SlideShare a Scribd company logo
1 of 15
ORACLE CLOUD
SECURITY
By Amit Bhatnagar
Contents
◦ Security in ERP
◦ Common ERP Vulnerabilities
◦ Core Security Pillars
◦ Security in Oracle Cloud
◦ Oracle Cloud ERP Roles
◦ Function & Data Security Policies
◦ Setup Process in Oracle Cloud
◦ Creating Users
◦ Creating Custom Roles
◦ Extra Bytes
◦ Q&A?
Security in ERP
• ERP Security is a wide range of measures aimed at protecting Enterprise resource planning (ERP)
systems from illicit access ensuring accessibility and integrity of system data
• ERP system serves to unify the information intended to manage the organization
• The Advantage of having ERP is that it provides data consistency and all in one solution
Common ERP Vulnerabilities
• Access Control
• Inadequate Training
• Failure to Comply
• Unsecure Integration
• Data Encryption and Masking issues
• Complex Solutions
Core Security Pillars
• Data Encryption
• Security Controls
• Visibility
• Hybrid Cloud
• High Availability
Security in Oracle Cloud
Oracle Cloud ERP Roles
Oracle ERP Cloud uses 3 types of roles:
Job Roles
Represent jobs that users perform in an organization, e.g. General Accountant, Accounts
Payable Manager
Can be assigned to users
Abstract Roles
Represent people in the organization independent of the jobs they perform, e.g. Employee,
Line Manager
Can be assigned to users
Duty Roles
Logical collection of privileges that grant access to tasks that someone performs as part of a
job
Not assignable to users directly
Function & Data Security Policies
• Function Security Policies are defined via function security privileges
• Each function security privilege secures the code resources that make up the relevant pages, page
components (like tabs and buttons) and scheduled jobs
• Data Security Policy defines access by a role, to a business object, with a condition and for an action
(data security privilege)
• Aggregate Privilege combines function security privileges with related data security policies
Setup Process in Oracle Cloud
Data Access Set
Access Set Type Access Level
Full Ledger
Primary
Balancing
Segment
Read Only Read and
Write
Implementing Security In Oracle Cloud
• Create a User
• Assign roles
• Assign Security context to the user through Data Access Set
Creating a User
Use the Create User task to create users if Human Capital Management (HCM)
is NOT being implemented. Create User task creates a minimal person record
and a user account
If HCM is being implemented, use the Hire an Employee task to create users
instead. Hire an Employee task creates the full person record needed by HCM
as well as the user account
Use the Security Console to create implementation only users. Implementation
users are user accounts without the associated person record.
Creating a Custom Role
Managing Data Access
◦ Use the Manage Data Access for
Users task to manage data scope
assignments
◦ Search assignments for a single
user or a single role
◦ You can further filter the search
results, or export the results to
Excel
◦ You can also authorize additional
data accesses
Extra Bytes – Data Import
◦ File based Data Import
◦ ADF Desktop Integration
Q&A
shivmohanp@cltcsi.com
amitb@cltcsi.com
sales@cltcsi.com

More Related Content

What's hot

Fusion applications gl and ar suresh c-mishra
Fusion applications   gl and ar suresh c-mishraFusion applications   gl and ar suresh c-mishra
Fusion applications gl and ar suresh c-mishraSuresh Mishra
 
Oracle EBS R 12 Core hr user manual
Oracle EBS R 12 Core hr user manualOracle EBS R 12 Core hr user manual
Oracle EBS R 12 Core hr user manualFeras Ahmad
 
Best practices for fusion hcm cloud implementation
Best practices for fusion hcm cloud implementationBest practices for fusion hcm cloud implementation
Best practices for fusion hcm cloud implementationFeras Ahmad
 
Creating Reports with Financial Reporting Web Studio.pptx
Creating Reports with Financial Reporting Web Studio.pptxCreating Reports with Financial Reporting Web Studio.pptx
Creating Reports with Financial Reporting Web Studio.pptxMurtuzaS1
 
Introducing Oracle Advanced Financial Controls Cloud Service
Introducing Oracle Advanced Financial Controls Cloud ServiceIntroducing Oracle Advanced Financial Controls Cloud Service
Introducing Oracle Advanced Financial Controls Cloud ServiceDane Roberts
 
Olm implementation steps
Olm implementation stepsOlm implementation steps
Olm implementation stepsFeras Ahmad
 
Introduction to Oracle Fusion BIP Reporting
Introduction to Oracle Fusion BIP ReportingIntroduction to Oracle Fusion BIP Reporting
Introduction to Oracle Fusion BIP ReportingGurpreet singh
 
Presentation- on OIM
Presentation- on OIMPresentation- on OIM
Presentation- on OIMTamim Khan
 
Oracle Project Financial Management Cloud in 9 Weeks
Oracle Project Financial Management Cloud in 9 WeeksOracle Project Financial Management Cloud in 9 Weeks
Oracle Project Financial Management Cloud in 9 WeeksPerficient, Inc.
 
Oracle fusion cloud financial : How to create Journal , Manual Vs Spreadsheet?
Oracle fusion cloud financial : How to create Journal , Manual Vs Spreadsheet?Oracle fusion cloud financial : How to create Journal , Manual Vs Spreadsheet?
Oracle fusion cloud financial : How to create Journal , Manual Vs Spreadsheet?Pranav Pandya
 
Setup Oracle EBS R12 Performance Management
Setup Oracle EBS R12 Performance ManagementSetup Oracle EBS R12 Performance Management
Setup Oracle EBS R12 Performance ManagementFeras Ahmad
 
Oracle Fusion Applications Accounts Payables
Oracle Fusion Applications Accounts PayablesOracle Fusion Applications Accounts Payables
Oracle Fusion Applications Accounts PayablesBerry Clemens
 
Query all roles and duties and privileges Oracle Fusion Cloud
Query all roles and duties and privileges Oracle Fusion CloudQuery all roles and duties and privileges Oracle Fusion Cloud
Query all roles and duties and privileges Oracle Fusion CloudFeras Ahmad
 
Oracle Succession Planning Setup
Oracle Succession Planning SetupOracle Succession Planning Setup
Oracle Succession Planning SetupFeras Ahmad
 
Oracle Fusion Financials Overview
Oracle Fusion Financials OverviewOracle Fusion Financials Overview
Oracle Fusion Financials OverviewBerry Clemens
 
Oracle Fixed assets ivas
Oracle Fixed assets ivasOracle Fixed assets ivas
Oracle Fixed assets ivasAli Ibrahim
 
Case study: Managing a Fusion Financials Cloud Implementation with Oracle Uni...
Case study: Managing a Fusion Financials Cloud Implementation with Oracle Uni...Case study: Managing a Fusion Financials Cloud Implementation with Oracle Uni...
Case study: Managing a Fusion Financials Cloud Implementation with Oracle Uni...Jade Global
 

What's hot (20)

Fusion applications gl and ar suresh c-mishra
Fusion applications   gl and ar suresh c-mishraFusion applications   gl and ar suresh c-mishra
Fusion applications gl and ar suresh c-mishra
 
Oracle EBS R 12 Core hr user manual
Oracle EBS R 12 Core hr user manualOracle EBS R 12 Core hr user manual
Oracle EBS R 12 Core hr user manual
 
Best practices for fusion hcm cloud implementation
Best practices for fusion hcm cloud implementationBest practices for fusion hcm cloud implementation
Best practices for fusion hcm cloud implementation
 
Creating Reports with Financial Reporting Web Studio.pptx
Creating Reports with Financial Reporting Web Studio.pptxCreating Reports with Financial Reporting Web Studio.pptx
Creating Reports with Financial Reporting Web Studio.pptx
 
Introducing Oracle Advanced Financial Controls Cloud Service
Introducing Oracle Advanced Financial Controls Cloud ServiceIntroducing Oracle Advanced Financial Controls Cloud Service
Introducing Oracle Advanced Financial Controls Cloud Service
 
Olm implementation steps
Olm implementation stepsOlm implementation steps
Olm implementation steps
 
Introduction to Oracle Fusion BIP Reporting
Introduction to Oracle Fusion BIP ReportingIntroduction to Oracle Fusion BIP Reporting
Introduction to Oracle Fusion BIP Reporting
 
Presentation- on OIM
Presentation- on OIMPresentation- on OIM
Presentation- on OIM
 
Oracle Project Financial Management Cloud in 9 Weeks
Oracle Project Financial Management Cloud in 9 WeeksOracle Project Financial Management Cloud in 9 Weeks
Oracle Project Financial Management Cloud in 9 Weeks
 
Oracle fusion cloud financial : How to create Journal , Manual Vs Spreadsheet?
Oracle fusion cloud financial : How to create Journal , Manual Vs Spreadsheet?Oracle fusion cloud financial : How to create Journal , Manual Vs Spreadsheet?
Oracle fusion cloud financial : How to create Journal , Manual Vs Spreadsheet?
 
Setup Oracle EBS R12 Performance Management
Setup Oracle EBS R12 Performance ManagementSetup Oracle EBS R12 Performance Management
Setup Oracle EBS R12 Performance Management
 
Oracle HRMS & Payroll
Oracle HRMS & PayrollOracle HRMS & Payroll
Oracle HRMS & Payroll
 
23 workflow approvals
23 workflow approvals23 workflow approvals
23 workflow approvals
 
Oracle Fusion Applications Accounts Payables
Oracle Fusion Applications Accounts PayablesOracle Fusion Applications Accounts Payables
Oracle Fusion Applications Accounts Payables
 
Query all roles and duties and privileges Oracle Fusion Cloud
Query all roles and duties and privileges Oracle Fusion CloudQuery all roles and duties and privileges Oracle Fusion Cloud
Query all roles and duties and privileges Oracle Fusion Cloud
 
Oracle Succession Planning Setup
Oracle Succession Planning SetupOracle Succession Planning Setup
Oracle Succession Planning Setup
 
Oracle Fusion Financials Overview
Oracle Fusion Financials OverviewOracle Fusion Financials Overview
Oracle Fusion Financials Overview
 
Oracle Identity Manager Basics
Oracle Identity Manager BasicsOracle Identity Manager Basics
Oracle Identity Manager Basics
 
Oracle Fixed assets ivas
Oracle Fixed assets ivasOracle Fixed assets ivas
Oracle Fixed assets ivas
 
Case study: Managing a Fusion Financials Cloud Implementation with Oracle Uni...
Case study: Managing a Fusion Financials Cloud Implementation with Oracle Uni...Case study: Managing a Fusion Financials Cloud Implementation with Oracle Uni...
Case study: Managing a Fusion Financials Cloud Implementation with Oracle Uni...
 

Similar to Oracle cloud security | User Security, Roles, Access Control and more

Microsoft Dynamics CRM Certification Training
Microsoft Dynamics CRM Certification TrainingMicrosoft Dynamics CRM Certification Training
Microsoft Dynamics CRM Certification TrainingDavid Blumentals
 
Week-2_LectureA1_701.pdf
Week-2_LectureA1_701.pdfWeek-2_LectureA1_701.pdf
Week-2_LectureA1_701.pdfssuserc3fe80
 
Enterprise 365 - SoftServe presentation
Enterprise 365 - SoftServe presentationEnterprise 365 - SoftServe presentation
Enterprise 365 - SoftServe presentationSergii Alekseev
 
Knowledge Transfer Training Presentation for Identity Lifecycle Manager
Knowledge Transfer Training Presentation for Identity Lifecycle ManagerKnowledge Transfer Training Presentation for Identity Lifecycle Manager
Knowledge Transfer Training Presentation for Identity Lifecycle ManagerMike Reams
 
Oracle Identity Management Leveraging Oracle’s Engineered Systems
Oracle Identity Management Leveraging Oracle’s Engineered SystemsOracle Identity Management Leveraging Oracle’s Engineered Systems
Oracle Identity Management Leveraging Oracle’s Engineered SystemsGregOracle
 
Database security 12.pdf
Database security 12.pdfDatabase security 12.pdf
Database security 12.pdfShajanShajan2
 
Security in oracle
Security in oracleSecurity in oracle
Security in oraclessuser40bb47
 
security in oracle database
security in oracle databasesecurity in oracle database
security in oracle databasessuser40bb47
 
O365Engage17 - Protecting O365 Data in a Modern World
O365Engage17 - Protecting O365 Data in a Modern WorldO365Engage17 - Protecting O365 Data in a Modern World
O365Engage17 - Protecting O365 Data in a Modern WorldNCCOMMS
 
Data Privacy By Design with AWS
Data Privacy By Design with AWSData Privacy By Design with AWS
Data Privacy By Design with AWSKrzysztof Kąkol
 
7. oracle iam11g+strategyodrom
7. oracle iam11g+strategyodrom7. oracle iam11g+strategyodrom
7. oracle iam11g+strategyodromDoina Draganescu
 
HSPUG presentation - Advanced Data Governance
HSPUG presentation - Advanced Data GovernanceHSPUG presentation - Advanced Data Governance
HSPUG presentation - Advanced Data GovernanceDavid Broussard
 
Designing for Privacy in AWS cloud
Designing for Privacy in AWS cloudDesigning for Privacy in AWS cloud
Designing for Privacy in AWS cloudKrzysztof Kąkol
 
Kangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot EDB Webinar Best Practices in Security with PostgreSQLKangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot EDB Webinar Best Practices in Security with PostgreSQLKangaroot
 
Microsoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App SecurityMicrosoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App SecurityAlbert Hoitingh
 

Similar to Oracle cloud security | User Security, Roles, Access Control and more (20)

Microsoft Dynamics CRM Certification Training
Microsoft Dynamics CRM Certification TrainingMicrosoft Dynamics CRM Certification Training
Microsoft Dynamics CRM Certification Training
 
Week-2_LectureA1_701.pdf
Week-2_LectureA1_701.pdfWeek-2_LectureA1_701.pdf
Week-2_LectureA1_701.pdf
 
Enterprise 365 - SoftServe presentation
Enterprise 365 - SoftServe presentationEnterprise 365 - SoftServe presentation
Enterprise 365 - SoftServe presentation
 
Knowledge Transfer Training Presentation for Identity Lifecycle Manager
Knowledge Transfer Training Presentation for Identity Lifecycle ManagerKnowledge Transfer Training Presentation for Identity Lifecycle Manager
Knowledge Transfer Training Presentation for Identity Lifecycle Manager
 
Oracle Identity Management Leveraging Oracle’s Engineered Systems
Oracle Identity Management Leveraging Oracle’s Engineered SystemsOracle Identity Management Leveraging Oracle’s Engineered Systems
Oracle Identity Management Leveraging Oracle’s Engineered Systems
 
Devi
DeviDevi
Devi
 
Database security 12.pdf
Database security 12.pdfDatabase security 12.pdf
Database security 12.pdf
 
Security in oracle
Security in oracleSecurity in oracle
Security in oracle
 
security in oracle database
security in oracle databasesecurity in oracle database
security in oracle database
 
O365Engage17 - Protecting O365 Data in a Modern World
O365Engage17 - Protecting O365 Data in a Modern WorldO365Engage17 - Protecting O365 Data in a Modern World
O365Engage17 - Protecting O365 Data in a Modern World
 
Data Privacy By Design with AWS
Data Privacy By Design with AWSData Privacy By Design with AWS
Data Privacy By Design with AWS
 
CIO Forum June Microsoft.pdf
CIO Forum June Microsoft.pdfCIO Forum June Microsoft.pdf
CIO Forum June Microsoft.pdf
 
Security
SecuritySecurity
Security
 
7. oracle iam11g+strategyodrom
7. oracle iam11g+strategyodrom7. oracle iam11g+strategyodrom
7. oracle iam11g+strategyodrom
 
Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Data Leakage Prevention
 
HSPUG presentation - Advanced Data Governance
HSPUG presentation - Advanced Data GovernanceHSPUG presentation - Advanced Data Governance
HSPUG presentation - Advanced Data Governance
 
Designing for Privacy in AWS cloud
Designing for Privacy in AWS cloudDesigning for Privacy in AWS cloud
Designing for Privacy in AWS cloud
 
Kangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot EDB Webinar Best Practices in Security with PostgreSQLKangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot EDB Webinar Best Practices in Security with PostgreSQL
 
Microsoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App SecurityMicrosoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App Security
 
Oim Poc1.0
Oim Poc1.0Oim Poc1.0
Oim Poc1.0
 

Recently uploaded

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 

Recently uploaded (20)

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 

Oracle cloud security | User Security, Roles, Access Control and more

  • 2. Contents ◦ Security in ERP ◦ Common ERP Vulnerabilities ◦ Core Security Pillars ◦ Security in Oracle Cloud ◦ Oracle Cloud ERP Roles ◦ Function & Data Security Policies ◦ Setup Process in Oracle Cloud ◦ Creating Users ◦ Creating Custom Roles ◦ Extra Bytes ◦ Q&A?
  • 3. Security in ERP • ERP Security is a wide range of measures aimed at protecting Enterprise resource planning (ERP) systems from illicit access ensuring accessibility and integrity of system data • ERP system serves to unify the information intended to manage the organization • The Advantage of having ERP is that it provides data consistency and all in one solution
  • 4. Common ERP Vulnerabilities • Access Control • Inadequate Training • Failure to Comply • Unsecure Integration • Data Encryption and Masking issues • Complex Solutions
  • 5. Core Security Pillars • Data Encryption • Security Controls • Visibility • Hybrid Cloud • High Availability
  • 7. Oracle Cloud ERP Roles Oracle ERP Cloud uses 3 types of roles: Job Roles Represent jobs that users perform in an organization, e.g. General Accountant, Accounts Payable Manager Can be assigned to users Abstract Roles Represent people in the organization independent of the jobs they perform, e.g. Employee, Line Manager Can be assigned to users Duty Roles Logical collection of privileges that grant access to tasks that someone performs as part of a job Not assignable to users directly
  • 8. Function & Data Security Policies • Function Security Policies are defined via function security privileges • Each function security privilege secures the code resources that make up the relevant pages, page components (like tabs and buttons) and scheduled jobs • Data Security Policy defines access by a role, to a business object, with a condition and for an action (data security privilege) • Aggregate Privilege combines function security privileges with related data security policies
  • 9. Setup Process in Oracle Cloud Data Access Set Access Set Type Access Level Full Ledger Primary Balancing Segment Read Only Read and Write
  • 10. Implementing Security In Oracle Cloud • Create a User • Assign roles • Assign Security context to the user through Data Access Set
  • 11. Creating a User Use the Create User task to create users if Human Capital Management (HCM) is NOT being implemented. Create User task creates a minimal person record and a user account If HCM is being implemented, use the Hire an Employee task to create users instead. Hire an Employee task creates the full person record needed by HCM as well as the user account Use the Security Console to create implementation only users. Implementation users are user accounts without the associated person record.
  • 13. Managing Data Access ◦ Use the Manage Data Access for Users task to manage data scope assignments ◦ Search assignments for a single user or a single role ◦ You can further filter the search results, or export the results to Excel ◦ You can also authorize additional data accesses
  • 14. Extra Bytes – Data Import ◦ File based Data Import ◦ ADF Desktop Integration

Editor's Notes

  1. Demo
  2. Demo
  3. Demo
  4. Demo
  5. Demo
  6. Demo