When mapping controls, we’ve come up with this approach
When you look at bronze as least sensitive data up through most….etc.
Sensitivity-based Classification of Data (introduce content from Vipin’s Slide)
To make it more simplified, at Oracle we have begun to apply metals to the each of these layers
We have then categorized these valuable metals using solutions to help you better address each of these layers of risk, so that you can better prioritize what requires protection
Beginning with Bronze, where we consider the protection of less sensitive data, dev/test: Internal portals, directories…
Then Silver, corporate Internal need-to-know data: Business transactions, orders…
Gold, Regulatory compliance data: PII, customer facing…
And finally, the heaviest and most sensitive data, Platinum would help protect highly sensitive & restricted data: Qtr Sales, M&A, IP, Source code…
Oracle is uniquely qualified to address the identity requirements of the extended enterprise.
As we look on the left hand side we see the customer is at the center of a digital experience that includes a consistent view into mobile, enterprise and cloud environments.
This is one identity platform for what we call the extended enterprise. What that means is
Consistent policies across each experience…so this saves time and resources associated with multiple policies that are not integrated
Accelerated adoption of services so that individuals can be immediately provisioned
All of this reduces the costs associated with disparate and unintegrated Enterprise, Mobile and Cloud services.
Oracle’s Identity Platform for the extended enterprise enables organizations to support new business initiatives while reducing risks and costs
Provide comprehensive end to end security by extending enterprise controls to mobile and cloud applications
Deliver transparent and seamless flow of identity between on-premise, mobile & cloud applications
Enable interoperability across heterogeneous cloud services with modern security standards & protocols
Reduce risk of security breaches by managing privileged access and eliminating excessive access rights
Пользователь хочет сделать бэкап базы данных
Пароля не знает – доступа нет
Запрашивает ОРАМ доступ
ОРАМ назначает пароль в базе данных и выдает его админу
Админ получает доступ, делает бэкап
Поработал – больше доступ не нужен – сообщает ОРАМу, что он поработал
ОРАМ назначает новый пароль в базе, но никому его не сообщает
Админ не может получить доступ к базе со старым паролем