new end user role • 73% faster35% Fewer Audit Deficiencies Enhanced Security and Compliance faster into the solution • Reduces unauthorized access • 14% fewer • Reduces audit deficiencies • 35% fewer Reduced Total Cost • Reduces total cost of IAM • 48% lower initiatives Source: Aberdeen “Analyzing point solutions vs. platform” 2011
Take a Security Inside Out Approach• Reduce the risk• Reduce the cost of application security• Secure access to the “crown jewels”• Simplify administration
We Can Help Develop a Strategy Speak with Setup Free References Workshop Schedule a Develop an ROI Demonstration Analysis
A particular slide catching your eye?
Clipping is a handy way to collect important slides you want to go back to later.