SlideShare a Scribd company logo
How security can
help lower your
licensing costs in
Oracle ERP/HCM
Cloud
Working on Identity, Access,
Security, Internal Controls,
Audit & Compliance since
2003.
Lewis@seecuring.com
Seecuring supports organizations through
evaluating and assisting in audit, security and
controls, including:
• Segregation of Duties.
• Sensitive Access.
• Patch Impact Analysis.
Pro-active and Detective testing, ensure security
goes in clean.
Provided as a service from training through to
controls evaluation.
Applications supported
Oracle ERP/HCM Cloud Workday
Salesforce MS Dynamics
E-Business Suite SAP Concur
Peoplesoft JD Edwards
Oracle Edge Applications Yardi
The developing application landscape
Over 50% of Applications are now deployed without IT
and perhaps the associated asset management procedure
he average Enterprise has over 400 Applications.
hadow Applications has become a major concern for
xecutives.
ps://www.ciodive.com/news/app-sprawl-saas-data-shadow-it-productiv/606872/
Reduce License costs and increase security in Oracle Applications
The developing application landscape – PART 2
As customer acquisition slows, vendors will
look to raise more revenue from existing customers.
• Additional Services.
• Additional Modules.
• Auditing usage.
AKA Licensing.
The developing application landscape – PART 2
As customer acquisition slows, vendors will
look to raise more revenue from existing customers.
• Additional Services.
• Additional Modules.
• Auditing usage.
AKA Licensing.
Reduce License costs and increase security in Oracle Applications
Cloud applications allow easy
expansion without installing
the additional modules
= Increased Risk of usage
without authority
Licensing in Oracle
Oracle has a licensing
department, but no word on
efforts for ERP/HCM licensing.
So how can good security
help with licensing in Oracle
ERP/HCM Cloud?
(lets not also forget CX Cloud)
1. Controlling user counts.
2. Controlling who can
enable new features.
3. Effective security design.
1. Controlling user counts.
The importance of auditing access.
How are you onboarding?
47% of Companies struggle to
onboard because of IT processes.
https://www.strongdm.com/blog/employee-onboarding-statistics.
1. Controlling user counts.
Inadequate Offboarding may leave
you with license overage (as well as
security risks)
Forty-two percent experienced at least 5% of instances of unauthorized access to SaaS applications
and cloud infrastructure due to deprovisioning deficiencies of former workers; one-fifth had more
than 10% such instances; and 17% didn’t know the extent of unauthorized access stemming from
incomplete deprovisioning of employees and contractors.
https://venturebeat.com/security/why-inadequate-automation-of-onboarding-and-offboarding-result
s-in-security-risks-and-data-loss/
1. Controlling user counts.
Suspending a user = user no longer has roles or
has been manually suspended. Don’t rely on this.
Locked = the account is locked, usually because of
entering a password too many times. Don’t rely on
this.
Active/Inactive = the best way to ensure access (or
not to the application)
2. Controlling who can enable
new features.
Navigator -> My Enterprise -> Offerings
Many new features can be enabled following a patch. Access to
this feature, (license impact or not) should be secured.
Enablement should go through change control for
accountability.
3. Effective Security Design
Oracle stores data related to Privileges and the services they are
associated with.
The delivered Roles have Sensitive Access and Segregation of
Duty issues.
Roles are most often over provisioned.
3. Effective Security Design
Oracle stores data related to Privileges and the services they are
associated with.
The delivered Roles have Sensitive Access and Segregation of
Duty issues.
Roles are most often over provisioned.
3. Effective Security Design
They say a picture is worth a thousand words:
Roles ‘can’ consist of other sub roles,
Duty Roles and other Job Roles.
Job Role – General
Accountant
Duty Role – Period Close
Management
3. Effective Security Design
3. Effective Security Design
Receiving Transaction Maintenance
Role
SoD: Can create and maintain AP Invoices and
Receive Transactions
Holds license for ERP and Supply Chain
3. Effective Security Design
Receiving Transaction Maintenance
Role
SoD: Can create and maintain AP Invoices and
Receive Transactions
Holds license for ERP and Supply Chain via the
Privileges in conflict
3. Effective Security Design
Delivered Roles provide the opportunity
for license over use due to over
provisioning.
Custom Roles Vs
Delivered/Seeded Roles
Custom Roles provide the opportunity
to take back control.
Delivered Roles are (again) over
provisioned,
and are updated by Oracle.
Delivered Roles had the
following changes (23B)
Over 130 New Privileges.
255 New Privilege to Role assignments
(84 are existing Privileges).
160 Role to Role assignments.
58 New Data Security Policy
assignments.
124 New Profile Options.
Seecuring
Provides reviews of Segregation of
Duties, Sensitive Access, Change and
License analysis
as a Service.
Seecuring
No software to install, integrate and no
need to ‘open up’ your applications.
We provide the technology and services
to support your organization’s internal
control goals.
Contact
lewis@seecuring.com

More Related Content

PDF
SailPoint VS CyberArk.pdf
PDF
Sap GRC Basic Information | GRC 12 online training
PDF
Dumpscafe CompTIA Security+ SY0-701 Exam Dumps
PDF
Oracle Scene Safeguard your Business
PDF
Oracle Scene Oct 2017
PDF
How vulnerable are you to insider attacks?.pdf
SailPoint VS CyberArk.pdf
Sap GRC Basic Information | GRC 12 online training
Dumpscafe CompTIA Security+ SY0-701 Exam Dumps
Oracle Scene Safeguard your Business
Oracle Scene Oct 2017
How vulnerable are you to insider attacks?.pdf

Similar to Reduce License costs and increase security in Oracle Applications (20)

PPTX
Sroaug October 27 2017 Learn to Streamline User Provisioning in Oracle Apps
PPTX
Transforming IT - ITaaS Onboarding
PDF
2021 State of Cloud Permissions Risks Report (1).pdf
PDF
MSFT Cloud Architecture Information Protection
DOC
Saipraveen_Cirrculum_Vitae
PDF
Iia los angeles sap security presentation
PDF
Thousands of Hours Saved and Risk Reduced for EBS Upgrades & Implementations
PDF
TOP SAILPOINT INTERVIEW QUESTION
PPTX
Implementing security and controls in people soft best practices - may 2017
PPTX
IBM Relay 2015: Securing the Future
 
PPT
InsiderAttack_p3.ppt
PDF
FulcrumWay - Ed. Webinar - Role & Responsibility Design Techniques that Stren...
PDF
Prevent SAP Security Vulnerabilities | Symmetry
PDF
User_Access_IIA-LA_3-9-2016
PPT
How It All Ties Together Sun Idm Roadshow For Sun
PDF
Sap basis and_security_administration
PDF
Advanced Controls access and user security for superusers con8824
PDF
Security and Compliance
PDF
Identify and monitoring multi-platform and cross-platform access control
Sroaug October 27 2017 Learn to Streamline User Provisioning in Oracle Apps
Transforming IT - ITaaS Onboarding
2021 State of Cloud Permissions Risks Report (1).pdf
MSFT Cloud Architecture Information Protection
Saipraveen_Cirrculum_Vitae
Iia los angeles sap security presentation
Thousands of Hours Saved and Risk Reduced for EBS Upgrades & Implementations
TOP SAILPOINT INTERVIEW QUESTION
Implementing security and controls in people soft best practices - may 2017
IBM Relay 2015: Securing the Future
 
InsiderAttack_p3.ppt
FulcrumWay - Ed. Webinar - Role & Responsibility Design Techniques that Stren...
Prevent SAP Security Vulnerabilities | Symmetry
User_Access_IIA-LA_3-9-2016
How It All Ties Together Sun Idm Roadshow For Sun
Sap basis and_security_administration
Advanced Controls access and user security for superusers con8824
Security and Compliance
Identify and monitoring multi-platform and cross-platform access control
Ad

Recently uploaded (20)

PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Encapsulation theory and applications.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Electronic commerce courselecture one. Pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPT
Teaching material agriculture food technology
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Mobile App Security Testing_ A Comprehensive Guide.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Encapsulation theory and applications.pdf
Review of recent advances in non-invasive hemoglobin estimation
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Electronic commerce courselecture one. Pdf
Network Security Unit 5.pdf for BCA BBA.
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
sap open course for s4hana steps from ECC to s4
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Unlocking AI with Model Context Protocol (MCP)
Agricultural_Statistics_at_a_Glance_2022_0.pdf
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Teaching material agriculture food technology
Ad

Reduce License costs and increase security in Oracle Applications

  • 1. How security can help lower your licensing costs in Oracle ERP/HCM Cloud
  • 2. Working on Identity, Access, Security, Internal Controls, Audit & Compliance since 2003. Lewis@seecuring.com
  • 3. Seecuring supports organizations through evaluating and assisting in audit, security and controls, including: • Segregation of Duties. • Sensitive Access. • Patch Impact Analysis. Pro-active and Detective testing, ensure security goes in clean. Provided as a service from training through to controls evaluation.
  • 4. Applications supported Oracle ERP/HCM Cloud Workday Salesforce MS Dynamics E-Business Suite SAP Concur Peoplesoft JD Edwards Oracle Edge Applications Yardi
  • 5. The developing application landscape Over 50% of Applications are now deployed without IT and perhaps the associated asset management procedure he average Enterprise has over 400 Applications. hadow Applications has become a major concern for xecutives. ps://www.ciodive.com/news/app-sprawl-saas-data-shadow-it-productiv/606872/
  • 7. The developing application landscape – PART 2 As customer acquisition slows, vendors will look to raise more revenue from existing customers. • Additional Services. • Additional Modules. • Auditing usage. AKA Licensing.
  • 8. The developing application landscape – PART 2 As customer acquisition slows, vendors will look to raise more revenue from existing customers. • Additional Services. • Additional Modules. • Auditing usage. AKA Licensing.
  • 10. Cloud applications allow easy expansion without installing the additional modules = Increased Risk of usage without authority
  • 11. Licensing in Oracle Oracle has a licensing department, but no word on efforts for ERP/HCM licensing.
  • 12. So how can good security help with licensing in Oracle ERP/HCM Cloud? (lets not also forget CX Cloud)
  • 13. 1. Controlling user counts. 2. Controlling who can enable new features. 3. Effective security design.
  • 14. 1. Controlling user counts. The importance of auditing access. How are you onboarding? 47% of Companies struggle to onboard because of IT processes. https://www.strongdm.com/blog/employee-onboarding-statistics.
  • 15. 1. Controlling user counts. Inadequate Offboarding may leave you with license overage (as well as security risks) Forty-two percent experienced at least 5% of instances of unauthorized access to SaaS applications and cloud infrastructure due to deprovisioning deficiencies of former workers; one-fifth had more than 10% such instances; and 17% didn’t know the extent of unauthorized access stemming from incomplete deprovisioning of employees and contractors. https://venturebeat.com/security/why-inadequate-automation-of-onboarding-and-offboarding-result s-in-security-risks-and-data-loss/
  • 16. 1. Controlling user counts. Suspending a user = user no longer has roles or has been manually suspended. Don’t rely on this. Locked = the account is locked, usually because of entering a password too many times. Don’t rely on this. Active/Inactive = the best way to ensure access (or not to the application)
  • 17. 2. Controlling who can enable new features. Navigator -> My Enterprise -> Offerings Many new features can be enabled following a patch. Access to this feature, (license impact or not) should be secured. Enablement should go through change control for accountability.
  • 18. 3. Effective Security Design Oracle stores data related to Privileges and the services they are associated with. The delivered Roles have Sensitive Access and Segregation of Duty issues. Roles are most often over provisioned.
  • 19. 3. Effective Security Design Oracle stores data related to Privileges and the services they are associated with. The delivered Roles have Sensitive Access and Segregation of Duty issues. Roles are most often over provisioned.
  • 20. 3. Effective Security Design They say a picture is worth a thousand words: Roles ‘can’ consist of other sub roles, Duty Roles and other Job Roles. Job Role – General Accountant Duty Role – Period Close Management
  • 22. 3. Effective Security Design Receiving Transaction Maintenance Role SoD: Can create and maintain AP Invoices and Receive Transactions Holds license for ERP and Supply Chain
  • 23. 3. Effective Security Design Receiving Transaction Maintenance Role SoD: Can create and maintain AP Invoices and Receive Transactions Holds license for ERP and Supply Chain via the Privileges in conflict
  • 24. 3. Effective Security Design Delivered Roles provide the opportunity for license over use due to over provisioning.
  • 25. Custom Roles Vs Delivered/Seeded Roles Custom Roles provide the opportunity to take back control. Delivered Roles are (again) over provisioned, and are updated by Oracle.
  • 26. Delivered Roles had the following changes (23B) Over 130 New Privileges. 255 New Privilege to Role assignments (84 are existing Privileges). 160 Role to Role assignments. 58 New Data Security Policy assignments. 124 New Profile Options.
  • 27. Seecuring Provides reviews of Segregation of Duties, Sensitive Access, Change and License analysis as a Service.
  • 28. Seecuring No software to install, integrate and no need to ‘open up’ your applications. We provide the technology and services to support your organization’s internal control goals.