SlideShare a Scribd company logo
6
Most read
7
Most read
8
Most read
ORACLE CLOUD
SECURITY
By Amit Bhatnagar
Contents
◦ Security in ERP
◦ Common ERP Vulnerabilities
◦ Core Security Pillars
◦ Security in Oracle Cloud
◦ Oracle Cloud ERP Roles
◦ Function & Data Security Policies
◦ Setup Process in Oracle Cloud
◦ Creating Users
◦ Creating Custom Roles
◦ Extra Bytes
◦ Q&A?
Security in ERP
• ERP Security is a wide range of measures aimed at protecting Enterprise resource planning (ERP)
systems from illicit access ensuring accessibility and integrity of system data
• ERP system serves to unify the information intended to manage the organization
• The Advantage of having ERP is that it provides data consistency and all in one solution
Common ERP Vulnerabilities
• Access Control
• Inadequate Training
• Failure to Comply
• Unsecure Integration
• Data Encryption and Masking issues
• Complex Solutions
Core Security Pillars
• Data Encryption
• Security Controls
• Visibility
• Hybrid Cloud
• High Availability
Security in Oracle Cloud
Oracle Cloud ERP Roles
Oracle ERP Cloud uses 3 types of roles:
Job Roles
Represent jobs that users perform in an organization, e.g. General Accountant, Accounts
Payable Manager
Can be assigned to users
Abstract Roles
Represent people in the organization independent of the jobs they perform, e.g. Employee,
Line Manager
Can be assigned to users
Duty Roles
Logical collection of privileges that grant access to tasks that someone performs as part of a
job
Not assignable to users directly
Function & Data Security Policies
• Function Security Policies are defined via function security privileges
• Each function security privilege secures the code resources that make up the relevant pages, page
components (like tabs and buttons) and scheduled jobs
• Data Security Policy defines access by a role, to a business object, with a condition and for an action
(data security privilege)
• Aggregate Privilege combines function security privileges with related data security policies
Setup Process in Oracle Cloud
Data Access Set
Access Set Type Access Level
Full Ledger
Primary
Balancing
Segment
Read Only Read and
Write
Implementing Security In Oracle Cloud
• Create a User
• Assign roles
• Assign Security context to the user through Data Access Set
Creating a User
Use the Create User task to create users if Human Capital Management (HCM)
is NOT being implemented. Create User task creates a minimal person record
and a user account
If HCM is being implemented, use the Hire an Employee task to create users
instead. Hire an Employee task creates the full person record needed by HCM
as well as the user account
Use the Security Console to create implementation only users. Implementation
users are user accounts without the associated person record.
Creating a Custom Role
Managing Data Access
◦ Use the Manage Data Access for
Users task to manage data scope
assignments
◦ Search assignments for a single
user or a single role
◦ You can further filter the search
results, or export the results to
Excel
◦ You can also authorize additional
data accesses
Extra Bytes – Data Import
◦ File based Data Import
◦ ADF Desktop Integration
Q&A
shivmohanp@cltcsi.com
amitb@cltcsi.com
sales@cltcsi.com

More Related Content

PPTX
Oracle Cloud ERP Report and Analytics | What are Cloud ERP reporting Options ...
PPT
OEBS R12 Presentation.ppt
PDF
Oracle Fusion Procurement implementation guide
PPTX
Oracle Supplier Qualification Document Presentation
PPTX
Oracle Solution Presentation
PPTX
Oracle Fusion Architecture
PDF
Oracle Revenue Management Cloud Service
DOC
Md050 application extensions_functional_design_080112
Oracle Cloud ERP Report and Analytics | What are Cloud ERP reporting Options ...
OEBS R12 Presentation.ppt
Oracle Fusion Procurement implementation guide
Oracle Supplier Qualification Document Presentation
Oracle Solution Presentation
Oracle Fusion Architecture
Oracle Revenue Management Cloud Service
Md050 application extensions_functional_design_080112

What's hot (20)

PDF
Oracle Payables R12 ivas
PDF
Transaction Account Builder Oracle Fusion Procurement
PPT
Oracle Fusion Financials Overview
PDF
Oracle Eam Implementation Steps For Oracle E Am Module
PDF
5 enterprise structures
PDF
Understanding Multi-Org Structure in Oracle Apps
ODP
Introduction to Oracle Financials
PDF
Ame how to diagnose issues with the default approver list in purchasing when ...
PPT
Oracle Assets
PDF
Oracle R12 Cash Management New Features
PPT
Oracle Fusion Applications Accounts Payables
PDF
Oracle R12 Legal Entity
PDF
Oracle financials functional training on ap, ar & gl
PDF
Oracle fusion cloud financial : How to create Journal , Manual Vs Spreadsheet?
PPT
Oracle Applications R12 architecture
PPS
Oracle XML Publisher / BI Publisher
PDF
Oracle Financials R12 - GL STEP 1 - Chart Of Accounts
PPTX
Rapid implementation Spreadsheets in Oracle ERP Cloud
PPTX
Designing a Chart of Accounts and Enterprise Structure in Oracle Fusion ERP C...
DOCX
Oracle Purchasing R12 Setup Steps
Oracle Payables R12 ivas
Transaction Account Builder Oracle Fusion Procurement
Oracle Fusion Financials Overview
Oracle Eam Implementation Steps For Oracle E Am Module
5 enterprise structures
Understanding Multi-Org Structure in Oracle Apps
Introduction to Oracle Financials
Ame how to diagnose issues with the default approver list in purchasing when ...
Oracle Assets
Oracle R12 Cash Management New Features
Oracle Fusion Applications Accounts Payables
Oracle R12 Legal Entity
Oracle financials functional training on ap, ar & gl
Oracle fusion cloud financial : How to create Journal , Manual Vs Spreadsheet?
Oracle Applications R12 architecture
Oracle XML Publisher / BI Publisher
Oracle Financials R12 - GL STEP 1 - Chart Of Accounts
Rapid implementation Spreadsheets in Oracle ERP Cloud
Designing a Chart of Accounts and Enterprise Structure in Oracle Fusion ERP C...
Oracle Purchasing R12 Setup Steps
Ad

Similar to Oracle cloud security | User Security, Roles, Access Control and more (20)

PDF
Securing Oracle Procurement - PTTSecuring Oracle Procurement - PTTSecuring Or...
PDF
01_RapidImplement_01_RapidImplementation.pdf4 Securing Oracle Procurement - P...
PPTX
Reduce License costs and increase security in Oracle Applications
PPTX
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
PDF
Best Practices for implementing Database Security Comprehensive Database Secu...
PDF
#OOW16 - Introduction to Advanced Access Controls
PDF
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
PDF
Wp security-data-safe
PDF
Advanced Controls access and user security for superusers con8824
PDF
Oracle Enterprise Manager Security: A Practitioners Guide
PDF
Oracle Enterprise Manager Security A Practitioners Guide
PDF
A5 cloud security_now_a_reason_to_move_to_the_cloud
PPTX
Oracle ADF Case Study
PPTX
People soft risks and controls for educational institutions
PDF
Oracle Data Protection - 1. část
PPTX
The Changing Role of a DBA in an Autonomous World
PDF
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
PPT
ASCC-site-report-123456430523fwje0fjewew
PPTX
Introduction to Oracle Database Security.pptx
PPTX
Oracle 11g security - 2014
Securing Oracle Procurement - PTTSecuring Oracle Procurement - PTTSecuring Or...
01_RapidImplement_01_RapidImplementation.pdf4 Securing Oracle Procurement - P...
Reduce License costs and increase security in Oracle Applications
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
Best Practices for implementing Database Security Comprehensive Database Secu...
#OOW16 - Introduction to Advanced Access Controls
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Wp security-data-safe
Advanced Controls access and user security for superusers con8824
Oracle Enterprise Manager Security: A Practitioners Guide
Oracle Enterprise Manager Security A Practitioners Guide
A5 cloud security_now_a_reason_to_move_to_the_cloud
Oracle ADF Case Study
People soft risks and controls for educational institutions
Oracle Data Protection - 1. část
The Changing Role of a DBA in an Autonomous World
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
ASCC-site-report-123456430523fwje0fjewew
Introduction to Oracle Database Security.pptx
Oracle 11g security - 2014
Ad

Recently uploaded (20)

PDF
cuic standard and advanced reporting.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Machine learning based COVID-19 study performance prediction
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
KodekX | Application Modernization Development
PDF
Encapsulation theory and applications.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Spectroscopy.pptx food analysis technology
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
cuic standard and advanced reporting.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Machine learning based COVID-19 study performance prediction
Review of recent advances in non-invasive hemoglobin estimation
KodekX | Application Modernization Development
Encapsulation theory and applications.pdf
Network Security Unit 5.pdf for BCA BBA.
Spectral efficient network and resource selection model in 5G networks
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
“AI and Expert System Decision Support & Business Intelligence Systems”
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Spectroscopy.pptx food analysis technology
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Big Data Technologies - Introduction.pptx
Understanding_Digital_Forensics_Presentation.pptx

Oracle cloud security | User Security, Roles, Access Control and more

  • 2. Contents ◦ Security in ERP ◦ Common ERP Vulnerabilities ◦ Core Security Pillars ◦ Security in Oracle Cloud ◦ Oracle Cloud ERP Roles ◦ Function & Data Security Policies ◦ Setup Process in Oracle Cloud ◦ Creating Users ◦ Creating Custom Roles ◦ Extra Bytes ◦ Q&A?
  • 3. Security in ERP • ERP Security is a wide range of measures aimed at protecting Enterprise resource planning (ERP) systems from illicit access ensuring accessibility and integrity of system data • ERP system serves to unify the information intended to manage the organization • The Advantage of having ERP is that it provides data consistency and all in one solution
  • 4. Common ERP Vulnerabilities • Access Control • Inadequate Training • Failure to Comply • Unsecure Integration • Data Encryption and Masking issues • Complex Solutions
  • 5. Core Security Pillars • Data Encryption • Security Controls • Visibility • Hybrid Cloud • High Availability
  • 7. Oracle Cloud ERP Roles Oracle ERP Cloud uses 3 types of roles: Job Roles Represent jobs that users perform in an organization, e.g. General Accountant, Accounts Payable Manager Can be assigned to users Abstract Roles Represent people in the organization independent of the jobs they perform, e.g. Employee, Line Manager Can be assigned to users Duty Roles Logical collection of privileges that grant access to tasks that someone performs as part of a job Not assignable to users directly
  • 8. Function & Data Security Policies • Function Security Policies are defined via function security privileges • Each function security privilege secures the code resources that make up the relevant pages, page components (like tabs and buttons) and scheduled jobs • Data Security Policy defines access by a role, to a business object, with a condition and for an action (data security privilege) • Aggregate Privilege combines function security privileges with related data security policies
  • 9. Setup Process in Oracle Cloud Data Access Set Access Set Type Access Level Full Ledger Primary Balancing Segment Read Only Read and Write
  • 10. Implementing Security In Oracle Cloud • Create a User • Assign roles • Assign Security context to the user through Data Access Set
  • 11. Creating a User Use the Create User task to create users if Human Capital Management (HCM) is NOT being implemented. Create User task creates a minimal person record and a user account If HCM is being implemented, use the Hire an Employee task to create users instead. Hire an Employee task creates the full person record needed by HCM as well as the user account Use the Security Console to create implementation only users. Implementation users are user accounts without the associated person record.
  • 13. Managing Data Access ◦ Use the Manage Data Access for Users task to manage data scope assignments ◦ Search assignments for a single user or a single role ◦ You can further filter the search results, or export the results to Excel ◦ You can also authorize additional data accesses
  • 14. Extra Bytes – Data Import ◦ File based Data Import ◦ ADF Desktop Integration

Editor's Notes