An Oracle White Paper May 2016. Oracle Integration Cloud Service (ICS) Security & Compliance



Similar documents
GoodData Corporation Security White Paper

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Anypoint Platform Cloud Security and Compliance. Whitepaper

PCI Requirements Coverage Summary Table

Secure, Scalable and Reliable Cloud Analytics from FusionOps

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

VMware vcloud Air Security TECHNICAL WHITE PAPER

Retention & Destruction

Autodesk PLM 360 Security Whitepaper

THE BLUENOSE SECURITY FRAMEWORK

PCI Requirements Coverage Summary Table

How To Achieve Pca Compliance With Redhat Enterprise Linux

Injazat s Managed Services Portfolio

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Addressing Cloud Computing Security Considerations

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Projectplace: A Secure Project Collaboration Solution

FormFire Application and IT Security. White Paper

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

BMC s Security Strategy for ITSM in the SaaS Environment

A Rackspace White Paper Spring 2010

Oracle Database 11g: Security

OCTOBER 2015 TAULIA SUPPLIER ARCHITECTURE OVERVIEW TAULIA 201 MISSION STREET SAN FRANCISCO CA 94105

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS ADMINISTRATION TOOLS NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

Security Controls for the Autodesk 360 Managed Services

Mirantis OpenStack Express: Security White Paper

Collaborate on your projects in a secure environment. Physical security. World-class datacenters. Uptime over 99%

Payment Card Industry Data Security Standard

Information Technology: This Year s Hot Issue - Cloud Computing

Security Whitepaper. NetTec NSI Philosophy. Best Practices

Security Issues in Cloud Computing

University of Pittsburgh Security Assessment Questionnaire (v1.5)

IBX Business Network Platform Information Security Controls Document Classification [Public]

74% 96 Action Items. Compliance

HIPAA Compliant Infrastructure Services. Real Security Outcomes. Delivered.

How To Protect Your Cloud Computing Resources From Attack

Secure Cloud Computing

Application Security Best Practices. Matt Tavis Principal Solutions Architect

Privacy + Security + Integrity

Oracle Database 11g: Security. What you will learn:

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.

Oracle Cloud Hosting and Delivery Policies Effective Date: June 1, 2015 Version 1.5

Securing the Service Desk in the Cloud

Secure and control how your business shares files using Hightail

Security from a customer s perspective. Halogen s approach to security

Ellucian Cloud Services. Joe Street Cloud Services, Sr. Solution Consultant

Ovation Security Center Data Sheet

SERENA SOFTWARE Serena Service Manager Security

A Decision Maker s Guide to Securing an IT Infrastructure

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend:

PROTECTING YOUR VOICE SYSTEM IN THE CLOUD

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Xerox Litigation Services. In the Cybersecurity Hot Seat: How Law Firms are Optimizing Security While Reducing Cost and Risk

With Eversync s cloud data tiering, the customer can tier data protection as follows:

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Cloud Contact Center. Security White Paper

QuickBooks Online: Security & Infrastructure

PATCH MANAGER what does it do?

IBM PowerSC. Security and compliance solution designed to protect virtualized datacenters. Highlights. IBM Systems and Technology Data Sheet

March

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6. TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4

Open Data Center Alliance Usage: Provider Assurance Rev. 1.1

twilio cloud communications SECURITY ARCHITECTURE

CompTIA Cloud+ 9318; 5 Days, Instructor-led

Best Practices for PCI DSS V3.0 Network Security Compliance

Preemptive security solutions for healthcare

Appendix C Pricing Index DIR Contract Number DIR-TSO-2724

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Simone Brunozzi, AWS Technology Evangelist, APAC. Fortress in the Cloud

BSM for IT Governance, Risk and Compliance: NERC CIP

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

Introduction to the HP Server Automation system security architecture

Security Threat Risk Assessment: the final key piece of the PIA puzzle

Enterprise level security, the Huddle way.

HEC Security & Compliance

Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture

ProjectManager.com Security White Paper

John Essner, CISO Office of Information Technology State of New Jersey

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

PCI Compliance for Cloud Applications

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

Woodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview

SaaS Security for the Confirmit CustomerSat Software

Hosting Services VITA Contract VA AISN (Statewide contract available to any public entity in the Commonwealth)

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

ClickTale Security Standards and Practices: Delivering Peace of Mind in Digital Optimization

Seven Things To Consider When Evaluating Privileged Account Security Solutions

Secure networks are crucial for IT systems and their

Five keys to a more secure data environment

Transcription:

An Oracle White Paper May 2016 Oracle Integration Cloud Service (ICS) Security & Compliance

Contents Introduction... 1 Governance, Risk & Compliance... 1 Auditing and Reporting of Operational & Business Processes... 1 People, Roles & Identities... 2 Protection of Data & Information... 3 Operational Practices... 3 Security Architecture... 4 Privacy Policies... 5 Security Provisions for Cloud Applications... 6 Cloud Networks & Connection Security... 7 Security Controls on the Physical Infrastructure & Facilities... 8

Introduction Oracle Integration Cloud Service (ICS) runs within the Oracle Cloud where the architecture is designed to provide customers with a unified suite of Cloud Services with best-in-class performance, scalability, availability, and security. The Cloud Services are designed to run on a unified data center, hardware, software, and network architecture. This document is based on the Cloud Security Assessment section of the Security for Cloud Computing: 10 Steps to Ensure Success V2.0 document, which is produced by the Cloud Standards Customer Council where Oracle is a member. From a development perspective, all of Oracle s Cloud Services adhere to Oracle Software Security Assurance (OSSA). OSSA is Oracle's methodology for building security into the design, build, testing, and maintenance of its products. Oracle's goal is to ensure that Oracle's products, as well as the customer systems that leverage those products, remain as secure as possible. OSSA is a set of industry-leading standards, technologies, and practices aimed at: Fostering security innovations. Oracle has a long tradition of security innovations. Today this legacy continues with Oracle's market leading database security and identity management solutions. Reducing the incidence of security weaknesses in Oracle products. OSSA key programs include Oracle's Secure Coding Standards, mandatory security training for development, the cultivation of security leaders within development groups, and the use of automated analysis and testing tools. Reducing the impact of security weaknesses in released products on customers. Oracle has adopted transparent security vulnerability disclosure and remediation policies. The company is committed to treating ALL customers equally, and delivering the best possible security patching experience through the Critical Patch Update and Security Alert programs. Governance, Risk & Compliance ICS is part of the Oracle Cloud Services and is deployed in world-class Tier IV Data Centers that are designed to provide customers with the highest levels of performance, availability, network access bandwidth, and security. The Data Centers are currently located in 4 locations in North America (Chicago, Ashburn, Austin, and Toronto) and 4 locations in Europe (Linlithgow, Slough, Amsterdam, and Frankfurt). As ICS adoption continues to grow, a continual effort is in place to evaluate additional Data Center locations. Auditing and Reporting of Operational & Business Processes Compliance audits are conducted to ensure that Oracle is meeting requirements and commitments when managing and running the Oracle Cloud. Oracle often engages independent third-party auditors to verify compliance with requirements and adherence to its attestations. Third-party auditors are engaged for both new compliance efforts and renewals as well performing network and application vulnerability assessments and penetration tests. The Oracle Cloud is built on a well-defined security and identity management architecture that also leverages a broad range of tools for added protection. These tools include intrusion detection prevention where the Oracle Cloud Services are monitored 24x7 using McAfee IntruShield. Taking it further, a variety of Security Information, Event Management, and Cyber-security tools are also used to Page 1

monitor the infrastructure continually. Finally, all servers, switches, firewalls, network and storage devices use IDPS software and Antivirus Software at all ingress and egress points and are scanned by SIEM, Cyber-security, and malware prevention software. As for auditing and governance, Oracle uses a strict set of independent software auditing and governance software to audit its own Cloud Services. These include daily Qualys blackbox scans that are run against all Cloud Services; monthly security patch, configuration and version comparison and reviews using Oracle s own security best practices; and daily code application scans using a variety of tools including Security Innovation, McAfee Foundstone, BlackDuck, WebInspect, and Fortify. Also, there is an independent security audit team from Oracle Cloud Operations that carries out monthly reviews of access patterns to Cloud Services using a combination of audit reports from Oracle Identity Manager and keystroke logs from Powerbroker. Oracle evaluates and responds to incidents that create suspicions of unauthorized access to, or handling of, Customer data whether the data resides on Oracle hardware assets or on the personal hardware assets of Oracle employees and contingent workers. When Oracle's Global Information Security (GIS) organization is informed of such incidents, GIS defines escalation paths and response teams to address those incidents, depending on the nature of the activity. GIS will work with the Customer, the appropriate technical teams, and law enforcement where necessary to respond to the incident. The goal of the incident response team will be to restore the confidentiality, integrity, and availability of the Customer's environment, and to establish root causes and remediation steps. Operations staff has documented procedures for addressing incidents where handling of data may have been unauthorized, including prompt and reasonable reporting, escalation procedures, and chain of custody practices. If Oracle determines that Customer data has been misappropriated, Oracle will report such misappropriation to the Customer within 72 hours of making such determination, unless prohibited by law. People, Roles & Identities Oracle Cloud services utilize a multi-factor authentication process. Oracle Cloud uses a central Identity and Access infrastructure to authenticate users. Users are challenged for Web or Mobile Sign-On with single factor and multi-factor authentication including username-token, SSL, and biometrics as possible forms of authentication; access to Web Services requires SAML2.0 (for SOAP) and OAuth 2.0 (for REST) authentication and identity propagation. Identities for users accessing Oracle s Cloud Services are stored and managed centrally in a Cloud Identity Service. User accounts are created once and stored securely in an Identity Management Directory where they are mapped to Enterprise Groups. Each Cloud Service stores its own service specific roles to which are granted authorization policies. Customers map these service specific roles to the Enterprise Groups in the Identity Service thereby enabling role-based access control for users. From an identity integration perspective, customers can also use their on-premise Identity Management infrastructure Directory Services, Access Management/Single Sign-On solutions as the source of truth for user identity and access control with Oracle Cloud Services using SAML 2.0 or WS-Trust based Federation protocols. ICS Users will be created by Tenant Administrators in the Shared IDM. Once provisioned the ICS administration can assign different ICS Roles to its respective users - seeded in the Shared IDM. ICS Page 2

process flows are secured via 1 way SSL and users can access the web services using HTTP Basic Authentication. The web services and web console UI access are authenticated against Shared IDM using the WLS OID/OAM Authenticator, which then communicates with ICS for role and subject authorization. Protection of Data & Information Operational Practices Oracle s Cloud Services are operated with a stringent set of security practices to ensure that customer data, privacy, and services are not compromised. The key elements of these operational practices are: Background checks and segregation Centralized Access Limited Environment Access Operational & Independent Audits Architectural Assessment 3rd Party Vulnerability Assessment Independent Privacy & Security Legal Internal Audit & Risk Management Background checks and segregation All of the Oracle Cloud operations teams are assessed with specific background checks and procedures designed to protect Oracle customer s confidentiality and privacy. Oracle operates its Cloud Services with a strict segregation of duties where the Cloud Services operational staff can only carry out all operational and maintenance activities without access to any customer data. This is accomplished by using Oracle Data Vault allowing its Cloud operations team to operate the system without seeing the data in the system. Customers can secure their data by requesting Oracle to use their Public key to further encrypt data access. Centralized Access Cloud Operations access to any Oracle Cloud environment are governed by very strict procedures. Access to the environment follows a highly centralized logical access path where all cloud ops personnel use desktops with mandatory Desktop Encryption, Personal Firewalls, AntiVirus & AntiSpam software over secure two factor authentication VPN using encrypted protocols (SSH, SFTP and SSL). Any access to a system is centralized via a secure Virtual Desktop Image or Bastion Host with integrated McAfee Data Loss Prevention (DLP). Limited Environment Access Each operational team member has his or her user accounts/passwords centrally stored and provisioned in Identity Management. Their passwords and authorization permissions (which are role-based) are managed in Oracle s Privileged Access Management system to ensure that they are highly secure. Each team member and role is granted limited standing access to environment ( Break Glass ) which is the least privilege required for them to complete their work. Page 3

Operational & Independent Audits Oracle Cloud Operations teams do not manually access production systems to apply patches (software fixes), make configuration changes, or conduct any other operation. They execute all operations from either Chef or Puppet (MCollective) orchestration frameworks which are in turn integrated with Powerbroker (a privileged access management and keystroke logging framework) that captures all actions that are executed on the production services via an integrated audit trail. Each week, the information collected from the Powerbroker audit trail is independently audited and assessed by the Cloud Operations security team and any necessary corrective actions are taken. Architectural Assessment Quarterly, each Cloud Service s architecture is reviewed in depth by security experts from Oracle s product development organization, Oracle s corporate security architecture Review Board (CS-ARB), and by Cloud Operations security specialists. These assessments are called STR Reviews and every issue identified by a review is tracked by Oracle Development and Cloud Operations until it has been completely remediated. 3rd Party Vulnerability Assessment Quarterly, Oracle has a well-known independent security assessment firm conduct an independent audit of its Cloud Services. The issues found by the independent assessment are also tracked using the STR Process and every issue is tracked until it is remediated within a period of 2-4 weeks. Independent Privacy & Security Legal Quarterly, Oracle has an independent privacy and security legal counsel review with Oracle Development and Cloud Operations on any legislative changes that affects Oracle Cloud software and operational practices. Necessary changes are then made to software and operational tools and procedures. Internal Audit & Risk Management Oracle s own internal audit and risk management teams carry out their own audits to ensure that appropriate controls and segregation of duties policies exist between Cloud Operations teams. Security Architecture Oracle Cloud s Security Architecture is designed to protect Oracle s Cloud Services against external and internal threats; to protect customer data and ensure its privacy; and to allow Oracle s Cloud operations team to manage the software while precluding them from seeing customer data through a strict segregation of duties operational model. The key areas for the Security Architecture include Network & Data and Multi-Factor Authentication. Network & Data Oracle Cloud customers have dedicated hosts for their web tier, with requests being routed from the web tier to the application tier and database tier over isolated virtual hosts and network paths that separate individual tenants and individual environments per tenant. All data that is in transit on the network is encrypted using 2-way SSL, 128-bit MD5 encryption including batch, web and mobile user Page 4

interfaces, and web services requests. All traffic is restricted over HTTP to ensure that customers can use standard firewall ports to communicate to Oracle Cloud. Data that is not in transit, but rather located in databases, backups (both full and incremental backups), and on-premise/offsite archives are all encrypted. All keys that are used for encryption are centrally stored and managed in a secure Key Vault. Customers have the option of providing Oracle with the Public Key to be used for encryption by uploading it through a secure customer portal. When a customer requests a data refresh into an environment - for instance, a refresh of their preproduction environment using a copy of their production data Oracle masks all Personally Identifiable Information (PII) including custom attributes and objects the customer may have added. Multi-Factor Authentication Oracle Cloud uses a central Identity and Access infrastructure to authenticate users. Users are challenged for Web or Mobile Sign-On with single factor and multi-factor authentication including username-token, SSL, and biometrics as possible forms of authentication; access to Web Services requires SAML 2.0 (for SOAP) and OAuth 2.0 (for REST) authentication and identity propagation. Privacy Policies Oracle has very strict operational practices and policies on customer data residency given customer concerns about data privacy and legislative and regulatory considerations. The key elements that ensure Oracle complies with these requirements include network architecture, disaster recovery, dedicated operational staff, and privacy and legal training. Network Architecture All Oracle Cloud Services in a specific data center location are isolated in that data center and there is no internal operational network access, (only Internet access) to these services from any other Page 5

geographical location. Hence Oracle Cloud operational staff or any other supporting team from Oracle cannot access the services from outside that legislative jurisdiction. Disaster Recovery All Oracle Cloud Services have their corresponding disaster recovery facilities within the same legislative jurisdiction. For instance, European customers will not have their data replicated to a US data center for disaster recovery. Dedicated Operational Staff All Oracle Cloud Services in a specific data center are have dedicated teams with operational staff from that legislative jurisdiction. Oracle does not co-mingle operational teams across geographies to avoid inadvertent operational access to a Cloud Service from a remote location. Privacy and Legal Training Different countries have different legislative requirements for data residency and associated operational practices. Therefore, Oracle Cloud Services provides specific training to operations team in each data center on operational practices that are compliant with the requirements of that legislative entity. Security Provisions for Cloud Applications ICS is provisioned, patched, monitored, and upgraded by an automated fleet provisioning and management infrastructure. The key elements of the software provisioning infrastructure include tenant administration service, service delivery infrastructure, compute orchestration framework, topology discovery/registration, identity registration, association framework, and patch/upgrade automation framework. Tenant Administration Service When an order is placed for a new Cloud Service, the order is sent from Oracle s Order Management system (or Cloud Portal for Self-Service orders) to the Tenant Administration System (TAS). The TAS is the business system of record for the Cloud Service and accepts the requests, creates the production record for the Tenant Service and then calls the Service Delivery Infrastructure (SDI) to provision the Cloud Service. Service Delivery Infrastructure The Service Delivery Infrastructure is the common global provisioning service for the Oracle Cloud. It is aware of all resource pools (Database Pools, Application Tier Pools, Virtual IP Addresses and Hosts) that are available for each workload in each data center. When SDI receives the tenant provisioning request from TAS, it identifies the optimal resource pool, and invokes a REST Service endpoint for the specific service to provision it. Compute Orchestration Framework The REST endpoint in turn may invoke a chef orchestration script to create the service. This orchestration script creates and allocates the necessary resources a database instance, a compute service, storage volumes, virtual hosts etc. from the resource pool. Page 6

Topology Discovery and Registration Once the resources are allocated, the provisioning framework automatically registers the tenant instance with the monitoring framework by invoking the monitoring framework s agent. This ensures that the service is being monitored before release to the customer and improves operational efficiency. Identity Registration SDI then registers the tenant in the Cloud Identity Service and creates a set of bootstrap users for the Service Administration and the Account Administration roles. An e-mail is then sent to the tenant to access the service. Figure: Cloud Provisioning and Deployment Framework Association Framework Since all the Cloud Services are registered with TAS and SDI, when a customer wants to create an association between two SaaS Services or between PaaS and SaaS Services, the provisioning and setup of associations between the services is automated by SDI. Patch and Upgrade Automation Framework All the Cloud Services are automatically patched and upgraded. These include the application of firmware patches; operating system and hypervisor patches; database patches; and application patches. The patches are applied to individual PODs using a patch automation framework while the operations teams use Chef scripts to orchestrate the framework across PODs. Upgrades fleet wide are automated in a similar fashion. Cloud Networks & Connection Security All Oracle Cloud Services are monitored on a 7x24x365 globally from three global Network Operations Centers. These Network Operations Centers (NOCs) are staffed and monitored by trained and dedicated network operations personnel. The NOCs provide a global real-time monitoring and alerting system and Page 7

are coupled with local monitoring systems to protect against global threats such as: Distributed Denialof-Service attacks, possible cyber-security threats, and global network traffic congestions and patterns. To prevent any cross-geographic network access to systems, all Oracle Cloud Service, including ICS, in the North American data centers are monitored from a NOC in the US. Similarly, all the services in the European data centers are monitored from a NOC in Europe. The NOCs also monitor and receive real time alerts from systems and software that Oracle deploys for the purposes of detecting cyber-security threats and monitoring against security intrusions. The NOC teams have the ability to take real time actions to protect Oracle Cloud services against such threats. Security Controls on the Physical Infrastructure & Facilities Oracle Cloud Services are deployed in world-class data centers that are designed to provide customers with the highest levels of performance, availability, network access bandwidth, and security. All the Data Centers are operated as Tier III facilities of the Uptime Institute standards, which include: High levels of physical security including at least five security checkpoints with dedicated security teams with cleared operational staff complemented with manned security stations, access cards and lists and biometric scanners. Video surveillance, motion detectors, and armed guards along with multiple physical security zones and man traps. Oracle operates dedicated zones or cages that provide 2 types of specialized services for customers who need PCI Compliance and HIPAA Compliance. These cages are strictly certified physically and operationally including PCI DSS Certification. Oracle also operates dedicated cages that are certified compliant with requirements for the US Federal government, the US Department of Defense, and the UK Federal Government. The certifications include for the US Government Cloud - DISA STIG Hardened infrastructure; PCI DSS certification; US government specific security documentation sets, government specific address spaces and namespaces (*.gov.uk *.gov *.mil for example), ISO 27001 Certification, US FedRAMP moderate authorization, and ECSB DoD Addendum CUI Level 4 Authorization. Similarly for the UK Government Cloud these certifications include - US government specific security documentation sets, UK government specific address spaces and namespaces, ISO 27001 Certification, and UK Pan Government IL2 and IL3 Accreditation. Page 8