Oracle Identity Management Securing The New Digital Experience

Similar documents
Oracle Database Security. Paul Needham Senior Director, Product Management Database Security

Protecting Sensitive Data Reducing Risk with Oracle Database Security

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Oracle Database Security

Complete Database Security. Thomas Kyte

Securing Data in Oracle Database 12c

Hayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

Kenneth Hee Director, Business Development Security & Identity Management. Oracle Identity Management 11g R2 Securing The New Digital Experience

Oracle Privileged Account Manager 11gR2. Karsten Müller-Corbach

Database Security & Compliance with Audit Vault and Database Firewall. Pierre Leon Database Security

<Insert Picture Here> Oracle Database Security Overview

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Identity Governance Evolution

<Insert Picture Here> Oracle Identity And Access Management

Trust but Verify: Best Practices for Monitoring Privileged Users

Key New Capabilities Complete, Open, Integrated. Oracle Identity Analytics 11g: Identity Intelligence and Governance

Oracle Audit Vault and Database Firewall

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

Sun and Oracle: Joining Forces in Identity Management

An Oracle White Paper June Oracle Database 11g: Cost-Effective Solutions for Security and Compliance

Governance, Risk & Compliance for Public Sector

Security Compliance and Data Governance: Dual problems, single solution CON8015

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Oracle Audit Vault and Database Firewall. Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska

Managing Oracle E-Business Suite Security

Enterprise Identity Management Reference Architecture

Database Security Questions HOUG Fehér Lajos. Copyright 2015, Oracle and/or its affiliates. All rights reserved.

Intelligent Security Design, Development and Acquisition

<Insert Picture Here> Oracle Database Vault

Data Security: Strategy and Tactics for Success

Identity Management Overview. Bill Nelson Vice President of Professional Services

Oracle Role Manager. An Oracle White Paper Updated June 2009

An Oracle White Paper January Access Certification: Addressing & Building on a Critical Security Control

Oracle Database Security Solutions

Attestation of Identity Information. An Oracle White Paper May 2006

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

Copyright 2014 Oracle and/or its affiliates. All rights reserved.

Enabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1

MySQL Security: Best Practices

Why Add Data Masking to Your IBM DB2 Application Environment

An Oracle White Paper April Oracle Audit Vault and Database Firewall

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach

Oracle Human Capital Management Cloud Securing Oracle HCM Cloud. Release 10

An Oracle White Paper July Data Masking Best Practices

Teradata and Protegrity High-Value Protection for High-Value Data

Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003

Oracle Fusion Applications Security Guide. 11g Release 5 (11.1.5) Part Number E

Oracle Directory Services Integration with Database Enterprise User Security O R A C L E W H I T E P A P E R F E B R U A R Y

Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory. Overview August 2008

Oracle Privileged Account Manager

Oracle Database Security Services

Best Practices Report

Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007

Oracle Information Security Visioni

Oracle Identity Manager (OIM) as Enterprise Security Platform - A Real World Implementation Approach for Success

CSN38:Tracking Privileged User Access within an ArcSight Logger and SIEM Environment Philip Lieberman, President and CEO

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices

What s new in AM 9.30 Accelerating business outcomes

Security Landscape of Cloud Computing

PCI Compliance in Oracle E-Business Suite

An Oracle White Paper September Directory Services Integration with Database Enterprise User Security

Oracle Enterprise Manager 12c New Capabilities for the DBA. Charlie Garry, Director, Product Management Oracle Server Technologies

IBM InfoSphere Optim Data Masking solution

An Oracle White Paper October Oracle Data Integrator 12c New Features Overview

Obtaining Value from Your Database Activity Monitoring (DAM) Solution

Oracle s Cloud Computing Strategy

Test Data Management for Security and Compliance

Application Testing Suite Overview

Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP

Cost Effective Data Management for Oracle Utilities Applications

An Oracle White Paper June Security and Compliance with Oracle Database 12c

OracleAS Identity Management Solving Real World Problems

How To Manage A Privileged Account Management

CON9488 The Enterprise Cloud Simplified with Oracle VM

RSA Identity Management & Governance (Aveksa)

Best Practices in Identity and Access Management (I&AM) for Regulatory Compliance. RSA Security and Accenture February 26, :00 AM

AirWatch Solution Overview

Securing Oracle E-Business Suite in the Cloud

Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals

Transcription:

Oracle Identity Management Securing The New Digital Experience Security: User Single Sign-On, Certifying User Access, and Masking Sensitive Data Henry Anzarouth Principal Sales Consultant, Security and Identity Management henry.anzarouth@oracle.com

This document is for informational purposes. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described in this document remains at the sole discretion of Oracle. This document in any form, software or printed matter, contains proprietary information that is the exclusive property of Oracle. This document and information contained herein may not be disclosed, copied, reproduced or distributed to anyone outside Oracle without prior written consent of Oracle. This document is not part of your license agreement nor can it be incorporated into any contractual agreement with Oracle or its subsidiaries or affiliates. Copyright 2011, Oracle and/or its affiliates. All right 2

Agenda User Single Sign-On with Oracle Access Manager Certifying User Access with Oracle Identity Analytics Masking Sensitive Data with Oracle Enterprise Manager and EBS Accelerator (Masking Template) 3 Copyright 2012, Oracle and/or its affiliates. All rights reserved.

The New Identity Platform Complete and Converged Identity Governance Access Management Lifecycle Management & 360 visibility Regular & Privileged identities Complete access control & SSO Fraud Detection Converged Policy Administration & Control Directory Services LDAP, Virtualization Fraud & Meta-directory Detection Unified Administration & Management Copyright 2012, Oracle and/or its affiliates. All right 4

Identity Management Portfolio 11gR2 Modern, Innovative & Integrated Governance Password Reset Privileged Accounts Access Request Roles Based Provisioning Role Mining Attestation Separation of Duties Access Web Single Sign-on Federation Mobile, Social & Cloud External Authorization SOA Security Integrated ESSO Token Services Fraud Detection Directory LDAP Storage Virtual Directory Meta Directory Platform Security Services Copyright 2012, Oracle and/or its affiliates. All right 5

Access Management: Complete and Converged SSO With E-Business Suite Copyright 2012, Oracle and/or its affiliates. All right 6

Copyright 2012, Oracle and/or its affiliates. All right 7

Copyright 2012, Oracle and/or its affiliates. All right 8

SSO Process Flow Copyright 2011, Oracle and/or its affiliates. All right 9

Copyright 2012, Oracle and/or its affiliates. All right 10

Copyright 2012, Oracle and/or its affiliates. All right 11

11.1.2 now certified Copyright 2012, Oracle and/or its affiliates. All right 12

Copyright 2012, Oracle and/or its affiliates. All right 13

Open World Session 2012 Oracle E-Business Suite and Security Copyright 2012, Oracle and/or its affiliates. All right 14

Oracle Identity Business Today 30K Customers in 45 Countries INDUSTRY LEADERSHIP These graphics were published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any of warranties of merchantability or fitness for a particular purpose. User Provisioning Identity Governance Web Access Management Copyright 2012, Oracle and/or its affiliates. All right 15

Identity Governance: Complete and Converged Copyright 2012, Oracle and/or its affiliates. All right 16

Oracle Identity Governance Governance Platform Connectors Provision Grant User Access De-Provision Monitor User Access Access Request Privileged Account Request Role Lifecycle Management Check-in/ Checkout Identity Certifications IT Audit Monitoring Rogue Detection & Reconciliation Reporting & Privileged Access Monitoring Roles Entitlements Access Catalog IT Ownership Accounts Glossaries Business Attributes 17

Oracle Identity Governance Suite Governance Platform Oracle Identity Manager Provisioning Reconciliation Identity Administration Access Request Oracle Identity Analytics ERP, DB and Mainframes Fusion Applications Oracle Privileged Account Manager Role Mgmt. Monitoring Dashboards Segregation of Duties Access Certification Cloud Applications Policy Management Password Check-in/ Check-out 18

Access Certification Making Certification sustainable Spreadsheet approach Risk Analytics Business IT collaboration 19 Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Attestation Sign-Off 1 Set Up Periodic Review 2 Reviewer Is Notified Goes to Self Service Reviewer Selections 3 Automated Action is taken based on Periodic Review 4 Report Built And Results Stored in DB What Is Reviewed? Who Reviews It? Start When? How Often? Certify Reject Decline Delegate Comments Email Result to User Automatically Terminate User Notify the Process Owner Notify Delegated Reviewer Audit Attested Data Attestation Actions Delegation & Revocation Paths 20 Copyright 2009, Oracle. All rights reserved

Scenario s Actors Certification & Closed Loop Remediation Manager Administrator Complete user access certification Create and track certification progress 21 Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Manager receives an email notification for a new certification Manager Logs-in 22 Copyright 2012, Oracle and/or its affiliates. All rights reserved.

23 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Manager select the new certification

List of all his employees is shown with a risk summary and detail information 24 Copyright 2012, Oracle and/or its affiliates. All rights reserved.

1. One of the filtering criteria (Risk) is used to show high-risk users. 25 Copyright 2012, Oracle and/or its affiliates. All rights reserved. 2. ENESS is selected

Roles are shown (all low risk) 26 Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Entitlement view is selected. Several high risk elements are present. 27 Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Sort by risk summary. 28 Copyright 2012, Oracle and/or its affiliates. All rights reserved.

View details of this entitlement 29 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Last certification action (e.g.: Revoked, Certified) Provisioning Method (e.g.: access request with OIM, Reconciliation)

Manager decides to revoke this access 30 Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Revocation action is shown along with comments. 31 Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Manager decides to complete all users (certify). Signature is required (Password) 32 Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Manager dashboard shows that all user certifications have been compeleted 33 Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Certification Administrator s Dashboard Administrator Logs-in 34 Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Remedition Tracking 35 Copyright 2012, Oracle and/or its affiliates. All rights reserved. The last certification requires the revocation of an entitlement. OIM is instructed to remove the entitlement.

36 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Remediation has completed Administrator will view the details

37 Copyright 2012, Oracle and/or its affiliates. All rights reserved. The only user impacted was Elliot Ness The entitlement has been removed by OIM. This closes the remediation loop (Closed-loop remediation)

Maximum Security with Oracle Database Security 12c Henry Anzarouth Principal Sales Consultant, Security and Identity Management Oracle

Billions of Database Records Breached Globally 97% of Breaches Were Avoidable with Basic Controls 98% records stolen from databases 84% records breached using stolen credentials 71% fell within minutes 92% discovered by third party 39

Oracle Database Security Solutions Defense-in-Depth for Maximum Security PREVENTIVE DETECTIVE ADMINISTRATIVE Encryption Activity Monitoring Privilege Analysis Redaction and Masking Database Firewall Sensitive Data Discovery Privileged User Controls Auditing and Reporting Configuration Management 40

Oracle Database Security Solutions Defense-in-Depth for Maximum Security PREVENTIVE DETECTIVE ADMINISTRATIVE Encryption Activity Monitoring Privilege Analysis Redaction and Masking Database Firewall Sensitive Data Discovery Privileged User Controls Auditing and Reporting Configuration Management 41

Encryption is the Foundation Preventive Control for Oracle Databases Oracle Advanced Security Transparent data encryption Prevents access to data at rest Requires no application changes Built-in two-tier key management Near Zero overhead with hardware Integrations with Oracle technologies e.g. Exadata, Advanced Compression, ASM, Golden Gate, DataPump, etc. Applications Disk Backups Exports Off-Site Facilities 42

Masking Data for Non-Production Use Preventive Control for Oracle Databases Oracle Data Masking Replace sensitive application data Extensible template library and formats Application templates available Referential integrity detected/preserved At source masking and sub-setting* Support for masking data in non-oracle databases LAST_NAME SSN SALARY AGUILAR 203-33-3234 40,000 BENSON 323-22-2943 60,000 Production Non-Production Test Dev LAST_NAME SSN SALARY ANSKEKSL 323 23-1111 60,000 *Requires use of Oracle Test Data Management Production BKJHHEIEDK 252-34-1345 40,000 43

Test Data Management Solutions Sensitive Data Identification Data Subsetting Data Relationship Modeling Test System Setup Data Masking 44 Copyright 2011, Oracle and/or its affiliates. All rights reserved.

Data Discovery and Modeling Application Data Models Scans application schemas to model relationships between tables and columns Extract data relationships from Oracle Applications meta-data Oracle ebusiness Suite Oracle Fusion Applications Store referential relationships stored in repository Enables test data operations such as data subsetting, masking Data Relationship Modeling Sensitive Data Identification Test System Setup Data Subsetting Data Masking 45 Copyright 2011, Oracle and/or its affiliates. All rights reserved.

Data Discovery and Modeling Sensitive Data Identification Sensitive data discovery Pattern-based database scanning Import from pre-built mask templates Data Masking Templates for Oracle Applications E-Business Suite Fusion Applications Data Relationship Modeling Sensitive Data Identification Test System Setup Data Subsetting Data Masking 46 Copyright 2011, Oracle and/or its affiliates. All rights reserved.

Oracle Data Masking Comprehensive and Extensible Mask Library Mask formats for common sensitive data Accelerates solution deployment of masking Extensible mask routines Enables customization of business rules Define once, apply everywhere Ensures consistent enforcement of policies 47 Copyright 2011, Oracle and/or its affiliates. All rights reserved.

Oracle Data Masking Sophisticated Masking Techniques Conditionbased Masking Compound Masking Compound Mask Sets of related columns masked together e.g. Address, City, State, Zip, Phone Condition-based Masking Specify separate mask format for each condition, e.g. driver s license format for each state SQL-expression based masking Use SQL functions, e.g. UPPER, SUBSTR, TO_CHAR, to generate mask values, e.g. SUBSTR(%ORIG_VALUE%,1,3) 111-1111 48 Copyright 2011, Oracle and/or its affiliates. All rights reserved.

E-Business Suite Data Masking E-Business Suite Masking Template Metadata for the EM Masking tool Columns, Relationships, and Masking rules for PII and Sensitive attributes for E-Business Suite products Instructions for wiping credentials after cloning (Support Note 419475.1) 950 Columns / 1900 rules 65% HCM - Payroll, Employment Details, Personal Info Also TCA, ATG, Financials, Projects Not split out by product or family De-identification needs to be done across the DB 49 Copyright 2011, Oracle and/or its affiliates. All rights reserved.

Goals in Application Masking De-Identify the data Scramble identifiers of individuals (PII) Name, account, address, location, drivers license Mask sensitive data Mask the data that, if associated with PII, would cause privacy concerns Compensation Health Employment Information Maintain Data Validity 50 Copyright 2011, Oracle and/or its affiliates. All rights reserved.

PersonaIIy Identifiable Information Categories Name Business Location Business Phone Business ID Accounts (Bank, debit, credit) Location External ID (drivers license) National ID (social security number) Web Site Phone 51 Copyright 2011, Oracle and/or its affiliates. All rights reserved.

Personally Identifiable Information 50 Attributes Person Name Web Site Pension ID Number Maiden Name National Identifier Article Number Business Address Passport Number Civil Identifier Number Business Telephone Number Drivers License Number Hafiza Number Business Email Address Personal Address Social Security Number Custom Name Personal Telephone Number Trade Union Membership Number Employee Number Personal Email Address Pension Registration Number User Global Identifier Visa Number or Work Permit National Insurance Number Customer Number Bank Account Number Health Insurance Number Account Name Card Number (credit or debit) Personal Public Service Number Mail Stop Tax Registration Number or National Taxpayer Identifier Electronic Taxpayer Identification Number GPS Location Person Identification Number Biometrics Data Student Examination Hall Ticket Number Welfare Pension Insurance Number Digital ID Club Membership ID Unemployment Insurance Number Citizenship Number Library Card Number Government Affiliation ID Voter Identification Number Identity Card Number Military Service ID Residency Number (Green Card) Instant Messaging Address Social Insurance Number 52 Copyright 2011, Oracle and/or its affiliates. All rights reserved.

Sensitive Data Compensation Employment details Nationality / Citizenship Health Information Personal information Mother's maiden name Passwords Encryption keys Audit information Session information 53 Copyright 2011, Oracle and/or its affiliates. All rights reserved.

Privileged User Controls Preventive Control for Oracle Databases Database Vault Limit DBA access to application data Multi-factor SQL command rules Realms create protective zones Enforce enterprise data governance, least privilege, segregation of duties Out of the box application policies Applications Procurement HR Finance select * from finance.customers Security DBA DBA Applicatio n DBA 54

Oracle Database Security Solutions Defense-in-Depth for Maximum Security PREVENTIVE DETECTIVE ADMINISTRATIVE Encryption Activity Monitoring Privilege Analysis Redaction and Masking Database Firewall Sensitive Data Discovery Privileged User Controls Auditing and Reporting Configuration Management 55

Database Activity Monitoring and Firewall Detective Control for Oracle and non-oracle Databases Oracle Audit Vault and Database Firewall Monitors network traffic, detect and block unauthorized activity Highly accurate SQL grammar analysis Can detect/stop SQL injection attacks Whitelist approach to enforce activity Users Apps Allow Log Alert Substitute Block Blacklists for managing high risk activity Scalable secure software appliance SQL Analysis Whitelist Blacklist Policy Factors 56

Audit, Report, and Alert in Real-Time Detective Control for Oracle and non-oracle Databases Oracle Audit Vault and Database Firewall Centralized secure repository delivered as secure, scalable software appliance Powerful alerting - thresholds, groupby Out-of-the box and custom reports Consolidated multi-source reporting Audit Data & Event Logs Oracle Database Firewall OS & Storage Directories Databases! Alerts Built-in Reports Custom Reports Policies SOC Auditor Built-in fine grain segregation of duties Custom Security Analyst 57

Oracle Audit Vault and Database Firewall New Solution for Oracle and Non-Oracle Databases Users Applications Database Firewall Allow Log Alert Substitute Block Firewall Events SOC Alerts! Auditor Security Analyst Built-in Reports Custom Reports Policies Audit Vault Audit Data OS, Directory, File System & Custom Audit Logs 58

Oracle Database Security Solutions Defense-in-Depth for Maximum Security PREVENTIVE DETECTIVE ADMINISTRATIVE Encryption Activity Monitoring Privilege Analysis Redaction and Masking Database Firewall Sensitive Data Discovery Privileged User Controls Auditing and Reporting Configuration Management 59

Oracle Database Security Solutions Customer Benefits Enterprise ready Security and compliance Simple and flexible Speed and scale Customers Worldwide Rely on Oracle oracle.com/goto/database/security-customers 60

Oracle Database Security Solutions Key Benefits Enterprise Ready Security and Compliance Simple and Flexible Speed and Scale 61

Q&A 62

63

White Papers Datasheets facebook.com/oracleidm blogs.oracle.com/oracleidm twitter.com/oracleidm Copyright 2011, Oracle and/or its affiliates. All right 64