SlideShare a Scribd company logo
Enterprise Security Architecture: From Access to Audit
<Insert Picture Here>




Enterprise Security Architecture:
From access to audit
Kamal Tbeileh
Database Security Architecture
Agenda

•   Business Challenges
•   IT Challenges
•   Defense in-depth architecture
•   Q&A
Changing Business Climate
Challenges Our Customers Face…




                "In a time of accelerating turbulence, the
                   valuation of a company will be strongly
                     affected by how it executes change."
Today’s IT Challenges




                       More Compliant Business
                       • Increasing regulatory demands
                       • Increasing privacy concerns
                       • Business viability concerns




More Agile Business                                More Secured Business
• More access to employees, customers & partners • Identity theft
• Higher level of B2B integrations               • Intellectual property theft
• Faster reaction to changing requirements       • Insider threats
Today’s “New Normal”
  Users, Systems, Globalization and Compliance Forced Complexity

           Service Level      Compliance &               IT                Records            Anti-Money
                                                                                              Anti-
            Compliance       Ethics Programs         Governance           Retention           Laundering


                 Financial                              Supply Chain
                                         Audit                                   Legal           Data Privacy
                 Reporting                              Traceability
                                       Management                              Discovery
                Compliance




Users
                             Finance    Suppliers     R&D     Mfg          Sales      HR        Legal      Customers



Systems
                               Enterprise    Data        Database       Mainframes     Mobile Devices       Apps
                              Applications Warehouse                                                        Server


Globalization




Mandates             SOX
                     SOX      JSOX
                              JSOX
                                           EU
                                            EU
                                        Directives
                                        Directives
                                                      FDA
                                                      FDA    Basel II
                                                             Basel II       HIPAA
                                                                            HIPAA      GLBA
                                                                                       GLBA
                                                                                                 Patriot
                                                                                                 Patriot
                                                                                                  Act
                                                                                                   Act
                                                                                                               SB1386
                                                                                                               SB1386   PCI…
                                                                                                                        PCI…
Security for Apps, Middleware, Data and Infrastructure
   Comprehensive ‘Defense in Depth’ Approach


       Applications                                            Automated Controls




                             Monitoring and Configuration
                             Monitoring and Configuration




                                                                                           Enterprise Visibility
                                                                                           Enterprise Visibility
                                                            Access to Business Services


                                                            Lower Cost of User Lifecycle
Middleware




                                                            Data Protection and Privacy
Database and
Infrastructure                                                  Unbreakable Linux


                 Copyright © 2008, Oracle and/or its affiliates. All rights reserved.                              7
Enterprise Security Reference Architecture
Oracle Security Components
                             Applications
              E-Business Suite, PeopleSoft, Siebel, Hyperion, JDE
                             SAP, Custom, Legacy




              Access            Identity Web Service




                                                                    Enterprise Manager
  Identity    Manager          Federation Manager
     and
   Access                 Identity Manager
 Management              Directory Services


              Database Vault                Audit Vault
    Data        Advanced
                                          Label Security
   Security   Security Option

               Information Rights Management
A Typical Environment…




Data
Tier




                                         Presentation
                                             Tier




                              Logic
                            (Business)
                               Tier
Solution: Centralize and Simplify Access




                        SSO
                            E   na
                                  b le
                                         dA
                                              pp
                                                lic
                                                    a   tio
                                                           n   s
Solution: Simplify Access to Multiple Datastores…
Solution: Simplify Employee to Business Partner Login




                           SSO
                               +   Fe
                                     de
                                       rat
                                          i   on
                                                -En
                                                      ab
                                                         le   dA
                                                                   pp
                                                                     s
Oracle Database Security Components
                                          Enterprise Applications




                               Business     Custom   Helpdesk    Email      Portals
                                Apps         Apps


                                                                                            Database           Operational    Business
                                                                                                                  DBA        Application
                              Protect Data                                                  Vault
                                                                     Protect Data from
                             in Motion with
                                                                    View and Alteration     Select SALARY
                                                                                                                   X
                                Network                                                     from users;
                                                                     as well as Insider
                            Encryption using
                                                                       Threat using
                                                                                            Alter system.
                                                                                                                                 X
                           Advanced Security                                                Alter table..
                                                                      Database Vault


                                                        5
Consolidate Audit                Option                                                      * Example roles and privs
     Data &
  Show Reports                                                                                                      Operational
using Audit Vault                                                                     Alter table ….
                                                                                                                       DBA


                                                                                                    Select SALARY from USERS;




    Protect User and Sensitive Data
                                      LNAME     SSN               SALARY
    at Rest by Encrypting Database          123-45-6789
                                           KING                  $125,000
             Columns using                  987-65-4321
                                          SCOTT                  $229,500                         Securely Backup Data To
       Advanced Security Option             345-67-8912
                                          SMITH                  $ 53,700
                                                                                                  Tape with Secure Backup
                                      LNAME CREDIT_CARD          EXP_DATE
                                           KING 1234-5678-9123    04-2010
                                          SCOTT 2345-6789-4321    09-2012
                                          SMITH 9876-5432-1987    01-2011
FMW Security as a Service
   Oracle          3rd Party       Custom             Legacy Applications
   Fusion         ISF Aware      Developed
Applications     Applications    ISF Aware             Business Functions
& Middleware                    Applications                  Authentication
                                                      User
                                                              Authorization
  Business         Business        Business        Management
                                                                Federation
 Functions        Functions       Functions

                                                  Legacy Integration Interface
                                                      Connectors, Agents
             Oracle IAM Suite with Identity Services Framework
 Service Interfaces
                       WS-*, SPML, SAML, XACML, CARML
 Identity Services
   Authentication       Provisioning    Identity Provider         Audit
   Authorization       Administration     Role Provider     Federation & Trust
 Enterprise Identity Management Infrastructure
         Policy & Orchestration              Virtualization & User Store
Oracle Enterprise Security Summary

Application Security                                                  Governance
                                                                      Risk
                                                                      Compliance
                                                                       Policy &
Identity And Access Management                                         Process
 User Management          Directory Management                         Management

 Access Management        Platform Security      Identity Audit        Enterprise
                                                                       Control
Data Security
                                                                       Compliance
 Multi-level Access Control   Encryption                               Analysis &
 Information Rights           DBA Security       Monitoring & Alert    Reporting

Operating System Security                                              Audit
                                                                       Automation
 Authentication Service       User Management
For More Information


         search.oracle.com

            Security



                  or
             oracle.com
Enterprise Security Architecture: From Access to Audit

More Related Content

PDF
Creating Data Hubs to Enhance Information Sharing
PDF
BI Forum 2009 - BI Mega Trends
PPTX
Scalability and Availability - Without Compromise
PDF
Scaling MySQL: Benefits of Automatic Data Distribution
PDF
Managed Services: RFID's Newest Business Model?
PDF
Identity Insights: Social, Local and Mobile Identity
PDF
Bloombase Keyparc Business Brochure
PPT
Vormetric data security complying with pci dss encryption rules
Creating Data Hubs to Enhance Information Sharing
BI Forum 2009 - BI Mega Trends
Scalability and Availability - Without Compromise
Scaling MySQL: Benefits of Automatic Data Distribution
Managed Services: RFID's Newest Business Model?
Identity Insights: Social, Local and Mobile Identity
Bloombase Keyparc Business Brochure
Vormetric data security complying with pci dss encryption rules

What's hot (20)

PDF
Tackling big data with hadoop and open source integration
PDF
Hadoop's Opportunity to Power Next-Generation Architectures
PDF
Pay secure connect brochure
PDF
A Guide to the SOA Galaxy: Strategy, Design and Best Practices
PPT
The Changes In Service Delivery With Cloud Computing
PDF
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
PDF
Simplified Business Event Processing
PPTX
Code objects overview sep 2012
PDF
Identity systems
PDF
Sgtn Supply Chain Initiatives V44 S
PPTX
Xml finland-2011-sami-poikonen-ea nokia
PPTX
Ics Isac Overview V0.1pub
PDF
How a Cloud Computing Provider Reached the Holy Grail of Visibility
PDF
The Value of 'Cloud' in the Business Technology Ecosystem
PPTX
Security for heterogeneous enviroments
PDF
Oracle tech fmw-05-idm-neum-16.04.2010
PDF
Smart Micro Credit Business Suite
PPTX
“The Fountain of Truth” Web-based Contract Management for Starwood Hotels –
PDF
03.09.10 Stn Event Intro
PDF
Audit world slides
Tackling big data with hadoop and open source integration
Hadoop's Opportunity to Power Next-Generation Architectures
Pay secure connect brochure
A Guide to the SOA Galaxy: Strategy, Design and Best Practices
The Changes In Service Delivery With Cloud Computing
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Simplified Business Event Processing
Code objects overview sep 2012
Identity systems
Sgtn Supply Chain Initiatives V44 S
Xml finland-2011-sami-poikonen-ea nokia
Ics Isac Overview V0.1pub
How a Cloud Computing Provider Reached the Holy Grail of Visibility
The Value of 'Cloud' in the Business Technology Ecosystem
Security for heterogeneous enviroments
Oracle tech fmw-05-idm-neum-16.04.2010
Smart Micro Credit Business Suite
“The Fountain of Truth” Web-based Contract Management for Starwood Hotels –
03.09.10 Stn Event Intro
Audit world slides
Ad

Similar to Enterprise Security Architecture: From Access to Audit (20)

PDF
Enterprise Security Architecture: From access to audit
PDF
Securityinsideout
PDF
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
PPTX
Sådan undgår du misbrug af kundedata og fortrolig information
PDF
SYMCAnnual
PDF
Security Awareness Training
PDF
Cloud Auditing
PDF
Security Patterns How To Make Security Arch Easy To Consume
PPTX
Vormetric - Gherkin Event
PDF
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
PPT
IT Infrastructure Specialist
PPT
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
PPT
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PDF
Day 3 p2 - security
PDF
Day 3 p2 - security
PPTX
Software Plus Services Customer Deck[1]
 
PDF
Dataplex Company Overview
PDF
SYMCInvestorPresentationDec2008II
PDF
SYMCInvestorPresentationDec2008II
PPTX
Best Practice For Public Sector Information Security And Compliance
Enterprise Security Architecture: From access to audit
Securityinsideout
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
Sådan undgår du misbrug af kundedata og fortrolig information
SYMCAnnual
Security Awareness Training
Cloud Auditing
Security Patterns How To Make Security Arch Easy To Consume
Vormetric - Gherkin Event
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
IT Infrastructure Specialist
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
PCTY 2012, IBM Security and Strategy v. Fabio Panada
Day 3 p2 - security
Day 3 p2 - security
Software Plus Services Customer Deck[1]
 
Dataplex Company Overview
SYMCInvestorPresentationDec2008II
SYMCInvestorPresentationDec2008II
Best Practice For Public Sector Information Security And Compliance
Ad

More from Bob Rhubart (20)

PDF
Business Integration for the 21st Century
PDF
Oracle Cloud Reference Architecture
PDF
Enterprise Strategy for Cloud Security
PDF
Innovations in Grid Computing with Oracle Coherence
PDF
Cloud Computing - A Pragmatic Approach to Cloud Adoption
PDF
High Availability Infrastructure for Cloud Computing
PDF
Engineered Systems: Oracle's Vision for the Future
PDF
Innovations in Data Grid Technology with Oracle Coherence
PDF
Making IT Simple: A Pragmatic Approach to Cloud Computing
PDF
Oracle Cloud Reference Architecture
PDF
Oracle VM Consolidation and Path to the Cloud
PDF
Engineered Systems: Oracle's Vision for the Future
PDF
21st Century SOA
PDF
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
PDF
Cloud Computing Industry Trends and Directions
PDF
Manage and Monitor Oracle Applications in the Cloud
PDF
21st Century Service Oriented Architecture
PDF
Application-Driven Virtualization: Architectural Considerations
PDF
Oracle Enterprise Manager
PDF
Engineered Systems: Oracle’s Vision for the Future
Business Integration for the 21st Century
Oracle Cloud Reference Architecture
Enterprise Strategy for Cloud Security
Innovations in Grid Computing with Oracle Coherence
Cloud Computing - A Pragmatic Approach to Cloud Adoption
High Availability Infrastructure for Cloud Computing
Engineered Systems: Oracle's Vision for the Future
Innovations in Data Grid Technology with Oracle Coherence
Making IT Simple: A Pragmatic Approach to Cloud Computing
Oracle Cloud Reference Architecture
Oracle VM Consolidation and Path to the Cloud
Engineered Systems: Oracle's Vision for the Future
21st Century SOA
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Cloud Computing Industry Trends and Directions
Manage and Monitor Oracle Applications in the Cloud
21st Century Service Oriented Architecture
Application-Driven Virtualization: Architectural Considerations
Oracle Enterprise Manager
Engineered Systems: Oracle’s Vision for the Future

Recently uploaded (20)

PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Machine learning based COVID-19 study performance prediction
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
cuic standard and advanced reporting.pdf
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
PPT
Teaching material agriculture food technology
PDF
KodekX | Application Modernization Development
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
MYSQL Presentation for SQL database connectivity
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
GamePlan Trading System Review: Professional Trader's Honest Take
Reach Out and Touch Someone: Haptics and Empathic Computing
Machine learning based COVID-19 study performance prediction
Diabetes mellitus diagnosis method based random forest with bat algorithm
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Network Security Unit 5.pdf for BCA BBA.
Spectral efficient network and resource selection model in 5G networks
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
cuic standard and advanced reporting.pdf
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
Teaching material agriculture food technology
KodekX | Application Modernization Development
Advanced methodologies resolving dimensionality complications for autism neur...
MYSQL Presentation for SQL database connectivity
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
The Rise and Fall of 3GPP – Time for a Sabbatical?
Mobile App Security Testing_ A Comprehensive Guide.pdf

Enterprise Security Architecture: From Access to Audit

  • 2. <Insert Picture Here> Enterprise Security Architecture: From access to audit Kamal Tbeileh Database Security Architecture
  • 3. Agenda • Business Challenges • IT Challenges • Defense in-depth architecture • Q&A
  • 4. Changing Business Climate Challenges Our Customers Face… "In a time of accelerating turbulence, the valuation of a company will be strongly affected by how it executes change."
  • 5. Today’s IT Challenges More Compliant Business • Increasing regulatory demands • Increasing privacy concerns • Business viability concerns More Agile Business More Secured Business • More access to employees, customers & partners • Identity theft • Higher level of B2B integrations • Intellectual property theft • Faster reaction to changing requirements • Insider threats
  • 6. Today’s “New Normal” Users, Systems, Globalization and Compliance Forced Complexity Service Level Compliance & IT Records Anti-Money Anti- Compliance Ethics Programs Governance Retention Laundering Financial Supply Chain Audit Legal Data Privacy Reporting Traceability Management Discovery Compliance Users Finance Suppliers R&D Mfg Sales HR Legal Customers Systems Enterprise Data Database Mainframes Mobile Devices Apps Applications Warehouse Server Globalization Mandates SOX SOX JSOX JSOX EU EU Directives Directives FDA FDA Basel II Basel II HIPAA HIPAA GLBA GLBA Patriot Patriot Act Act SB1386 SB1386 PCI… PCI…
  • 7. Security for Apps, Middleware, Data and Infrastructure Comprehensive ‘Defense in Depth’ Approach Applications Automated Controls Monitoring and Configuration Monitoring and Configuration Enterprise Visibility Enterprise Visibility Access to Business Services Lower Cost of User Lifecycle Middleware Data Protection and Privacy Database and Infrastructure Unbreakable Linux Copyright © 2008, Oracle and/or its affiliates. All rights reserved. 7
  • 9. Oracle Security Components Applications E-Business Suite, PeopleSoft, Siebel, Hyperion, JDE SAP, Custom, Legacy Access Identity Web Service Enterprise Manager Identity Manager Federation Manager and Access Identity Manager Management Directory Services Database Vault Audit Vault Data Advanced Label Security Security Security Option Information Rights Management
  • 10. A Typical Environment… Data Tier Presentation Tier Logic (Business) Tier
  • 11. Solution: Centralize and Simplify Access SSO E na b le dA pp lic a tio n s
  • 12. Solution: Simplify Access to Multiple Datastores…
  • 13. Solution: Simplify Employee to Business Partner Login SSO + Fe de rat i on -En ab le dA pp s
  • 14. Oracle Database Security Components Enterprise Applications Business Custom Helpdesk Email Portals Apps Apps Database Operational Business DBA Application Protect Data Vault Protect Data from in Motion with View and Alteration Select SALARY X Network from users; as well as Insider Encryption using Threat using Alter system. X Advanced Security Alter table.. Database Vault 5 Consolidate Audit Option * Example roles and privs Data & Show Reports Operational using Audit Vault Alter table …. DBA Select SALARY from USERS; Protect User and Sensitive Data LNAME SSN SALARY at Rest by Encrypting Database 123-45-6789 KING $125,000 Columns using 987-65-4321 SCOTT $229,500 Securely Backup Data To Advanced Security Option 345-67-8912 SMITH $ 53,700 Tape with Secure Backup LNAME CREDIT_CARD EXP_DATE KING 1234-5678-9123 04-2010 SCOTT 2345-6789-4321 09-2012 SMITH 9876-5432-1987 01-2011
  • 15. FMW Security as a Service Oracle 3rd Party Custom Legacy Applications Fusion ISF Aware Developed Applications Applications ISF Aware Business Functions & Middleware Applications Authentication User Authorization Business Business Business Management Federation Functions Functions Functions Legacy Integration Interface Connectors, Agents Oracle IAM Suite with Identity Services Framework Service Interfaces WS-*, SPML, SAML, XACML, CARML Identity Services Authentication Provisioning Identity Provider Audit Authorization Administration Role Provider Federation & Trust Enterprise Identity Management Infrastructure Policy & Orchestration Virtualization & User Store
  • 16. Oracle Enterprise Security Summary Application Security Governance Risk Compliance Policy & Identity And Access Management Process User Management Directory Management Management Access Management Platform Security Identity Audit Enterprise Control Data Security Compliance Multi-level Access Control Encryption Analysis & Information Rights DBA Security Monitoring & Alert Reporting Operating System Security Audit Automation Authentication Service User Management
  • 17. For More Information search.oracle.com Security or oracle.com