Oracle Privileged Account Manager 11gR2. Karsten Müller-Corbach karsten.mueller-corbach@oracle.com



Similar documents
Trust but Verify: Best Practices for Monitoring Privileged Users

Kenneth Hee Director, Business Development Security & Identity Management. Oracle Identity Management 11g R2 Securing The New Digital Experience

Oracle Privileged Account Manager

Identity Governance Evolution

Oracle Identity Management Securing The New Digital Experience

<Insert Picture Here> Oracle Identity And Access Management

Enabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1

Quest One Identity Solution. Simplifying Identity and Access Management

Oracle Fusion Middleware 11g Release 1 IDM Suite

Key New Capabilities Complete, Open, Integrated. Oracle Identity Analytics 11g: Identity Intelligence and Governance

OracleAS Identity Management Solving Real World Problems

Oracle Platform Security Services & Authorization Policy Manager. Vinay Shukla July 2010

Oracle Identity Manager (OIM) as Enterprise Security Platform - A Real World Implementation Approach for Success

Securing Data in Oracle Database 12c

Sun and Oracle: Joining Forces in Identity Management

Centralized Oracle Database Authentication and Authorization in a Directory

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

These requirements led to several challenges in deploying identity related applications within the enterprise:

Security Landscape of Cloud Computing

Hayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

Business and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis

Protecting Sensitive Data Reducing Risk with Oracle Database Security

2013 AWS Worldwide Public Sector Summit Washington, D.C.

Intelligent Security Design, Development and Acquisition

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities

Oracle Identity Manager, Oracle Internet Directory

Enterprise Identity Management Reference Architecture

Security Compliance and Data Governance: Dual problems, single solution CON8015

Identity Management with midpoint. Radovan Semančík FOSDEM, January 2016

identity management in Linux and UNIX environments

How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions

Oracle Directory Services Integration with Database Enterprise User Security O R A C L E W H I T E P A P E R F E B R U A R Y

Leveraging Privileged Identity Governance to Improve Security Posture

IBM Security Privileged Identity Manager helps prevent insider threats

Oracle IDM Integration with E-Business Suite & Middleware Technologies

Leveraging Microsoft Privileged Identity Management Features for Compliance with ISO 27001, PCI, and FedRAMP

SaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology

Oracle Identity Governance - Complete Identity Lifecycle Management

Understanding Enterprise Cloud Governance

An Oracle White Paper September Directory Services Integration with Database Enterprise User Security

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach

Privileged Session Management Suite: Solution Overview

Oracle E-Business Suite Single Sign On Using Oracle Access Manager

Take Control of Identities & Data Loss. Vipul Kumra

Learn From the Experts: CyberArk Privileged Account Security. Łukasz Kajdan, Sales Manager Baltic Region Veracomp SA

Oracle E-Business Suite APPS, SYSADMIN, and oracle Securing Generic Privileged Accounts. Stephen Kost Chief Technology Officer Integrigy Corporation

CONNECTING ACCESS GOVERNANCE AND PRIVILEGED ACCESS MANAGEMENT

MySQL Security: Best Practices

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Complete Database Security. Thomas Kyte

Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management

Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery

HOW OBSERVEIT ADDRESSES KEY HONG KONG IT SECURITY GUIDELINES

DirX Identity V8.5. Secure and flexible Password Management. Technical Data Sheet

Centrify Cloud Connector Deployment Guide

Oracle Enterprise Manager 12c

Administration Guide NetIQ Privileged Account Manager 3.0.1

Secret Server Qualys Integration Guide

CSN38:Tracking Privileged User Access within an ArcSight Logger and SIEM Environment Philip Lieberman, President and CEO

<Insert Picture Here> Oracle Database Vault

Seven Things To Consider When Evaluating Privileged Account Security Solutions

Security management White paper. Develop effective user management to demonstrate compliance efforts and achieve business value.

Governance, Risk & Compliance for Public Sector

Provide access control with innovative solutions from IBM.

Enterprise Mobility Suite Overview. Joe Kuster Catapult Systems

Microsoft Enterprise Mobility Suite

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

Solving the Security Puzzle

An Oracle White Paper January Oracle Identity Manager Business Overview

Management Packs for Database

RSA Identity Management & Governance (Aveksa)

DirX Identity V8.4. Secure and flexible Password Management. Technical Data Sheet

With Great Power comes Great Responsibility: Managing Privileged Users

CA SiteMinder SSO Agents for ERP Systems

Oracle Identity Management 11gR2 Sizing and Capacity Planning

How To Make A Multi-Tenant Platform Secure And Secure

Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA

NCSU SSO. Case Study

Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory. Overview August 2008

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

Privileged Account Access Management: Why Sudo Is No Longer Enough

Google Identity Services for work

Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals

White paper December IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview

Privilege Gone Wild: The State of Privileged Account Management in 2015

Aurora Hosted Services Hosted AD, Identity Management & ADFS

Migration Best Practices for OpenSSO 8 and SAM 7.1 deployments O R A C L E W H I T E P A P E R M A R C H 2015

Transcription:

R2 Oracle Privileged Account Manager 11gR2 Karsten Müller-Corbach karsten.mueller-corbach@oracle.com

The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle s products remains at the sole discretion of Oracle. 2

Agenda Introduction Oracle Privileged Account Manager 11gR2 OPAM and Oracle s Governance Platform OPAM and Oracle Security Solutions 3

Introduction 4

With Great Power Comes Great Risks Root Access Databases Directory Servers Unix Servers Privileged accounts are a key entry point for fraud Difficult to monitor shared accounts across multiple administrators Excessive access privileges is the number one attack vector against databases 5

IDM Overcome Threats and Regulations to Unlock Opportunities Threats Increased Online Threat Costly Insider Fraud Compliance Tougher Regulations Greater Focus on Risk Stronger Governance Opportunities 76% Data Stolen From Servers 86% Hacking Involve Stolen Credentials 48% Caused by Insiders 17% Involved Privilege Misuse Social Media Cloud Computing Mobile Access 2011 Data Breach Investigations Report Copyright 2011, Oracle and/or its affiliates. All right 6

Privileged Accounts Most Powerful but Most Unprotected Unlimited power Shared Passwords Never Changed Access not audited or certified Unix/ Linux, Windows, databases, applications, routers, firewalls etc Each and every IT asset in the enterprise 7

Managing Privilege Access Is Not Well Defined SCALE Manual solutions don t scale (like managing privileged access via spreadsheets) RISK Using default system passwords is prone to risk COST Deploying point solutions can increase integration costs 8

Two Big Management Problems IDENTIFYING PRIVILEGED ACCOUNTS TRACKING PRIVILEGED ACCOUNTS 9

The Right Approach is Self-Reinforcing Reporting & Certification Access Request Self-Reinforcing Auto- Provisioning VISIBILITY ACROSS COMPLETE USER ACCESS IS KEY Remediation 10

Privileged Account Management A Platform Approach Shared Connectors Centralized Policies Workflow Integration Reduce Risk Improve Compliance Common Reporting Copyright 2012, Oracle and/or its affiliates. All rights Reserved 11

Oracle Offers Security at Every Layer Security inside each later and across layers Infrastructure Security Governance & Compliance Identity&Access Management Database Security Cloud Services 12

Governance Password Reset Privileged Accounts Access Request Roles Based Provisioning Role Mining Attestation Separation of Duties Access Web Single Sign-on Federation Mobile, Social & Cloud External Authorization SOA Security Integrated ESSO Token Services Fraud Detection Directory LDAP Storage Virtual Directory Meta Directory Platform Security Services 13 Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Oracle Privileged Account Manager 11gR2 Copyright 2012, Oracle and/or its affiliates. All rights Reserved 14

Introducing Oracle Privileged Account Manager Secure vault to centrally manage passwords for privileged and shared accounts Targets include Databases, Operating Systems and LDAP Directories, Oracle FMW applications Multiple access points for OPAM users and administrator Automatic password change using Identity Connector Framework Policy based password check-out and check-in Flexible usage policies Customizable audit reports through BI Publisher and real time status Extension to Identity Governance OIM and OIA integration for complete governance Copyright 2012, Oracle and/or its affiliates. All rights Reserved 15

OPAM Architecture Copyright 2011, Oracle and/or its affiliates. All right 16

A Typical Use Case User logs in as DBA Adds Table to DB System out of space Return DBA password HR Application Database Set DBA password for HR App Database based on password policy for HR App Database Request DBA password Return unix password Request unix password Verify OPAM User in HR DBA Role User checks in passwords DBA Oracle Privileged Account Manager LDAP Server User logs in as superuser Adds disk space Unix Server Copyright 2011, Oracle and/or its affiliates. All right 17

User Check-Out Password Screen Copyright 2011, Oracle and/or its affiliates. All right 18

Supported Clients / Targets Generic UNIX Systems Generic Database Servers Generic LDAP Directories UNIX 19

Default Supported Targets OPAM will support all OIM ICF connectors Will ship with following connectors Generic UNIX Any UNIX/LINUX server with SSH Generic Database Oracle 9i, 10g, 11g Any Generic LDAP Copyright 2012, Oracle and/or its affiliates. All rights Reserved 20

OPAM Benefits Enforce internal security policies and eliminate potential security threats from privileged users Cost-effectively enforce and attest to regulatory requirements Reduce IT costs through efficient self service and common security infrastructure Real time usage reports Customizable audit reports through BI Publisher Copyright 2012, Oracle and/or its affiliates. All rights Reserved 21

OPAM and Oracle Access Management OAM provides access control to OPAM service console Centralized, policy-driven services for web applications authentication Web single sign-on Session control OAAM for layered access control to OPAM service console Real-time fraud prevention Software-based multifactor authentication Copyright 2012, Oracle and/or its affiliates. All rights Reserved 22

OPAM and Oracle s Governance Platform Copyright 2012, Oracle and/or its affiliates. All rights Reserved 23

Supports Oracle Identity Manager Enterprise Roles Request access De-provision access Reuse connectors Works with request catalog 24

OPAM OIM and OIA a Complete Governance Platform Use case 1 OIM to provision users to OPAM directory Leverage OIM policy/role based provisioning, a system admin may be provisioned to specific LDAP groups that OPAM uses for privileged account access Workflow and approval will be followed as defined Use case 2 Request for Privileged Account Access Through OIM OIM to publish privileged account entitlements in request catalog An admin user uses access request self service, search the catalog, pick the privileged accounts he needs and submit for approval The request kicks off workflow and approval as defined The user is provisioned with group membership after approval The user can access OPAM for privileged password checkout and checkin Copyright 2012, Oracle and/or its affiliates. All rights Reserved 25

OPAM OIM and OIA a Complete Governance Platform Use case 3 Break glass access request through OIM Ability for admins to request emergency access to certain privileged account(s) s/he normally is not entitled to. E.g., a critical server is down but the designated server admin is not available. The admin goes through the OIM request process as defined earlier, but indicates this is break glass emergency request Submission of the request will kick off break glass workflow with minimal or auto approval (per customer process) The admin is presented with privileged password for emergency use Special alert is generated for the event and sent to security administrators The access is automatically de-provisioned afterward (e.g., after some time) Copyright 2012, Oracle and/or its affiliates. All rights Reserved 26

OPAM OIM and OIA a Complete Governance Platform Use case 4 delegated access Example Bob is on vacation for 3 weeks, Joe is authorized to access the accounts Bob has access to. Joe s access is revoked after Bob returns. Use case 5 Risk based certification and close-loop remediation with OIA Through existing OIM OIA integration and OIM OPAM integration, privileged access info is made available to OIA for certification. Risk can be calculated based on its privilege status and other data such as provisioning method etc If access violation is found, it can be revoked based on OIM OIA close-loop remediation Copyright 2012, Oracle and/or its affiliates. All rights Reserved 27

OPAM, OIM and OIA a Complete Governance Platform Central governance of regular and privileged users Complete auditing, reporting and certification of user s individual and shared accounts More secure and more compliant Copyright 2012, Oracle and/or its affiliates. All rights Reserved 28

OPAM and Oracle Security Solutions Copyright 2012, Oracle and/or its affiliates. All rights Reserved 29

OPAM and Database Security Enterprise User Security allows non-privileged users to use their enterprise LDAP/AD password to connect to the database Database Vault provides stronger separation of duties for databases OPAM manages passwords for privileged users including SYS, SYSTEM and application accounts A complete Database Security solution from Oracle Copyright 2012, Oracle and/or its affiliates. All rights Reserved 30

Database User Management Complete Solution Service Description Use Existing Enterprise LDAP Passwords for End-User Passwords Supported by EUS Map Database Roles to Enterprise Roles Manage SYS/SYSTEM Passwords EUS OPAM Manage Application Passwords OPAM Manage non-oracle database passwords OPAM Copyright 2011, Oracle and/or its affiliates. All right 31

Database Vault Integration Complete Solution Service Description Privileged user access control to limit access to application data Supported by DB Vault Multi-factor authorization for enforcing enterprise security policies DB Vault Secure application consolidation DB Vault Manage DB Vault Privileged Accounts Passwords like user_manager, sec_admin Manage SYS/SYSTEM and other DB Privileged Accounts Passwords OPAM OPAM Copyright 2011, Oracle and/or its affiliates. All right 32

OPAM and UNIX/LINUX User Management Oracle Authentication Services For Operating Systems (OAS4OS) enables non-privileged UNIX/LINUX users to authenticate to LDAP OAS4OS simplifies migration from NIS to LDAP OPAM provides password management for user accounts such as root and other privileged application accounts on the server Copyright 2012, Oracle and/or its affiliates. All rights Reserved 33

UNIX/LINUX User Management Complete Solution Service Description Use Existing Enterprise LDAP for End-User Passwords Supported by OAS4OS Map UNIX Groups & NIS Maps to LDAP OAS4OS Manage ROOT Passwords OPAM Manage superuser Application Account Manage Windows passwords OPAM OPAM Copyright 2011, Oracle and/or its affiliates. All right 34

Improve Security Of Oracle Middleware and Database Application passwords are often privileged and unmanaged OPAM can automatically manage application passwords for software that uses Oracle Fusion Middleware or connects to Oracle database This includes: Oracle Credential Security Framework (CSF) Oracle Wallet (planned post R2) Copyright 2012, Oracle and/or its affiliates. All rights Reserved 35

Summary Copyright 2012, Oracle and/or its affiliates. All rights Reserved 36

Summary Improves compliance and auditing of privileged account activities Can be deployed standalone or as part of complete Oracle Identity Governance platform A key components of Oracle Identity Governance Together with OIM and OIA Central governance of regular and privileged users Complete auditing, reporting and certification of user s individual and shared accounts Copyright 2012, Oracle and/or its affiliates. All rights Reserved 37

www.oracle.com/identity www.facebook.com/oracleidm www.twitter.com/oracleidm blogs.oracle.com/oracleidm 38

39

40