Mais conteúdo relacionado
Semelhante a FulcrumWay Webinar - Fusion Security (20)
FulcrumWay Webinar - Fusion Security
- 1. Oracle Fusion Security Simplified
FulcrumWay Leading Provider of Enterprise Risk Assessment Mitigation and Remediation Solutions
Enterprise Risk Management
Financial Close Monitor
Advanced Controls Catalog
Enterprise Audit
GRC Monitor
Leverage Technology:
Move Your Business Forward™
Give me a lever long enough and a fulcrum on which to place it, and I shall move the world - Archimedes
Copyright ©. Fulcrum Information Technology, Inc.
- 3. The following is intended to outline our general product direction. It is intended
for information purposes only, and may not be incorporated into any contract.
It is not a commitment to deliver any material, code, or functionality, and should
not be relied upon in making purchasing decisions. The development, release,
and timing of any features or functionality described for Oracle’s products
remains at the sole discretion of Oracle.
3
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
- 4. Program Agenda
Challenges in Security Administration
Shaping Security to Match Your Business
Staying Ahead of Changes
Demo
Q&A
4
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
- 6. The Security Diaspora
One tool for role design
One tool for user provisioning
One tool for data security management
One tool for supporting end user access
and authorization issues
One tool for upgrade assessment
6
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
- 8. Envision a Global View
Single UI for all security activities
Visualization of the entire security model
Assisted search across all security artifacts
8
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
- 12. Role Design and Customization Challenges
Leverage the Fusion Applications security reference model
Customize roles from a business or menu perspective
Match privileges to on-screen elements
Adjust the reference roles
Test the resulting user interface
12
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
- 15. Stay Ahead of Changes
15
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
- 16. Product Upgrade Challenges
Disruptive new functionality
Identifying the new functionality
Fitting new functionality to your existing model
Identifying users that need to be (re)trained
Offering a complete security assessment
16
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
- 19. Scenario: Assessing Product Upgrade Impact
Solutions
Unified Search
Compare Roles
Security Model Visualization
19
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
- 20. Scenario: Help Desk User Missing a Menu
Solutions
Unified Search
Security Model Visualization
Graph Pivot
Menu Simulator
Copy Role
20
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
- 21. FulcrumWay
Fusion Security and Oracle
Enterprise Governance Risk and
Compliance
by
Tony Olivo
Sr. Client Services Director
Copyright © FulcrumWay
Page 21
www.fulcrumway.com
- 22. Fusion RBAC
Security
GRC Security Components
User
Job Role
Duty Role
Data Role
Privileges
Module
Document
State
Action
Perspective
Copyright © FulcrumWay
Page 22
www.fulcrumway.com
- 23. Fusion RBAC
Security
Manage User Security – User
Management
Manage user community across the application.
A user’s access is the combination of all their assigned job roles
Copyright © FulcrumWay
Page 23
www.fulcrumway.com
- 24. Fusion RBAC
Security
Using Perspectives on Objects
Perspectives are used to secure data.
– A Perspective node is assigned to an object.
– That object is only available to a user that has that
perspective node assigned to their data role for that
object.
Sample Perspective
ABC
Company
North
America
New York
Latin
America
Mexico
Chicago
Europe
London
Paris
Los Angeles
Copyright © FulcrumWay
Page 24
www.fulcrumway.com
- 25. Fusion RBAC
Security
Using Perspectives on Objects
Perspectives can be associated with various
objects
– AACG / TCG
• Continuous Controls
• Models
• Incidents
– EGRCM
• Process
• Risk
• Control
Copyright © FulcrumWay
Page 25
www.fulcrumway.com
- 26. Fusion RBAC
Security
EGRC Objects Secured by RBAC
AACG and TCG
Models
– View and Manage Access
Continuous Controls
– View and Manage Access
Incidents
– View, Manage and Investigator Access
Copyright © FulcrumWay
Page 26
www.fulcrumway.com
- 27. Fusion RBAC
Security
EGRC Objects Secured by RBAC
EGRCM
Following EGRCM objects have View, Manage, Review
and Approve job roles
–
–
–
–
–
–
Copyright © FulcrumWay
Perspective
Process
Risk
Control
Issue
Remediation Plans
Page 27
www.fulcrumway.com
- 31. Thank You! Join us on LinkedIn to view
Summary and Q&A
webinar and discussion
Copyright © FulcrumWay
Page 31
www.fulcrumway.com