SlideShare a Scribd company logo
1 of 27
 
Implementing CS Security as Part of Your Project
Introductions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle. Safe Harbor
Overview <Insert Picture Here> During any implementation or upgrade, security becomes a huge project task.  The typical project will run into resource issues as the functional teams are trying to accomplish their testing and configuration.  Security tends to get put on a back burner, or even forgotten about as pressing deadlines start to loom closer and closer.  How do you plan security tasks into a project, so that you are better prepared, and what considerations should be prepared for early on in the project to help pave the way down the road?
Agenda ,[object Object],[object Object],[object Object],<Insert Picture Here> ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Decisions, Decisions ,[object Object],[object Object]
Decisions, Decisions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Decisions, Decisions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Fit-Gap ,[object Object]
Fit-Gap ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Transition from Fit-Gap to Design ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Design Non-Production Security- Design security for initial testing and configuration of the system ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Design Production Security
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Design Production Security
Design Production Security
Transition Design to Testing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Testing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Testing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Transition from Testing to Production ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Production ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Tips for Success ,[object Object],[object Object],[object Object]
Tips for Success  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Tips for Success ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Tips for Success ,[object Object],[object Object],[object Object],[object Object]
Tips for Success ,[object Object],[object Object],[object Object],[object Object]
Questions? ,[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Defect effort prediction models in software maintenance projects
Defect  effort prediction models in software maintenance projectsDefect  effort prediction models in software maintenance projects
Defect effort prediction models in software maintenance projectsiaemedu
 
Evaluation of an Interactive Device : Microsoft Surface RT
Evaluation of an Interactive Device : Microsoft Surface RTEvaluation of an Interactive Device : Microsoft Surface RT
Evaluation of an Interactive Device : Microsoft Surface RTsampahdavid
 
Design For Strangers
Design For StrangersDesign For Strangers
Design For Strangerstest99
 
Designfo#{1} #{2}trangers
Designfo#{1} #{2}trangersDesignfo#{1} #{2}trangers
Designfo#{1} #{2}trangersguest0437b8
 
Designfor Strangers
Designfor StrangersDesignfor Strangers
Designfor Strangersguest08cd22
 
What I Learned In Pr Writing
What I Learned In Pr WritingWhat I Learned In Pr Writing
What I Learned In Pr Writingcwhitin4
 
Testing technology products
Testing technology productsTesting technology products
Testing technology productsDave Kreimer
 
SAD07 - Project Management
SAD07 - Project ManagementSAD07 - Project Management
SAD07 - Project ManagementMichael Heron
 
SW Engineering Management
SW Engineering ManagementSW Engineering Management
SW Engineering ManagementRobert Sayegh
 
The best way to design secure software products
The best way to design secure software productsThe best way to design secure software products
The best way to design secure software productsLabSharegroup
 
Architecture In An Agile World
Architecture In An Agile WorldArchitecture In An Agile World
Architecture In An Agile WorldJames Cooper
 
software Prototyping
software Prototypingsoftware Prototyping
software PrototypingYahia Haider
 
Classic Testing Mistakes 0226
Classic Testing Mistakes 0226Classic Testing Mistakes 0226
Classic Testing Mistakes 0226MBA_Community
 

What's hot (15)

Anti-Patterns
Anti-PatternsAnti-Patterns
Anti-Patterns
 
Defect effort prediction models in software maintenance projects
Defect  effort prediction models in software maintenance projectsDefect  effort prediction models in software maintenance projects
Defect effort prediction models in software maintenance projects
 
Evaluation of an Interactive Device : Microsoft Surface RT
Evaluation of an Interactive Device : Microsoft Surface RTEvaluation of an Interactive Device : Microsoft Surface RT
Evaluation of an Interactive Device : Microsoft Surface RT
 
Design For Strangers
Design For StrangersDesign For Strangers
Design For Strangers
 
Designfo#{1} #{2}trangers
Designfo#{1} #{2}trangersDesignfo#{1} #{2}trangers
Designfo#{1} #{2}trangers
 
Designfor Strangers
Designfor StrangersDesignfor Strangers
Designfor Strangers
 
What I Learned In Pr Writing
What I Learned In Pr WritingWhat I Learned In Pr Writing
What I Learned In Pr Writing
 
Testing technology products
Testing technology productsTesting technology products
Testing technology products
 
SAD07 - Project Management
SAD07 - Project ManagementSAD07 - Project Management
SAD07 - Project Management
 
Faqs rpa
Faqs rpaFaqs rpa
Faqs rpa
 
SW Engineering Management
SW Engineering ManagementSW Engineering Management
SW Engineering Management
 
The best way to design secure software products
The best way to design secure software productsThe best way to design secure software products
The best way to design secure software products
 
Architecture In An Agile World
Architecture In An Agile WorldArchitecture In An Agile World
Architecture In An Agile World
 
software Prototyping
software Prototypingsoftware Prototyping
software Prototyping
 
Classic Testing Mistakes 0226
Classic Testing Mistakes 0226Classic Testing Mistakes 0226
Classic Testing Mistakes 0226
 

Similar to Implementing Security Cs Ps

Problem Solving Methodology 2011 - 2014
Problem Solving Methodology 2011 - 2014Problem Solving Methodology 2011 - 2014
Problem Solving Methodology 2011 - 2014snoonan
 
Management Information Systems – Week 7 Lecture 2Developme.docx
Management Information Systems – Week 7 Lecture 2Developme.docxManagement Information Systems – Week 7 Lecture 2Developme.docx
Management Information Systems – Week 7 Lecture 2Developme.docxcroysierkathey
 
How to implement an enterprise system
How to implement an enterprise systemHow to implement an enterprise system
How to implement an enterprise systemMiki Lumnitz
 
IFSM 301 – Week 4 Citations (NIST, 2009) (The six phas
IFSM 301 – Week 4 Citations (NIST, 2009) (The six phasIFSM 301 – Week 4 Citations (NIST, 2009) (The six phas
IFSM 301 – Week 4 Citations (NIST, 2009) (The six phasMalikPinckney86
 
Successful DevSecOps Organizations - by Dawid Balut
Successful DevSecOps Organizations - by Dawid BalutSuccessful DevSecOps Organizations - by Dawid Balut
Successful DevSecOps Organizations - by Dawid BalutDawid Balut
 
Implementing a testing strategy
Implementing a testing strategyImplementing a testing strategy
Implementing a testing strategyDaniel Giraldo
 
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares theCriterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares theCruzIbarra161
 
Project Documentation Student Management System format.pptx
Project Documentation Student Management System format.pptxProject Documentation Student Management System format.pptx
Project Documentation Student Management System format.pptxAjayPatre1
 
Software Engineering in a Quick and Easy way - v1.pdf
Software Engineering in a Quick and Easy way - v1.pdfSoftware Engineering in a Quick and Easy way - v1.pdf
Software Engineering in a Quick and Easy way - v1.pdfKAJAL MANDAL
 
Brown aug11 bsdmag
Brown aug11 bsdmagBrown aug11 bsdmag
Brown aug11 bsdmagDru Lavigne
 
Software engineering
Software engineeringSoftware engineering
Software engineeringsweetysweety8
 
A Basic Introduction to Creating a Software Requirements Specification
A Basic Introduction to Creating a Software Requirements SpecificationA Basic Introduction to Creating a Software Requirements Specification
A Basic Introduction to Creating a Software Requirements SpecificationQuekelsBaro
 
Successful Software Projects - What you need to consider
Successful Software Projects - What you need to considerSuccessful Software Projects - What you need to consider
Successful Software Projects - What you need to considerLloydMoore
 
Aula 1 - Project Management Concepts by Roger Pressman
Aula 1 - Project Management Concepts by Roger PressmanAula 1 - Project Management Concepts by Roger Pressman
Aula 1 - Project Management Concepts by Roger PressmanRogerio P C do Nascimento
 
According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,Jill Lyons
 
Software development process basic
Software development process basicSoftware development process basic
Software development process basicAnurag Tomar
 
Continuous Integration
Continuous IntegrationContinuous Integration
Continuous IntegrationPreetam Palwe
 

Similar to Implementing Security Cs Ps (20)

Problem Solving Methodology 2011 - 2014
Problem Solving Methodology 2011 - 2014Problem Solving Methodology 2011 - 2014
Problem Solving Methodology 2011 - 2014
 
Management Information Systems – Week 7 Lecture 2Developme.docx
Management Information Systems – Week 7 Lecture 2Developme.docxManagement Information Systems – Week 7 Lecture 2Developme.docx
Management Information Systems – Week 7 Lecture 2Developme.docx
 
How to implement an enterprise system
How to implement an enterprise systemHow to implement an enterprise system
How to implement an enterprise system
 
IFSM 301 – Week 4 Citations (NIST, 2009) (The six phas
IFSM 301 – Week 4 Citations (NIST, 2009) (The six phasIFSM 301 – Week 4 Citations (NIST, 2009) (The six phas
IFSM 301 – Week 4 Citations (NIST, 2009) (The six phas
 
Successful DevSecOps Organizations - by Dawid Balut
Successful DevSecOps Organizations - by Dawid BalutSuccessful DevSecOps Organizations - by Dawid Balut
Successful DevSecOps Organizations - by Dawid Balut
 
Implementing a testing strategy
Implementing a testing strategyImplementing a testing strategy
Implementing a testing strategy
 
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares theCriterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
 
Project Documentation Student Management System format.pptx
Project Documentation Student Management System format.pptxProject Documentation Student Management System format.pptx
Project Documentation Student Management System format.pptx
 
Software Engineering in a Quick and Easy way - v1.pdf
Software Engineering in a Quick and Easy way - v1.pdfSoftware Engineering in a Quick and Easy way - v1.pdf
Software Engineering in a Quick and Easy way - v1.pdf
 
ICISS Newsletter Sept 14
ICISS Newsletter Sept 14ICISS Newsletter Sept 14
ICISS Newsletter Sept 14
 
Brown aug11 bsdmag
Brown aug11 bsdmagBrown aug11 bsdmag
Brown aug11 bsdmag
 
Software engineering
Software engineeringSoftware engineering
Software engineering
 
A Basic Introduction to Creating a Software Requirements Specification
A Basic Introduction to Creating a Software Requirements SpecificationA Basic Introduction to Creating a Software Requirements Specification
A Basic Introduction to Creating a Software Requirements Specification
 
Successful Software Projects - What you need to consider
Successful Software Projects - What you need to considerSuccessful Software Projects - What you need to consider
Successful Software Projects - What you need to consider
 
An Introduction to Project management(project management tutorials)
An Introduction to Project management(project management tutorials)An Introduction to Project management(project management tutorials)
An Introduction to Project management(project management tutorials)
 
Aula 1 - Project Management Concepts by Roger Pressman
Aula 1 - Project Management Concepts by Roger PressmanAula 1 - Project Management Concepts by Roger Pressman
Aula 1 - Project Management Concepts by Roger Pressman
 
16346915.ppt
16346915.ppt16346915.ppt
16346915.ppt
 
According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,
 
Software development process basic
Software development process basicSoftware development process basic
Software development process basic
 
Continuous Integration
Continuous IntegrationContinuous Integration
Continuous Integration
 

Implementing Security Cs Ps

  • 1.  
  • 2. Implementing CS Security as Part of Your Project
  • 3.
  • 4. The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle. Safe Harbor
  • 5. Overview <Insert Picture Here> During any implementation or upgrade, security becomes a huge project task. The typical project will run into resource issues as the functional teams are trying to accomplish their testing and configuration. Security tends to get put on a back burner, or even forgotten about as pressing deadlines start to loom closer and closer. How do you plan security tasks into a project, so that you are better prepared, and what considerations should be prepared for early on in the project to help pave the way down the road?
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.

Editor's Notes

  1. What decisions need to be made in the first month of the project plan? (3c, groups, si’s the whose &amp; methodologies) Who should be making those decisions? Early tasks that should be taken prior to letting the users into the database environments? (process, mass change, primary, dda, query trees, baseline user profile for self-service. Mapping pages- Who and How? PeopleTools, Reporting Tools and other Misc. page Permissions Designing, Building, and Testing permissions Row Level security, Defining SACR, Functional teams responsibilities for Security Config pages (enrollment, actions
  2. If using consultant, bring in early, get through 80% or so, then come back week or two before go-live through week or two after
  3. Main Points- Get the leads behind this early on, separate security pieces, App security, data security, query security, process security, mass change, search match, and the list goes on! There can be more than one way to reach the same page, highway, freeway, side roads, take the subway. Will you use multiple paths, or do you want to limit it to one?
  4. This is a good place to bring up query security again, who needs access to the joint tables in query? HCM- Identify campus users needing access into HCM for HCM’s approval, and HCM employees that need CS specific pages.
  5. Points- less intimidating to users coming into the system Focus the attention on the pages that matter Remember, these pages aren’t gone forever (big fear of some users) they can always view them and play with them in Demo, and they can be added back into the mix in the future if needed Query- Set up a “all access” node on the tree for records that all modules will need access to
  6. Security decisions- parameters mandated by policy (separation of duties, masking, no correct history, no generic userid’s, no multiple userid’s for any user)
  7. Have the teams start on their modules security mapping first, as the security person can start building this while getting approvals for the “shopping lists” By handling the cross module pages this way, you can get approvals, suggestions for better pages, or in some cases decisions for no access to the requested pages, as well as people may realize that they also need access to a page another team is requesting
  8. Schedule down time to refresh cache as this will be required once in a while. If it is scheduled, less impact to users. If you can get security tested prior to SIT or UAT, great
  9. Determine ahead of time when the “god access: ID’s get locked in testing process, and production security becomes the name of the game.
  10. Differentiate go to from earlier slide from modules go to person
  11. Function- less personal, more flexible, less maintenance- pages exist in only 1-3 pemission lists, depending on the level of access needed Roles- less thought, less permission lists, more work to maintain the PL’s as pages may exist in many more PL’s during an upgrade, patch, update