SlideShare a Scribd company logo
1 of 35
Download to read offline
<Insert Picture Here>




Enterprise Security Architecture:
From access to audit
Paul Andres
Director, Enterprise Architecture
Why Security?
Changing Business Climate
Challenges Our Customers Face…




                "In a time of accelerating turbulence, the
                   valuation of a company will be strongly
                     affected by how it executes change."
Today’s IT Challenges




                       More Compliant Business
                       • Increasing regulatory demands
                       • Increasing privacy concerns
                       • Business viability concerns



More Agile Business                               More Secured Business
• More accessibility for employees,               • Organized crime
customers and partners                            • Identity theft
• Higher level of B2B integrations                • Intellectual property theft
• Faster reaction to changing requirements        • Constant global threats
Today’s “New Normal”
  Users, Systems, Globalization and Compliance Forced Complexity

           Service Level      Compliance &               IT                Records            Anti-Money
                                                                                              Anti-
            Compliance       Ethics Programs         Governance           Retention           Laundering


                 Financial                              Supply Chain
                                         Audit                                   Legal           Data Privacy
                 Reporting                              Traceability
                                       Management                              Discovery
                Compliance




Users
                             Finance    Suppliers     R&D     Mfg          Sales      HR        Legal      Customers



Systems
                               Enterprise    Data        Database       Mainframes     Mobile Devices        Apps
                              Applications Warehouse                                                        Server


Globalization



                                           EU                                                    Patriot
Mandates             SOX      JSOX      Directives    FDA    Basel II       HIPAA      GLBA       Act          SB1386   PCI…
The Business Platform
The Right Information to the Right People in the Right Format at the Right Time!


                         Unified User                   Actionable
                         Experience                      Analytics



                               End-to-End Industry Processes




      HCM                CRM       Finance              3rd Party       Custom
               Oracle Applications                             Non-Oracle



                             Oracle Platform
         Agile Process             Pervasive Business     Content              Existing
         Orchestration             Intelligence           Management
                                                                               Tools &
         Comprehensive             Consistent +           Centralized       Infrastructure
         Security                  Scalable Data          Development
Oracle is ‘Information Driven’


• Manage It…

• Use It…

• Share It…

• Protect It…
Security for Apps, Middleware, Data and Infrastructure
   Comprehensive ‘Defense in Depth’ Approach


       Applications                                            Automated Controls
                                                               Automated Controls




                             Monitoring and Configuration
                             Monitoring and Configuration




                                                                                           Enterprise Visibility
                                                                                           Enterprise Visibility
                                                            Access to Business Services
                                                            Access to Business Services

  Fusion                                                    Lower Cost of User Lifecycle
                                                            Lower Cost of User Lifecycle
Middleware




                                                            Data Protection and Privacy
                                                            Data Protection and Privacy
Database and
Infrastructure                                                  Unbreakable Linux
                                                                Unbreakable Linux


                 Copyright © 2008, Oracle and/or its affiliates. All rights reserved.                              9
Industry Frameworks
Oracle Enterprise Architecture Framework

   Methodology                                  Business Architecture                             Governance
                           Motivation                   Function               Organization
                     Drivers        Models             Products           Mission     Finance
    Reference        Goals         Strategy            Services           Roles
   Architectures     Objectives                        Processes          People
                                                                                                  EA Governance
     Strategy                                  Applications Architecture                          Performance
     Principles     Reference Architectures        Functional Services          Products
     Standards                                                                                    Risk
                     Strategy       General              General          General    Components   Security Policy
                     Principles     Industry             Industry         Industry   Cost         Integrity Business
                                                                                                  Continuity

     Capabilities                              Information Architecture                           Compliance
                    Reference Architectures             Entities                Structures        Portfolio
    Requirements          Strategy                                                                Management
      Standards                                                                  Models
    Design                Principles                  Components
    Development                                                                  Structures       Data Quality
                          Standards
    Test                                                                                          SLA’s
    Production
                      Reference                Technology Architecture
                     Architectures               Platform Services                    Products
                                                 General Services
                       Strategy        SOA/ EDA             Infrastructure           Components
                       Principles                                                    Cost
                       Standards       Data Management      Development
                                       Security             Management



Version 2 (Draft)
Enterprise Architecture Security Model

                                                             Assess Business Objectives

                                                    Vulnerability
                                                                                      Penetration Testing
                                                    Assessment

                                          Quantitative &                                         Define Risks &
                                          Qualitative Risk             Risk Analysis
                                                                                                    Threats
                                           Assessment

                                            Protection                    Data                   Functionality
                                           Requirements               Classification              Evaluation


                                                         Security                   System                   Policy &
                            Legal Liabilities
                                                        Awareness                  Reliability              Procedures

                                Cost Effective
                                                                      Safeguards                      Counter Measures
                                  Solutions

                        Data Integrity                              Confidentiality                         Security Assurance


                                                                Security Domains
       Access Control Systems                    Security Management
           & Methodology                                                       Security Architecture &               Operations Security
                                                       Practices                       Models
                            Laws, Investigations, &             App and Systems                    Business Continuity &
                                    Ethics                     Development Security                  Disaster Recovery

           Telecommunications &
             Network Security                                         Cryptography                                       Physical Security




* CISSP, Shone Harris
TOGAF to Oracle
Security Mapping
                                 GRC,
                                Security
                                 Policy




                                               Data
                                           Protection &
                                             Privacy




                                Access
                    Security    Control
                   Management
TOGAF 9
TOGAF 9
TOGAF 9 Capability Framework
Burton Group Security Framework
Oracle Security Solutions
Enterprise Security Reference Architecture
Oracle Security Components
                             Applications
              E-Business Suite, PeopleSoft, Siebel, Hyperion, JDE
                             SAP, Custom, Legacy




              Access           Identity Web Service




                                                                    Enterprise Manager
  Identity    Manager         Federation Manager
     and
   Access                 Identity Manager
 Management              Directory Services


              Database Vault                Audit Vault
    Data        Advanced
                                          Label Security
   Security   Security Option

               Information Rights Management
Oracle’s “Top to Bottom” GRC Strategy
Analytics
             Define Your Policy…Connect to IT Controls…Analyze Your Results!




                                                                                     • Real-time
            Leveraged Output and                                                       visibility
             Compliance Visibility                                                   • Pre-Made
                                                                                       reports and
                                                                                       dashboards
                                              Analyze Policy and Controls
            Map Risks-Policy-Controls                                                Track
Policy




                                                                                     • By Standard
            Test & Gather Evidence                      GRC Manager                  • By Cycle
                                                                                     • By Application
            Track Issues + Remediate
                                                                                     • By Process
                                             Connect Policies to Controls
                                                                                     • Embedded and
Controls




                Set Control Rules
                                         Embedded           Identity     Access        Enterprise-
               Low-Level Detail         App Controls      Management   Management      Wide Controls
                                        Configuration      Database    Information   • Oracle and
               Handle Exceptions        Management         Controls    Rights Mgmt     Non-Oracle
Orace Identity Management Components
                         Oracle Role Manager
                      Oracle Identity Manager

                Enterprise Applications
            Basic Authentication / Course-Grained
           Authorization / Audit / User Administration




          Business     Custom      Helpdesk     Email        Portals
           Apps         Apps                                           Employees
                                                                       Customers
                                                                        Suppliers



                     Oracle Access Manager - Identity

                     Oracle Internet (Meta) Directory
                        Oracle Virtual Directory

                      Data and User Stores




                     Directories    Databases    Operating
                                                 Systems



                         Oracle Identity Manager
                           Oracle Role Manager
A Typical Environment…




Data
Tier




                                         Presentation
                                             Tier




                              Logic
                            (Business)
                               Tier
Identity and Access Challenges
     Problems
     • No Ability to Establish User Roles
     • Manual User Administration (Int + Ext)
     • No knowledge of “Who has access to what?”
     • Multiple Sign-Ons + Forgotten Passwords




                                 Problems
                                 • No Self Service or Password Management
                                 • Unstructured Content is not controlled
                                 • Access to sensitive DB data is not controlled
                                 • Difficult to Manage Environment
Solution: Centralize and Simplify Access




                        SSO
                              En
                                ab
                                     led
                                           Ap
                                                pli
                                                      cat
                                                         ion
                                                            s
Solution: Simplify Access to Multiple Datastores…
Solution: Simplify Employee to Business Partner Login




                           SSO
                                 +F
                                      ed
                                         e   rat
                                                i   on
                                                      -En
                                                         ab
                                                              l ed
                                                                     Ap
                                                                        p   s
FMW Security as a Service
   Oracle            3rd Party        Custom               Legacy Applications
   Fusion           ISF Aware       Developed
Applications       Applications     ISF Aware               Business Functions
& Middleware                       Applications                   Authentication
                                                          User
                                                                  Authorization
  Business            Business       Business          Management
                                                                    Federation
 Functions           Functions      Functions

                                                       Legacy Integration Interface
                                                           Connectors, Agents
             Oracle IAM Suite with Identity Services Framework
 Service Interfaces
                         WS-*, SPML, SAML, XACML, CARML
 Identity Services
  Authentication          Provisioning    Identity Provider           Audit
   Authorization         Administration     Role Provider       Federation & Trust
 Enterprise Identity Management Infrastructure
        Policy & Orchestration                    Virtualization & User Store
Fusion Security Architecture
                 OAM                                                       Enterprise
                                             Authentication              Identity Store
        Federation Services (OIF)                                           (LDAP)

              Single Sign-On
                     Sign-
                                                                              Identity
                                                                           Provisioning &
            Authentication                                                 Reconciliation


        Fusion Applications                  OC4J                      FIDM
                                                                 Identity Provisioning
                                                                Identity Administration
        ADF               ATG
                                                                 Account Provisioning
       JAAS+          Security
                                                                Account Administration
       Extensible Security (XS)
                                                                Enterprise Role Mgmt


                                                                           Account + Role
Operational Interaction                     RDBMS                          Provisioning &
     using JDBC                                                            Reconciliation
                                    LUS (Extensible Security)

                                    FIDM Operational Store
Policy-Driven Security & Identity Management
       Policy-Driven Security & Identity Management


                          portal                               .NET logic                   CICS wrap
Customers

                        WSM PEP                                WSM PEP                      WSM PEP
                                                J2EE logic
                                                                                   Legacy


                                                WSM PEP


Trading
                  B2Bi logic
Partners
                                                                      TIBX logic              App logic
                  WSM PEP
                                                                       WSM PEP       CRM      WSM PEP




   B2B
Exchanges    FRONT OFFICE                 INTEGRATION SERVICES                      BACK OFFICE


                                                  Oracle WSM
             Oracle                Oracle WSM        Policy
            Identity                 Monitor       Manager
            Services
                                                                 Architects Security Operations
Expose, Secure and Manage Web Services…


Auditor        Security    IT Admin
                                                                                                   Partner Portal
                                                                                       Portals      Outsourced
                                                                                                      Provider




                                      AD / Exchange
                                                                                      IIS/ASP
                                                                                        Apps



    | Peoplesoft
                                                        Virtual    Access Manager
          HR                            Mainframe                    Web SSO &
                                      (RACF /ACF2/TS   Directory
                                       Environment)                  Web IdMgt
                                                                                     Packaged
                                                                                    Applications
                                                                                     using Sun
                                                                                     or Apache
                                                                                                         `
          Business Users                  Unix
                                          Linux
                                                                                                     Customers
                                                                                                      Partners ,
                                                                                                       Vendors
                                                                                                     Employees

                                       Apps w /                                       Portals
                                      Web Service                       Web            using
                                                                      Services      Web Services
                                                                      Manager
Oracle Database Security Components
                                          Enterprise Applications




                               Business     Custom   Helpdesk    Email      Portals
                                Apps         Apps


                                                                                            Database           Operational   Data DBA /
                                                                                                                  DBA         Manager
                              Protect Data                                                  Vault
                                                                     Protect Data from
                             in Motion with
                                                                    View and Alteration     Select SALARY
                                                                                                                   X
                                Network                                                     from users;
                                                                     as well as Insider
                            Encryption using                                                Alter system.
                                                                                                                                 X
                                                                       Threat using         Alter table..
                           Advanced Security


                                                        5
                                                                      Database Vault
Consolidate Audit                Option                                                      * Example roles and privs
     Data &
  Show Reports                                                                                                      Operational
using Audit Vault                                                                     Alter table ….
                                                                                                                       DBA


                                                                                                    Select SALARY from USERS;




    Protect User and Sensitive Data
                                      LNAME           SSN      SALARY
    at Rest by Encrypting Database         KING   123-45-6789 $125,000
             Columns using                SCOTT   987-65-4321 $229,500                            Securely Backup Data To
       Advanced Security Option           SMITH   345-67-8912 $ 53,700
                                                                                                  Tape with Secure Backup
                                      LNAME CREDIT_CARD EXP_DATE
                                           KING 1234-5678-9123    04-2010
                                          SCOTT 2345-6789-4321    09-2012
                                          SMITH 9876-5432-1987    01-2011
Securing                                                                             Database             Operational   Data DBA /
                                                                                                                     DBA         Manager
                                                        Separation of                        Vault
                                                         Duties with
        the Database…                                  Database Vault
                                                       Protects Against
                                                                                             Select SSN from
                                                                                             cust;
                                                                                                                      X

                                                                                             Alter system..                         X
                                                       Insider Threats                       Alter table ….

                                                                                              * Example roles and privs



                                                                                                                       Operational
                                                                                     Alter table ….
                                                                                                                          DBA

                                                           KING 18031
                 KING, 18031, $1,800
                        5 0                               SCOTT 14220                                  Select ssn from cust;
                                                          SMITH 17170      ִ

                                                           Protect Data at Rest
               Protect Data in Motion                     Transparently Encrypt
              with Network Encryption                     Database Columns with
              Advance Security Option                    Advance Security Option

                                                                                                                Encrypt Backup of
                 KING, 18031, $1,800                                                                          Database and Flat Files
                        5 0                                KING 18031
                                                          SCOTT 14220                                              to Tape with
                                                          SMITH 17170      ִ




                                                                           Consolidate &
                                                                             Report on
                                                                             Audit Data
  Manage Database                         IT Admin                        with Audit Vault
Identities / Roles with                  IT Security                         Audit Data
                                        DBA Manager                          Warehouse
Other Supporting Slides
Oracle Enterprise Security

Identity And Access Management                                        Governance
                                                                      Risk
 User Management          Directory Management                        Compliance
 Access Management        Platform Security      Identity Audit
                                                                       Policy &
                                                                       Process
Application Security
                                                                       Management

                                                                       Enterprise
                                                                       Control
Data Security
                                                                       Compliance
 Multi-level Access Control   Encryption                               Analysis &
 Information Rights           DBA Security       Monitoring & Alert    Reporting

Operating System Security                                              Audit
                                                                       Automation
 Authentication Service       User Management

More Related Content

What's hot

Conceptual security architecture
Conceptual security architectureConceptual security architecture
Conceptual security architectureMubashirAslam5
 
SABSA - Business Attributes Profiling
SABSA - Business Attributes ProfilingSABSA - Business Attributes Profiling
SABSA - Business Attributes ProfilingSABSAcourses
 
SABSA vs. TOGAF in a RMF NIST 800-30 context
SABSA vs. TOGAF in a RMF NIST 800-30 contextSABSA vs. TOGAF in a RMF NIST 800-30 context
SABSA vs. TOGAF in a RMF NIST 800-30 contextDavid Sweigert
 
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Craig Martin
 
SABSA: Key features, advantages & benefits summary
SABSA: Key features, advantages & benefits summarySABSA: Key features, advantages & benefits summary
SABSA: Key features, advantages & benefits summarySABSAcourses
 
Practical Enterprise Security Architecture
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture Priyanka Aash
 
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
A Practical Example to Using SABSA Extended Security-in-Depth Strategy A Practical Example to Using SABSA Extended Security-in-Depth Strategy
A Practical Example to Using SABSA Extended Security-in-Depth Strategy Allen Baranov
 
Security architecture frameworks
Security architecture frameworksSecurity architecture frameworks
Security architecture frameworksJohn Arnold
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security ArchitectureKris Kimmerle
 
Security models for security architecture
Security models for security architectureSecurity models for security architecture
Security models for security architectureVladimir Jirasek
 
(ENT305) Develop an Enterprise-wide Cloud Adoption Strategy | AWS re:Invent 2014
(ENT305) Develop an Enterprise-wide Cloud Adoption Strategy | AWS re:Invent 2014(ENT305) Develop an Enterprise-wide Cloud Adoption Strategy | AWS re:Invent 2014
(ENT305) Develop an Enterprise-wide Cloud Adoption Strategy | AWS re:Invent 2014Amazon Web Services
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security ArchitecturePriyanka Aash
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy Dam Frank
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...IBM Security
 

What's hot (20)

Conceptual security architecture
Conceptual security architectureConceptual security architecture
Conceptual security architecture
 
SABSA - Business Attributes Profiling
SABSA - Business Attributes ProfilingSABSA - Business Attributes Profiling
SABSA - Business Attributes Profiling
 
SABSA vs. TOGAF in a RMF NIST 800-30 context
SABSA vs. TOGAF in a RMF NIST 800-30 contextSABSA vs. TOGAF in a RMF NIST 800-30 context
SABSA vs. TOGAF in a RMF NIST 800-30 context
 
SABSA Implementation(Part I)_ver1-0
SABSA Implementation(Part I)_ver1-0SABSA Implementation(Part I)_ver1-0
SABSA Implementation(Part I)_ver1-0
 
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
 
ESA for Business
ESA for BusinessESA for Business
ESA for Business
 
SABSA Implementation(Part IV)_ver1-0
SABSA Implementation(Part IV)_ver1-0SABSA Implementation(Part IV)_ver1-0
SABSA Implementation(Part IV)_ver1-0
 
SABSA: Key features, advantages & benefits summary
SABSA: Key features, advantages & benefits summarySABSA: Key features, advantages & benefits summary
SABSA: Key features, advantages & benefits summary
 
SABSA Implementation(Part V)_ver1-0
SABSA Implementation(Part V)_ver1-0SABSA Implementation(Part V)_ver1-0
SABSA Implementation(Part V)_ver1-0
 
SABSA Implementation(Part II)_ver1-0
SABSA Implementation(Part II)_ver1-0SABSA Implementation(Part II)_ver1-0
SABSA Implementation(Part II)_ver1-0
 
Practical Enterprise Security Architecture
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture
 
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
A Practical Example to Using SABSA Extended Security-in-Depth Strategy A Practical Example to Using SABSA Extended Security-in-Depth Strategy
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
 
Security architecture frameworks
Security architecture frameworksSecurity architecture frameworks
Security architecture frameworks
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
 
SABSA white paper
SABSA white paperSABSA white paper
SABSA white paper
 
Security models for security architecture
Security models for security architectureSecurity models for security architecture
Security models for security architecture
 
(ENT305) Develop an Enterprise-wide Cloud Adoption Strategy | AWS re:Invent 2014
(ENT305) Develop an Enterprise-wide Cloud Adoption Strategy | AWS re:Invent 2014(ENT305) Develop an Enterprise-wide Cloud Adoption Strategy | AWS re:Invent 2014
(ENT305) Develop an Enterprise-wide Cloud Adoption Strategy | AWS re:Invent 2014
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 

Similar to Enterprise Security Architecture: From access to audit

Hybrid Cloud, BigData and Consumerization The 2012 Trends
Hybrid Cloud, BigData and Consumerization The 2012 TrendsHybrid Cloud, BigData and Consumerization The 2012 Trends
Hybrid Cloud, BigData and Consumerization The 2012 TrendsSoftware Park Thailand
 
Ajay dhir - The new CIO leader: Managing in challenging times
Ajay dhir - The new CIO leader: Managing in challenging timesAjay dhir - The new CIO leader: Managing in challenging times
Ajay dhir - The new CIO leader: Managing in challenging timesGlobal Business Events
 
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011IBM Sverige
 
Cogent Company Overview.11292009
Cogent Company Overview.11292009Cogent Company Overview.11292009
Cogent Company Overview.11292009Marc Hoppers
 
IBM Smarter Business 2012 - PureSystems - PureData
IBM Smarter Business 2012 - PureSystems - PureDataIBM Smarter Business 2012 - PureSystems - PureData
IBM Smarter Business 2012 - PureSystems - PureDataIBM Sverige
 
Service Availability and Performance Management - PCTY 2011
Service Availability and Performance Management - PCTY 2011Service Availability and Performance Management - PCTY 2011
Service Availability and Performance Management - PCTY 2011IBM Sverige
 
IBM Software Day 2013. Turning opportunities into outcomes
IBM Software Day 2013. Turning opportunities into outcomesIBM Software Day 2013. Turning opportunities into outcomes
IBM Software Day 2013. Turning opportunities into outcomesIBM (Middle East and Africa)
 
Soa Governance And Security V1.1
Soa Governance And Security V1.1Soa Governance And Security V1.1
Soa Governance And Security V1.1Dr. Mehmet Yildiz
 
Unleash Business Innovation with the Next Generation of Cloud Computing
Unleash Business Innovation with the Next Generation of Cloud ComputingUnleash Business Innovation with the Next Generation of Cloud Computing
Unleash Business Innovation with the Next Generation of Cloud ComputingSam Garforth
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management StrategyNetIQ
 
Ibm rational day-france_what's next
Ibm rational day-france_what's nextIbm rational day-france_what's next
Ibm rational day-france_what's nextDuffy Fron
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformationOracleIDM
 
Global forum 2012: Gaetano Santucci
Global forum 2012: Gaetano SantucciGlobal forum 2012: Gaetano Santucci
Global forum 2012: Gaetano SantucciGlobalForum
 
CCS - Business Intelligence Capabilities
CCS - Business Intelligence CapabilitiesCCS - Business Intelligence Capabilities
CCS - Business Intelligence CapabilitiesCCS Global Tech
 
"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middleware
"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middleware"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middleware
"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middlewareinvestorrelation
 

Similar to Enterprise Security Architecture: From access to audit (20)

Hybrid Cloud, BigData and Consumerization The 2012 Trends
Hybrid Cloud, BigData and Consumerization The 2012 TrendsHybrid Cloud, BigData and Consumerization The 2012 Trends
Hybrid Cloud, BigData and Consumerization The 2012 Trends
 
Ajay dhir - The new CIO leader: Managing in challenging times
Ajay dhir - The new CIO leader: Managing in challenging timesAjay dhir - The new CIO leader: Managing in challenging times
Ajay dhir - The new CIO leader: Managing in challenging times
 
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
 
Cogent Company Overview.11292009
Cogent Company Overview.11292009Cogent Company Overview.11292009
Cogent Company Overview.11292009
 
IBM Smarter Business 2012 - PureSystems - PureData
IBM Smarter Business 2012 - PureSystems - PureDataIBM Smarter Business 2012 - PureSystems - PureData
IBM Smarter Business 2012 - PureSystems - PureData
 
Service Availability and Performance Management - PCTY 2011
Service Availability and Performance Management - PCTY 2011Service Availability and Performance Management - PCTY 2011
Service Availability and Performance Management - PCTY 2011
 
IBM Software Day 2013. Turning opportunities into outcomes
IBM Software Day 2013. Turning opportunities into outcomesIBM Software Day 2013. Turning opportunities into outcomes
IBM Software Day 2013. Turning opportunities into outcomes
 
Keynote Day 1 2009
Keynote Day 1 2009Keynote Day 1 2009
Keynote Day 1 2009
 
Soa Governance And Security V1.1
Soa Governance And Security V1.1Soa Governance And Security V1.1
Soa Governance And Security V1.1
 
Unleash Business Innovation with the Next Generation of Cloud Computing
Unleash Business Innovation with the Next Generation of Cloud ComputingUnleash Business Innovation with the Next Generation of Cloud Computing
Unleash Business Innovation with the Next Generation of Cloud Computing
 
Expanding mission critical ci
Expanding mission critical ciExpanding mission critical ci
Expanding mission critical ci
 
Pulse Executive Panel
Pulse Executive PanelPulse Executive Panel
Pulse Executive Panel
 
2 4-internet as a universal business system sergio gusmeroli
2 4-internet as a universal business system sergio gusmeroli2 4-internet as a universal business system sergio gusmeroli
2 4-internet as a universal business system sergio gusmeroli
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management Strategy
 
Ibm rational day-france_what's next
Ibm rational day-france_what's nextIbm rational day-france_what's next
Ibm rational day-france_what's next
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformation
 
Global forum 2012: Gaetano Santucci
Global forum 2012: Gaetano SantucciGlobal forum 2012: Gaetano Santucci
Global forum 2012: Gaetano Santucci
 
CCS - Business Intelligence Capabilities
CCS - Business Intelligence CapabilitiesCCS - Business Intelligence Capabilities
CCS - Business Intelligence Capabilities
 
Cloud Auditing
Cloud AuditingCloud Auditing
Cloud Auditing
 
"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middleware
"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middleware"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middleware
"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middleware
 

More from Bob Rhubart

Business Integration for the 21st Century
Business Integration for the 21st Century Business Integration for the 21st Century
Business Integration for the 21st Century Bob Rhubart
 
Oracle Cloud Reference Architecture
Oracle Cloud Reference ArchitectureOracle Cloud Reference Architecture
Oracle Cloud Reference ArchitectureBob Rhubart
 
Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityEnterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityBob Rhubart
 
Innovations in Grid Computing with Oracle Coherence
Innovations in Grid Computing with Oracle CoherenceInnovations in Grid Computing with Oracle Coherence
Innovations in Grid Computing with Oracle CoherenceBob Rhubart
 
Cloud Computing - A Pragmatic Approach to Cloud Adoption
Cloud Computing - A Pragmatic Approach to Cloud AdoptionCloud Computing - A Pragmatic Approach to Cloud Adoption
Cloud Computing - A Pragmatic Approach to Cloud AdoptionBob Rhubart
 
High Availability Infrastructure for Cloud Computing
High Availability Infrastructure for Cloud ComputingHigh Availability Infrastructure for Cloud Computing
High Availability Infrastructure for Cloud ComputingBob Rhubart
 
Engineered Systems: Oracle's Vision for the Future
Engineered Systems: Oracle's Vision for the FutureEngineered Systems: Oracle's Vision for the Future
Engineered Systems: Oracle's Vision for the FutureBob Rhubart
 
Innovations in Data Grid Technology with Oracle Coherence
Innovations in Data Grid Technology with Oracle CoherenceInnovations in Data Grid Technology with Oracle Coherence
Innovations in Data Grid Technology with Oracle CoherenceBob Rhubart
 
Making IT Simple: A Pragmatic Approach to Cloud Computing
Making IT Simple: A Pragmatic Approach to Cloud ComputingMaking IT Simple: A Pragmatic Approach to Cloud Computing
Making IT Simple: A Pragmatic Approach to Cloud ComputingBob Rhubart
 
Oracle Cloud Reference Architecture
Oracle Cloud Reference ArchitectureOracle Cloud Reference Architecture
Oracle Cloud Reference ArchitectureBob Rhubart
 
Oracle VM Consolidation and Path to the Cloud
Oracle VM Consolidation and Path to the CloudOracle VM Consolidation and Path to the Cloud
Oracle VM Consolidation and Path to the CloudBob Rhubart
 
Engineered Systems: Oracle's Vision for the Future
Engineered Systems: Oracle's Vision for the FutureEngineered Systems: Oracle's Vision for the Future
Engineered Systems: Oracle's Vision for the FutureBob Rhubart
 
21st Century SOA
21st Century SOA21st Century SOA
21st Century SOABob Rhubart
 
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the CloudsRationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the CloudsBob Rhubart
 
Cloud Computing Industry Trends and Directions
Cloud Computing Industry Trends and DirectionsCloud Computing Industry Trends and Directions
Cloud Computing Industry Trends and DirectionsBob Rhubart
 
Manage and Monitor Oracle Applications in the Cloud
Manage and Monitor Oracle Applications in the CloudManage and Monitor Oracle Applications in the Cloud
Manage and Monitor Oracle Applications in the CloudBob Rhubart
 
21st Century Service Oriented Architecture
21st Century Service Oriented Architecture21st Century Service Oriented Architecture
21st Century Service Oriented ArchitectureBob Rhubart
 
Application-Driven Virtualization: Architectural Considerations
Application-Driven Virtualization: Architectural ConsiderationsApplication-Driven Virtualization: Architectural Considerations
Application-Driven Virtualization: Architectural ConsiderationsBob Rhubart
 
Oracle Enterprise Manager
Oracle Enterprise ManagerOracle Enterprise Manager
Oracle Enterprise ManagerBob Rhubart
 
Engineered Systems: Oracle’s Vision for the Future
Engineered Systems: Oracle’s Vision for the FutureEngineered Systems: Oracle’s Vision for the Future
Engineered Systems: Oracle’s Vision for the FutureBob Rhubart
 

More from Bob Rhubart (20)

Business Integration for the 21st Century
Business Integration for the 21st Century Business Integration for the 21st Century
Business Integration for the 21st Century
 
Oracle Cloud Reference Architecture
Oracle Cloud Reference ArchitectureOracle Cloud Reference Architecture
Oracle Cloud Reference Architecture
 
Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityEnterprise Strategy for Cloud Security
Enterprise Strategy for Cloud Security
 
Innovations in Grid Computing with Oracle Coherence
Innovations in Grid Computing with Oracle CoherenceInnovations in Grid Computing with Oracle Coherence
Innovations in Grid Computing with Oracle Coherence
 
Cloud Computing - A Pragmatic Approach to Cloud Adoption
Cloud Computing - A Pragmatic Approach to Cloud AdoptionCloud Computing - A Pragmatic Approach to Cloud Adoption
Cloud Computing - A Pragmatic Approach to Cloud Adoption
 
High Availability Infrastructure for Cloud Computing
High Availability Infrastructure for Cloud ComputingHigh Availability Infrastructure for Cloud Computing
High Availability Infrastructure for Cloud Computing
 
Engineered Systems: Oracle's Vision for the Future
Engineered Systems: Oracle's Vision for the FutureEngineered Systems: Oracle's Vision for the Future
Engineered Systems: Oracle's Vision for the Future
 
Innovations in Data Grid Technology with Oracle Coherence
Innovations in Data Grid Technology with Oracle CoherenceInnovations in Data Grid Technology with Oracle Coherence
Innovations in Data Grid Technology with Oracle Coherence
 
Making IT Simple: A Pragmatic Approach to Cloud Computing
Making IT Simple: A Pragmatic Approach to Cloud ComputingMaking IT Simple: A Pragmatic Approach to Cloud Computing
Making IT Simple: A Pragmatic Approach to Cloud Computing
 
Oracle Cloud Reference Architecture
Oracle Cloud Reference ArchitectureOracle Cloud Reference Architecture
Oracle Cloud Reference Architecture
 
Oracle VM Consolidation and Path to the Cloud
Oracle VM Consolidation and Path to the CloudOracle VM Consolidation and Path to the Cloud
Oracle VM Consolidation and Path to the Cloud
 
Engineered Systems: Oracle's Vision for the Future
Engineered Systems: Oracle's Vision for the FutureEngineered Systems: Oracle's Vision for the Future
Engineered Systems: Oracle's Vision for the Future
 
21st Century SOA
21st Century SOA21st Century SOA
21st Century SOA
 
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the CloudsRationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
 
Cloud Computing Industry Trends and Directions
Cloud Computing Industry Trends and DirectionsCloud Computing Industry Trends and Directions
Cloud Computing Industry Trends and Directions
 
Manage and Monitor Oracle Applications in the Cloud
Manage and Monitor Oracle Applications in the CloudManage and Monitor Oracle Applications in the Cloud
Manage and Monitor Oracle Applications in the Cloud
 
21st Century Service Oriented Architecture
21st Century Service Oriented Architecture21st Century Service Oriented Architecture
21st Century Service Oriented Architecture
 
Application-Driven Virtualization: Architectural Considerations
Application-Driven Virtualization: Architectural ConsiderationsApplication-Driven Virtualization: Architectural Considerations
Application-Driven Virtualization: Architectural Considerations
 
Oracle Enterprise Manager
Oracle Enterprise ManagerOracle Enterprise Manager
Oracle Enterprise Manager
 
Engineered Systems: Oracle’s Vision for the Future
Engineered Systems: Oracle’s Vision for the FutureEngineered Systems: Oracle’s Vision for the Future
Engineered Systems: Oracle’s Vision for the Future
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Enterprise Security Architecture: From access to audit

  • 1.
  • 2. <Insert Picture Here> Enterprise Security Architecture: From access to audit Paul Andres Director, Enterprise Architecture
  • 4. Changing Business Climate Challenges Our Customers Face… "In a time of accelerating turbulence, the valuation of a company will be strongly affected by how it executes change."
  • 5. Today’s IT Challenges More Compliant Business • Increasing regulatory demands • Increasing privacy concerns • Business viability concerns More Agile Business More Secured Business • More accessibility for employees, • Organized crime customers and partners • Identity theft • Higher level of B2B integrations • Intellectual property theft • Faster reaction to changing requirements • Constant global threats
  • 6. Today’s “New Normal” Users, Systems, Globalization and Compliance Forced Complexity Service Level Compliance & IT Records Anti-Money Anti- Compliance Ethics Programs Governance Retention Laundering Financial Supply Chain Audit Legal Data Privacy Reporting Traceability Management Discovery Compliance Users Finance Suppliers R&D Mfg Sales HR Legal Customers Systems Enterprise Data Database Mainframes Mobile Devices Apps Applications Warehouse Server Globalization EU Patriot Mandates SOX JSOX Directives FDA Basel II HIPAA GLBA Act SB1386 PCI…
  • 7. The Business Platform The Right Information to the Right People in the Right Format at the Right Time! Unified User Actionable Experience Analytics End-to-End Industry Processes HCM CRM Finance 3rd Party Custom Oracle Applications Non-Oracle Oracle Platform Agile Process Pervasive Business Content Existing Orchestration Intelligence Management Tools & Comprehensive Consistent + Centralized Infrastructure Security Scalable Data Development
  • 8. Oracle is ‘Information Driven’ • Manage It… • Use It… • Share It… • Protect It…
  • 9. Security for Apps, Middleware, Data and Infrastructure Comprehensive ‘Defense in Depth’ Approach Applications Automated Controls Automated Controls Monitoring and Configuration Monitoring and Configuration Enterprise Visibility Enterprise Visibility Access to Business Services Access to Business Services Fusion Lower Cost of User Lifecycle Lower Cost of User Lifecycle Middleware Data Protection and Privacy Data Protection and Privacy Database and Infrastructure Unbreakable Linux Unbreakable Linux Copyright © 2008, Oracle and/or its affiliates. All rights reserved. 9
  • 11. Oracle Enterprise Architecture Framework Methodology Business Architecture Governance Motivation Function Organization Drivers Models Products Mission Finance Reference Goals Strategy Services Roles Architectures Objectives Processes People EA Governance Strategy Applications Architecture Performance Principles Reference Architectures Functional Services Products Standards Risk Strategy General General General Components Security Policy Principles Industry Industry Industry Cost Integrity Business Continuity Capabilities Information Architecture Compliance Reference Architectures Entities Structures Portfolio Requirements Strategy Management Standards Models Design Principles Components Development Structures Data Quality Standards Test SLA’s Production Reference Technology Architecture Architectures Platform Services Products General Services Strategy SOA/ EDA Infrastructure Components Principles Cost Standards Data Management Development Security Management Version 2 (Draft)
  • 12. Enterprise Architecture Security Model Assess Business Objectives Vulnerability Penetration Testing Assessment Quantitative & Define Risks & Qualitative Risk Risk Analysis Threats Assessment Protection Data Functionality Requirements Classification Evaluation Security System Policy & Legal Liabilities Awareness Reliability Procedures Cost Effective Safeguards Counter Measures Solutions Data Integrity Confidentiality Security Assurance Security Domains Access Control Systems Security Management & Methodology Security Architecture & Operations Security Practices Models Laws, Investigations, & App and Systems Business Continuity & Ethics Development Security Disaster Recovery Telecommunications & Network Security Cryptography Physical Security * CISSP, Shone Harris
  • 13. TOGAF to Oracle Security Mapping GRC, Security Policy Data Protection & Privacy Access Security Control Management
  • 16. TOGAF 9 Capability Framework
  • 20. Oracle Security Components Applications E-Business Suite, PeopleSoft, Siebel, Hyperion, JDE SAP, Custom, Legacy Access Identity Web Service Enterprise Manager Identity Manager Federation Manager and Access Identity Manager Management Directory Services Database Vault Audit Vault Data Advanced Label Security Security Security Option Information Rights Management
  • 21. Oracle’s “Top to Bottom” GRC Strategy Analytics Define Your Policy…Connect to IT Controls…Analyze Your Results! • Real-time Leveraged Output and visibility Compliance Visibility • Pre-Made reports and dashboards Analyze Policy and Controls Map Risks-Policy-Controls Track Policy • By Standard Test & Gather Evidence GRC Manager • By Cycle • By Application Track Issues + Remediate • By Process Connect Policies to Controls • Embedded and Controls Set Control Rules Embedded Identity Access Enterprise- Low-Level Detail App Controls Management Management Wide Controls Configuration Database Information • Oracle and Handle Exceptions Management Controls Rights Mgmt Non-Oracle
  • 22. Orace Identity Management Components Oracle Role Manager Oracle Identity Manager Enterprise Applications Basic Authentication / Course-Grained Authorization / Audit / User Administration Business Custom Helpdesk Email Portals Apps Apps Employees Customers Suppliers Oracle Access Manager - Identity Oracle Internet (Meta) Directory Oracle Virtual Directory Data and User Stores Directories Databases Operating Systems Oracle Identity Manager Oracle Role Manager
  • 23. A Typical Environment… Data Tier Presentation Tier Logic (Business) Tier
  • 24. Identity and Access Challenges Problems • No Ability to Establish User Roles • Manual User Administration (Int + Ext) • No knowledge of “Who has access to what?” • Multiple Sign-Ons + Forgotten Passwords Problems • No Self Service or Password Management • Unstructured Content is not controlled • Access to sensitive DB data is not controlled • Difficult to Manage Environment
  • 25. Solution: Centralize and Simplify Access SSO En ab led Ap pli cat ion s
  • 26. Solution: Simplify Access to Multiple Datastores…
  • 27. Solution: Simplify Employee to Business Partner Login SSO +F ed e rat i on -En ab l ed Ap p s
  • 28. FMW Security as a Service Oracle 3rd Party Custom Legacy Applications Fusion ISF Aware Developed Applications Applications ISF Aware Business Functions & Middleware Applications Authentication User Authorization Business Business Business Management Federation Functions Functions Functions Legacy Integration Interface Connectors, Agents Oracle IAM Suite with Identity Services Framework Service Interfaces WS-*, SPML, SAML, XACML, CARML Identity Services Authentication Provisioning Identity Provider Audit Authorization Administration Role Provider Federation & Trust Enterprise Identity Management Infrastructure Policy & Orchestration Virtualization & User Store
  • 29. Fusion Security Architecture OAM Enterprise Authentication Identity Store Federation Services (OIF) (LDAP) Single Sign-On Sign- Identity Provisioning & Authentication Reconciliation Fusion Applications OC4J FIDM Identity Provisioning Identity Administration ADF ATG Account Provisioning JAAS+ Security Account Administration Extensible Security (XS) Enterprise Role Mgmt Account + Role Operational Interaction RDBMS Provisioning & using JDBC Reconciliation LUS (Extensible Security) FIDM Operational Store
  • 30. Policy-Driven Security & Identity Management Policy-Driven Security & Identity Management portal .NET logic CICS wrap Customers WSM PEP WSM PEP WSM PEP J2EE logic Legacy WSM PEP Trading B2Bi logic Partners TIBX logic App logic WSM PEP WSM PEP CRM WSM PEP B2B Exchanges FRONT OFFICE INTEGRATION SERVICES BACK OFFICE Oracle WSM Oracle Oracle WSM Policy Identity Monitor Manager Services Architects Security Operations
  • 31. Expose, Secure and Manage Web Services… Auditor Security IT Admin Partner Portal Portals Outsourced Provider AD / Exchange IIS/ASP Apps | Peoplesoft Virtual Access Manager HR Mainframe Web SSO & (RACF /ACF2/TS Directory Environment) Web IdMgt Packaged Applications using Sun or Apache ` Business Users Unix Linux Customers Partners , Vendors Employees Apps w / Portals Web Service Web using Services Web Services Manager
  • 32. Oracle Database Security Components Enterprise Applications Business Custom Helpdesk Email Portals Apps Apps Database Operational Data DBA / DBA Manager Protect Data Vault Protect Data from in Motion with View and Alteration Select SALARY X Network from users; as well as Insider Encryption using Alter system. X Threat using Alter table.. Advanced Security 5 Database Vault Consolidate Audit Option * Example roles and privs Data & Show Reports Operational using Audit Vault Alter table …. DBA Select SALARY from USERS; Protect User and Sensitive Data LNAME SSN SALARY at Rest by Encrypting Database KING 123-45-6789 $125,000 Columns using SCOTT 987-65-4321 $229,500 Securely Backup Data To Advanced Security Option SMITH 345-67-8912 $ 53,700 Tape with Secure Backup LNAME CREDIT_CARD EXP_DATE KING 1234-5678-9123 04-2010 SCOTT 2345-6789-4321 09-2012 SMITH 9876-5432-1987 01-2011
  • 33. Securing Database Operational Data DBA / DBA Manager Separation of Vault Duties with the Database… Database Vault Protects Against Select SSN from cust; X Alter system.. X Insider Threats Alter table …. * Example roles and privs Operational Alter table …. DBA KING 18031 KING, 18031, $1,800 5 0 SCOTT 14220 Select ssn from cust; SMITH 17170 ִ Protect Data at Rest Protect Data in Motion Transparently Encrypt with Network Encryption Database Columns with Advance Security Option Advance Security Option Encrypt Backup of KING, 18031, $1,800 Database and Flat Files 5 0 KING 18031 SCOTT 14220 to Tape with SMITH 17170 ִ Consolidate & Report on Audit Data Manage Database IT Admin with Audit Vault Identities / Roles with IT Security Audit Data DBA Manager Warehouse
  • 35. Oracle Enterprise Security Identity And Access Management Governance Risk User Management Directory Management Compliance Access Management Platform Security Identity Audit Policy & Process Application Security Management Enterprise Control Data Security Compliance Multi-level Access Control Encryption Analysis & Information Rights DBA Security Monitoring & Alert Reporting Operating System Security Audit Automation Authentication Service User Management