SlideShare a Scribd company logo
The Enablement of an
Identity-Centric SOC in the
Regulatory Rumba Era
Luca Martelli
Senior Director
Identity Management & Security
Oracle EMEA
@lmartelli
Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
Safe Harbor Statement
The following is intended to outline our general product direction. It is intended for
information purposes only, and may not be incorporated into any contract. It is not a
commitment to deliver any material, code, or functionality, and should not be relied upon
in making purchasing decisions. The development, release, and timing of any features or
functionality described for Oracle’s products remains at the sole discretion of Oracle. Not
all technologies identified are available for all cloud services.
Disclaimer
The information in this document may not be construed or used as legal advice about the
content, interpretation or application of any law, regulation or regulatory guideline.
Customers and prospective customers must seek their own legal counsel to understand
the applicability of any law or regulation on their processing of personal data, including
through the use of any vendor’s products or services.
2
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Employees PartnersConsumers
Digital Disruption – Changing Changed World
Oracle Public 3
ON PREMISES PUBLIC CLOUD
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
Regulatory requirements will
make data
possession a privilege.
Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
Basic Principles for
data protection
Oracle Confidential
Show adequate
protection of data
Gain consent to use data
Provide personal data to users
Locate your data
Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
Least Privilege Defence-in-Depth
Oracle Promotes Strong Security Principles
For all your sensitive data including Intellectual Property, Business Information or Personal Information
6
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
People Security Software Security
7
Data Security
Oracle Security Controls which can help in the Regulations
Rumba Era in the Hybrid Cloud
Identity Mgmt
Access Mgmt
Governance
Compliance
Self-Service
Authentication
Authorisation
Audit
Single Sign-On
Preventative Controls
Detective Controls
Administrative Controls
Segregation of DutyEncryption
Data Masking Key
Management
Audit
API Security
Application and
Service Configuration
Patching
IT Compliance
Threat Intelligence, User/Log Analytics, Incident Response
Application and
Service Performance
Audit
Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
Where is my DATA?
8
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Your PII + Sensitive Data is Already in the Cloud
9
2016 Cloud Security Research Report, Crowd Research Partner
79%
Of enterprises are actively
deploying cloud solutions in
public, private, or hybrid
cloud environments
% of Enterprises Deploying
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | Oracle Public 10
Workloads are Everywhere Cloud is not just SaaS.
Workloads are moving
rapidly to PaaS and IaaS
71% of large enterprise will shift
some workloads to cloud by 2018
Enterprises plan to use an average
of 6 clouds to run their workloads
2016 McKinsey, 2016 Right Scale
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Modern Security Attacks Are…
Oracle Confidential
Not carried out
by humans
(they are automated)
Not confined to network
(they begin outside)
Not static
(they adapt)
IS YOUR
SOC READY?
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Traditional SOC -Security Operation Center
Current Approach Is Fragmented and Integration Intensive
12
SIEM
(Security Information & Event Management)
Security context, Rules based detection
UEBA
(User and Entity Behavior Analytics)
User context, Anomaly detection
X Multi-product/vendor challenges
X Integration, UIs, data models, support…
X Scale and delivery model differences
X High viability and M&A risk
X Point in time, app specific state checks
Log Management
Raw logs, Forensic search, IT ops analytics
Configuration Management
Secure state, configuration auditing
IdentityManagement
CASB-(CloudAccessSecurityBroker)
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Traditional SOC:
Current Approach Is Fragmented and Integration Intensive
13
SIEM
(Security Information & Event Management)
Security context, Rules based detection
UEBA
(User and Entity Behavior Analytics)
User context, Anomaly detection
X Multi-product/vendor challenges
X Integration, UIs, data models, support…
X Scale and delivery model differences
X High viability and M&A risk
X Point in time, app specific state checks
Log Management
Raw logs, Forensic search, IT ops analytics
Configuration Management
Secure state, configuration auditing
IdentityManagement
CASB-(CloudAccessSecurityBroker)
Manual processes
(too many alerts, no context)
Static protection
(not adaptive)
Focused within perimeter
(not external data/apps)
Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | Confidential – Oracle Internal 14
The Perimeter
Has Moved
Identity is the
new perimeter
Only 14% believe network
security tools work well
protecting public cloud
2016 Cloud Security Research Report, Crowd Research Partners
Oracle ConfidentialCopyright © 2017, Oracle and/or its affiliates. All rights reserved. |
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Threat
intelligence
Oracle’s Identity-Centric SOC Approach
Next Gen Security for the Hybrid Cloud
CASB UEBA
Identity Management
SIEM
Automated remediation
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |Confidential – Oracle Internal
Security Cloud Services: Enabling Faster
and More Secure Cloud Adoption
Oracle PublicCopyright © 2016, Oracle and/or its affiliates. All rights reserved. |
API Platform
Cloud Service
Configuration &
Compliance
Cloud Service
Hybrid Database
Security
Identity Cloud
Service
Security Monitoring
& Analytics
Cloud Service CASB Cloud Service
Identity SOC (Security Operations Center)
16Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
Embracing the Cloud
Heterogeneous cloud environments allow
focus on quality products and brand
Threat Intelligence
CASB for a more intelligent-driven SOC
Cloud Controls
Oracle CASB to monitor sanctioned cloud environments
and ensure ongoing visibility
User Behavior Analytics
Ongoing monitoring of privileged behavior
in IaaS environment
17Copyright © 2017, Oracle and/or its affiliates. All rights reserved.
Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
Where is my DATA? / part 2
18
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Crypto toolkit for
applications
Row-level securityKey management
Data encryption
Evaluate Prevent Detect Data-driven Security
Security configuration
Sensitive
data discovery
Privilege Analysis
DBA & operation
controls
Database auditing
Database/SQL firewall
Real application security
Label-based security
Centralized monitoring
Security assessment Alerting & reporting
Data redaction
Data masking and
subsetting
Comprehensive Hybrid Database Security Controls
19
Copyright © 2016 Oracle and/or its affiliates. All rights reserved. |
*7#$%!!@!%afb
##<>*$#@34
Data
Encryption
Key Vault
Key Vault
Data
Redaction
dob:xx/xx/xxxx
ssn:xxx-xx-4321
Applications
Users
CX App
DB
Controls
Access
denied
Sensitive Data, IP
PCI, PII, PHI
Privileged UsersPrivileged
User
Prevent Damage to Databases from Attacks
Region, Year
Size-based
Data
Subsetting
Dev/Test
Partners, BI
dob: 12/01/1987
Data
Masking
11/05/1999
xxxxxxxxxx
20
Copyright © 2016 Oracle and/or its affiliates. All rights reserved. |
Audit Data,
Event Logs
Database Firewall
Users
Policies
Reports
Alerts
Network
Events
Applications
Audit Vault
Detect, Audit and Monitor
Databases
21
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
• Key aspects of GDPR
– New statutory requirements
will require companies to re-
think how they handle and
protect their personal data
– Includes a new liability and
sanction regime
– Entry into force on 25 May
2018
• Potential serious
consequences
– Fines of up to 4% of global
annual revenue or €20M
– 72 hours for data breach
notification
• Aspects of GDPR that Oracle
Offerings may Help Address
– “Data Protection by design and
default”
– “Security of Processing“
– “Data Breach Notifications to
Individuals” not required if
security controls prevent
breach from occurring
– If a data breach occurs
“administrative fines shall”
take into account “technical
and organisational measures
implemented”
23
• Relevant Oracle Offerings
– Database Security Advanced
Security Option, Database Vault,
Audit Vault Database Firewall, Key
Vault, Data Masking/Subsetting. DB
Cloud can make use of DB security
features/options
– High availability and resilience:
Data Guard, RAC, Backup solutions,
ZDLRA
– Software Security CASB Cloud
Service, SMA Cloud Service, CC
Cloud Service, API-Platform Cloud
Service
– Identity Management Identity
Governance, Identity Cloud Service,
Access Management, Centralised
Directory
– Applicable to “existing/legacy
systems and new digital systems”
Summary: GDPR & Oracle Offerings
Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
(Every journey starts from where
you stand today)
So where do we begin…
Take a Security Risk Assessment
Whitepaper on Database Security and GDPR
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | Oracle Public 25
For More Information
Blogs.oracle.com/
OracleIDM
@OracleSecurity /Oraclesecurity
• Learn about Security Cloud Services @
cloud.oracle.com/paas
• Learn about Identity Cloud Service @
oracle.com/IdentityCloud
• Watch for new service announcements
@ oracle.com/security
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | 26
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era

More Related Content

PPTX
The EU General Protection Regulation and how Oracle can help
PDF
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
PPTX
Webinar: Data Classification - Closing the Gap between Enterprise and SAP Data
PPTX
Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...
PDF
Cisco iron port_email_data_loss_prevention_overview
PPTX
Top 10 Best Practices for Implementing Data Classification
PPTX
IDERA Live | Understanding SQL Server Compliance both in the Cloud and On Pre...
PDF
GDPR Changing Mindset
The EU General Protection Regulation and how Oracle can help
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Webinar: Data Classification - Closing the Gap between Enterprise and SAP Data
Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...
Cisco iron port_email_data_loss_prevention_overview
Top 10 Best Practices for Implementing Data Classification
IDERA Live | Understanding SQL Server Compliance both in the Cloud and On Pre...
GDPR Changing Mindset

What's hot (17)

PDF
C7 defending the cloud with monitoring and auditing
PDF
A4 drive dev_ops_agility_and_operational_efficiency
PDF
Forcepoint Dynamic Data Protection
PDF
Boldon James - How Data Classification can harness the power of Big Data
PDF
The Definitive GDPR Guide for Event Professionals
PPTX
Opening remarks-dave-profozichv2
PPTX
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
PPTX
Health Care Certified Hosting in France
PDF
Overview of Data Loss Prevention Policies in Office 365
PPTX
Office365 security in depth
PPTX
Global Azure Bootcamp 216 - Azure Rights Management
PDF
One name unify them all
PDF
Information protection & classification
PPTX
Flare - Connecting Your Organization With Its Information
PPTX
Azure Information Protection - Taking a Team Approach
DOCX
Data privacy and security in uae
PPTX
1° Sessione Oracle CRUI: Analytics Data Lab, the power of Big Data Investiga...
C7 defending the cloud with monitoring and auditing
A4 drive dev_ops_agility_and_operational_efficiency
Forcepoint Dynamic Data Protection
Boldon James - How Data Classification can harness the power of Big Data
The Definitive GDPR Guide for Event Professionals
Opening remarks-dave-profozichv2
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
Health Care Certified Hosting in France
Overview of Data Loss Prevention Policies in Office 365
Office365 security in depth
Global Azure Bootcamp 216 - Azure Rights Management
One name unify them all
Information protection & classification
Flare - Connecting Your Organization With Its Information
Azure Information Protection - Taking a Team Approach
Data privacy and security in uae
1° Sessione Oracle CRUI: Analytics Data Lab, the power of Big Data Investiga...
Ad

Similar to The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era (20)

PDF
A5 cloud security_now_a_reason_to_move_to_the_cloud
PDF
Public hyperledger meetup sf may 2018
PDF
SOUG Day - autonomous what is next
PDF
Best Practices for implementing Database Security Comprehensive Database Secu...
PDF
Securing your Applications for the Cloud Age
PDF
B4 the identity of things-securing the internet of everything
PPTX
Oracle Cloud Café hybrid Cloud 19 mai 2016
PPTX
Oracle Management Cloud - HybridCloud Café - May 2016
PPTX
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
PPTX
The Changing Role of a DBA in an Autonomous World
PPTX
Unified ERP HCM Presentation-23Feb16
PDF
TLV - MySQL Security overview
PDF
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
PDF
Improving Cloud Visibility, Accountability & Security
PPTX
Oracle: Building Cloud Native Applications
PPTX
Agile Development and DevOps in the Oracle Cloud
PDF
CSPA Keynote: BLOCKCHAIN for Enterprise
PDF
#OOW16 - Risk Management Cloud / GRC General Session
PPTX
Oracle cloud, private, public and hybrid
PPT
3 oraclex evento reg puglia_v2017-09-14-2
A5 cloud security_now_a_reason_to_move_to_the_cloud
Public hyperledger meetup sf may 2018
SOUG Day - autonomous what is next
Best Practices for implementing Database Security Comprehensive Database Secu...
Securing your Applications for the Cloud Age
B4 the identity of things-securing the internet of everything
Oracle Cloud Café hybrid Cloud 19 mai 2016
Oracle Management Cloud - HybridCloud Café - May 2016
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
The Changing Role of a DBA in an Autonomous World
Unified ERP HCM Presentation-23Feb16
TLV - MySQL Security overview
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
Improving Cloud Visibility, Accountability & Security
Oracle: Building Cloud Native Applications
Agile Development and DevOps in the Oracle Cloud
CSPA Keynote: BLOCKCHAIN for Enterprise
#OOW16 - Risk Management Cloud / GRC General Session
Oracle cloud, private, public and hybrid
3 oraclex evento reg puglia_v2017-09-14-2
Ad

Recently uploaded (20)

PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Encapsulation theory and applications.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Cloud computing and distributed systems.
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Electronic commerce courselecture one. Pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Review of recent advances in non-invasive hemoglobin estimation
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Encapsulation theory and applications.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Diabetes mellitus diagnosis method based random forest with bat algorithm
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
MYSQL Presentation for SQL database connectivity
Unlocking AI with Model Context Protocol (MCP)
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Cloud computing and distributed systems.
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Digital-Transformation-Roadmap-for-Companies.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
Electronic commerce courselecture one. Pdf
20250228 LYD VKU AI Blended-Learning.pptx

The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era

  • 1. The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era Luca Martelli Senior Director Identity Management & Security Oracle EMEA @lmartelli
  • 2. Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle. Not all technologies identified are available for all cloud services. Disclaimer The information in this document may not be construed or used as legal advice about the content, interpretation or application of any law, regulation or regulatory guideline. Customers and prospective customers must seek their own legal counsel to understand the applicability of any law or regulation on their processing of personal data, including through the use of any vendor’s products or services. 2
  • 3. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | Employees PartnersConsumers Digital Disruption – Changing Changed World Oracle Public 3 ON PREMISES PUBLIC CLOUD Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
  • 4. Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | Regulatory requirements will make data possession a privilege. Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
  • 5. Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | Basic Principles for data protection Oracle Confidential Show adequate protection of data Gain consent to use data Provide personal data to users Locate your data Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
  • 6. Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | Least Privilege Defence-in-Depth Oracle Promotes Strong Security Principles For all your sensitive data including Intellectual Property, Business Information or Personal Information 6
  • 7. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | People Security Software Security 7 Data Security Oracle Security Controls which can help in the Regulations Rumba Era in the Hybrid Cloud Identity Mgmt Access Mgmt Governance Compliance Self-Service Authentication Authorisation Audit Single Sign-On Preventative Controls Detective Controls Administrative Controls Segregation of DutyEncryption Data Masking Key Management Audit API Security Application and Service Configuration Patching IT Compliance Threat Intelligence, User/Log Analytics, Incident Response Application and Service Performance Audit
  • 8. Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | Where is my DATA? 8
  • 9. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | Your PII + Sensitive Data is Already in the Cloud 9 2016 Cloud Security Research Report, Crowd Research Partner 79% Of enterprises are actively deploying cloud solutions in public, private, or hybrid cloud environments % of Enterprises Deploying
  • 10. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | Oracle Public 10 Workloads are Everywhere Cloud is not just SaaS. Workloads are moving rapidly to PaaS and IaaS 71% of large enterprise will shift some workloads to cloud by 2018 Enterprises plan to use an average of 6 clouds to run their workloads 2016 McKinsey, 2016 Right Scale Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
  • 11. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | Modern Security Attacks Are… Oracle Confidential Not carried out by humans (they are automated) Not confined to network (they begin outside) Not static (they adapt) IS YOUR SOC READY?
  • 12. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | Traditional SOC -Security Operation Center Current Approach Is Fragmented and Integration Intensive 12 SIEM (Security Information & Event Management) Security context, Rules based detection UEBA (User and Entity Behavior Analytics) User context, Anomaly detection X Multi-product/vendor challenges X Integration, UIs, data models, support… X Scale and delivery model differences X High viability and M&A risk X Point in time, app specific state checks Log Management Raw logs, Forensic search, IT ops analytics Configuration Management Secure state, configuration auditing IdentityManagement CASB-(CloudAccessSecurityBroker)
  • 13. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | Traditional SOC: Current Approach Is Fragmented and Integration Intensive 13 SIEM (Security Information & Event Management) Security context, Rules based detection UEBA (User and Entity Behavior Analytics) User context, Anomaly detection X Multi-product/vendor challenges X Integration, UIs, data models, support… X Scale and delivery model differences X High viability and M&A risk X Point in time, app specific state checks Log Management Raw logs, Forensic search, IT ops analytics Configuration Management Secure state, configuration auditing IdentityManagement CASB-(CloudAccessSecurityBroker) Manual processes (too many alerts, no context) Static protection (not adaptive) Focused within perimeter (not external data/apps)
  • 14. Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | Confidential – Oracle Internal 14 The Perimeter Has Moved Identity is the new perimeter Only 14% believe network security tools work well protecting public cloud 2016 Cloud Security Research Report, Crowd Research Partners Oracle ConfidentialCopyright © 2017, Oracle and/or its affiliates. All rights reserved. |
  • 15. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | Threat intelligence Oracle’s Identity-Centric SOC Approach Next Gen Security for the Hybrid Cloud CASB UEBA Identity Management SIEM Automated remediation
  • 16. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |Confidential – Oracle Internal Security Cloud Services: Enabling Faster and More Secure Cloud Adoption Oracle PublicCopyright © 2016, Oracle and/or its affiliates. All rights reserved. | API Platform Cloud Service Configuration & Compliance Cloud Service Hybrid Database Security Identity Cloud Service Security Monitoring & Analytics Cloud Service CASB Cloud Service Identity SOC (Security Operations Center) 16Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
  • 17. Embracing the Cloud Heterogeneous cloud environments allow focus on quality products and brand Threat Intelligence CASB for a more intelligent-driven SOC Cloud Controls Oracle CASB to monitor sanctioned cloud environments and ensure ongoing visibility User Behavior Analytics Ongoing monitoring of privileged behavior in IaaS environment 17Copyright © 2017, Oracle and/or its affiliates. All rights reserved.
  • 18. Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | Where is my DATA? / part 2 18
  • 19. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | Crypto toolkit for applications Row-level securityKey management Data encryption Evaluate Prevent Detect Data-driven Security Security configuration Sensitive data discovery Privilege Analysis DBA & operation controls Database auditing Database/SQL firewall Real application security Label-based security Centralized monitoring Security assessment Alerting & reporting Data redaction Data masking and subsetting Comprehensive Hybrid Database Security Controls 19
  • 20. Copyright © 2016 Oracle and/or its affiliates. All rights reserved. | *7#$%!!@!%afb ##<>*$#@34 Data Encryption Key Vault Key Vault Data Redaction dob:xx/xx/xxxx ssn:xxx-xx-4321 Applications Users CX App DB Controls Access denied Sensitive Data, IP PCI, PII, PHI Privileged UsersPrivileged User Prevent Damage to Databases from Attacks Region, Year Size-based Data Subsetting Dev/Test Partners, BI dob: 12/01/1987 Data Masking 11/05/1999 xxxxxxxxxx 20
  • 21. Copyright © 2016 Oracle and/or its affiliates. All rights reserved. | Audit Data, Event Logs Database Firewall Users Policies Reports Alerts Network Events Applications Audit Vault Detect, Audit and Monitor Databases 21
  • 22. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | • Key aspects of GDPR – New statutory requirements will require companies to re- think how they handle and protect their personal data – Includes a new liability and sanction regime – Entry into force on 25 May 2018 • Potential serious consequences – Fines of up to 4% of global annual revenue or €20M – 72 hours for data breach notification • Aspects of GDPR that Oracle Offerings may Help Address – “Data Protection by design and default” – “Security of Processing“ – “Data Breach Notifications to Individuals” not required if security controls prevent breach from occurring – If a data breach occurs “administrative fines shall” take into account “technical and organisational measures implemented” 23 • Relevant Oracle Offerings – Database Security Advanced Security Option, Database Vault, Audit Vault Database Firewall, Key Vault, Data Masking/Subsetting. DB Cloud can make use of DB security features/options – High availability and resilience: Data Guard, RAC, Backup solutions, ZDLRA – Software Security CASB Cloud Service, SMA Cloud Service, CC Cloud Service, API-Platform Cloud Service – Identity Management Identity Governance, Identity Cloud Service, Access Management, Centralised Directory – Applicable to “existing/legacy systems and new digital systems” Summary: GDPR & Oracle Offerings
  • 23. Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | (Every journey starts from where you stand today) So where do we begin… Take a Security Risk Assessment Whitepaper on Database Security and GDPR
  • 24. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | Oracle Public 25 For More Information Blogs.oracle.com/ OracleIDM @OracleSecurity /Oraclesecurity • Learn about Security Cloud Services @ cloud.oracle.com/paas • Learn about Identity Cloud Service @ oracle.com/IdentityCloud • Watch for new service announcements @ oracle.com/security
  • 25. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | 26

Editor's Notes

  • #2: IT professionals say their top concerns for adopting cloud are related to security As organizations transition from on premises to cloud, they are additionally challenged with maintaining a consistent security posture. Oracle believes a hybrid cloud approach can provide better security, Today, I want to explain how Oracle aligns people, process, and technology to provide better security across the computing stack   You will also hear about Oracle’s Cloud Security Services to protect users and drive digital transformations more securely and quickly.   Security is now a reason to move to the cloud!
  • #3: Before presenting, make it clear that NOT all technologies identified are available for all cloud services
  • #4: Talk about new world. We have to address various challenges: Protect apps and data in the cloud and on-premises – you need to protect across both environments, because gaps in security between environments opens your company to higher risk. All of the controls you have built up over many years in the on premise environment need to be extended into your cloud. For example if a person leaves your company you need to make sure their accounts are disabled both on premise, and in the cloud. If this is not done you open yourself up to high risk. Imagine a sales person continues to have access to their CRM account even after they have defected to the competition. 2. With users coming in through so many channels today - web browsers, mobile phones, tablets, watches. Access needs to be secured across all these channels. For example, Anna could have used her watch to complete the transaction she started on her mobile. 3. Manage access for customers, partners, and employees It’s not just employees that need access to your systems anymore – customers access your systems online, through their phones. A lot of breaches have been about partners not being properly managed – people have been pretty good about onboarding employees but they tend to be a lot weaker about third parties. 4. Security in addition to automation and management of access & identities. Traditionally, IDM has focussed on
  • #11: Key Takeaway: Everyone knows SaaS adoption is increasing, but TONs of lift and shift workloads are also moving to PaaS and IaaS services These workloads need security and don’t want to have to re-write
  • #12: A few weeks ago, many websites including the likes of Twitter, Netflix, GitHub and Airbnb, were brought down by a massive number of hijacked Internet-connected devices.. Our own IP-based home security cameras, video recorders and home routers were hijacked by a popular IoT botnet, and carried out a DDoS attack on a major DNS provider, bringing down our own business and consumer applications. That may sound like the script of a Hollywood movie, but the attack was very real. And it was one of the largest modern attacks affecting millions of users in the US.. carried out by exploiting IoT devices. Modern security attacks are unpredictable, hard to detect, and in most cases, don’t fit your classic traditional description of an attack that may be carried out by an intruder on your network. To begin with, many attacks today are not carried out by humans. Many are carried out by bots or hijacked IoT devices. Secondly, the attacks are not carried out within your traditional network perimeter. The attack could be on a DNS server your applications use… or your public-facing applications… or your cloud service provider. And finally, the attacks are not static. They can remain latent for days, waiting for the right opportunity to strike, and are pervasive, instead of affecting a handful of endpoints. Unfortunately, most enterprises rely on traditional Security Operations Centers (or SOCs) to defend themselves against threats. Traditional SOC’s are not designed to detect or respond to such modern attacks, leaving a number of enterprises vulnerable to attacks on applications, data and employee identities. In this modern environment, are you confident that your Identity Management investment is adequately protected by traditional SOCs?
  • #15: Cloud Security Challenges Current market trends driving dissolution of network perimeter Users are everywhere, using unmanaged devices and connecting to on prem and cloud apps This has caused network edge solutions such as FW, IPS/IDS, Network Proxy no longer relevant Traditional network-centric security architectures are ineffective in securing the modern work environment where users and applications are everywhere
  • #16: I am thrilled to introduce Oracle Identity SOC - the industry's first identity-centric framework for security operation centers. Customers are telling us they want a single pane of glass to manage security threats across their on premises and cloud environments the ability to do this across heterogeneous environments a suite of integrated solutions that work together, and not have to manage multiple solutions. A modern Identity SOC will incorporate threat intelligence feeds from a variety of sources. These feeds would be from a combination of open source and commercial feeds, including IP white/black listing, device reputation, known vulnerability databases, geolocation, and more. Threat intelligence is then imported into a SIEM that is integrated with a cloud access security broker and user behavior analytics. It will accomplish the requirements of an intelligence-driven SOC by spanning identity management across all of these planes. ---Response Automation--GRAPHIC Lastly, automation and incident response orchestration are critical elements that allow for complete closed loop governance. The vast expanses of alerts and data make it impractical for SOCs to rely on manual techniques for response. Automation is key; and an identity-centric SOC can leverage intelligence and human oversight where appropriate, to respond effectively to security incidents. This requires built-in forensic libraries, a flexible orchestration framework and integrations with investments made by the enterprise in incident management.   In addition to its industry leading Identity Management, that is now available in the Cloud, Oracle also offers services for SIEM, CASB, User Behavior Analytics, and Automated Incident Response. These services are the foundational enablers of an IdentitySOC. Now, lets take a deeper look at what makes up an Identity SOC and how Oracle is best suited to support every modern enterprise that is dealing with the challenges discussed earlier. 
  • #17: Oracle offers a series of Security Cloud Services that help our customers detect, prevent, predict and respond to today’s challenges we spoke about. The Security Cloud Services also enable our customers to more securely and quickly adopt the Cloud. Oracle provides an integrated set of cloud services that tie together: [IDCS] Identities across systems, people and things (IoT) to help detect, protect and expedite response of security events [Cloud Access Security Broker} Application visibility and controls to understand sanctioned and unsanctioned applications, who uses them and the infrastructures they run on [SMA CS] Security monitoring and analytics that incorporates user behavior analytics and machine learning to enable automation of alert response [APIP CS] Secure software development that protect and give controls over API management; since APIs are where many vulnerabilities in applications are uncovered [CCS] Compliance services to ensure security best practices are adhered [Hybrid Data Security] Hybrid data protection to ensure comprehensive data visibility and protection At Oracle, we absolutely believe Security is now a reason to move to the cloud! The trusted Oracle Cloud and Oracle Security Cloud Services are here to help you
  • #18: Growing use of AWS and no expertise in EXTENSIVE security controls required to set up, monitor and maintain a secure IaaS environment. Leveraging CASB Cloud Service to deploy secure and compliant environments, monitor those environments for risky behavior and mis-configuraiton and auto-remediate any violations. Products: CASB Cloud Service (Palerra LORIC). Using for monitoring AWS environments NOT Currently integrated for a complete Identity SOC, but enthusiastic about the concept. They have given an example of how knowing the identities of users will be paramount in the future: Spear phishing and malware – suffering First thing they started to do. Firewalls will trigger if malware detected if you are lucky. We need to correlate that outbound message with the fact that one of their executives is the one who clicked on it. In the past, you would have had a firewall rule that included the IP address or MAC address and with that you would start the forensic analysis. What happened, why? But now with user based analytics as part of an Identity SOC, now the SOC analyst can correlate the malware attack and who received it. You can now connect with the VP and lock down his laptop. This is the practical value of assigning the person to the requisite events that occurred to get an immediate response. Of course, execs are always easy targets. But for every time you save an exeutive, that’s a win. Identity from a data, network, device and application perspective so there are now personas you are taking on when doing your job. A correlation to who are you and why are you there. Levi’s is currently public on their use of Oracle CASB Cloud Service and enthusiastic about the integration for an Identity SOC solution.
  • #21: As part of the evaluation phase, customers have identified sensitive data. Now customers need to apply security controls to prevent damage to databases from attacks. First control you apply is Encryption; Encryption applies to both data in motion using Network Encryption and Data-at-rest Encryption using Oracle Advanced Security Transparent Data Encryption. Transparent Data Encryption or TDE protects data if someone tries to read data directly at the operating system or file system level bypassing database controls. When customers deploy TDE for hundreds or thousands of databases, customers face operational and management challenges from proliferation of keys. Customers need to have a centralized key management solution to stream-line these. Oracle Key Vault is centralized key management solution that manages TDE master encryption keys, it can also manage Oracle wallets, Java keystores, ACFS master file encryption keys, it can manage MySQL TDE master keys as well. Encryption locks the back-door access to sensitive data, next step is to protect the front-door. Front-door is where privileged users access the data in databases. Customers need to apply security controls to restrict privileged users access to application data using Database Vault. After encryption and privileged user controls, you need to implement data access controls for application users using row and column level controls along with data redaction. Redaction allows applications to hide or obfuscate sensitive data like SSN or credit card numbers. (Data Redaction is also known as Dynamic data masking in the industry) All the above controls protects data in a production environment, but how do you limit sensitive data exposure when customers move sensitive data to test/dev/partner sites. Customers mitigate this risk with Oracle Data Masking and Subsetting technology.
  • #22: -Oracle Audit Vault and Database Firewall provides a first line of defense for databases and consolidates audit data from databases, operating systems, and directories. -A highly accurate SQL grammar-based technology in the Database Firewall monitors and blocks unauthorized SQL traffic before it reaches the database. Information from the network is combined with detailed audit information for easy compliance reporting and alerting. -Oracle Audit Vault and Database Firewall, enables easy implementation of security controls for DBs, and operating systems Features: Database Firewall - Monitoring Information Who, what, where, when Data Sources Network Impact on database Completely independent, negligible performance impact Purpose Prevent SQL-injections and other unauthorized activity, enforce corporate data security policy Audit Vault – Auditing Information Who, what, where, when; Before/After values; Full execution and application context Data Sources All: Audit logs, stored procedures, direct connections, scheduled jobs, operational activities Impact on database Requires native database auditing, minimal performance impact (<5%) Purpose Ensure regulatory compliance, provide guaranteed audit trail to enable control Supported platforms- DBs Oracle, SQL Server, MySql, etc OS – Linux, Solaris, Windows Server etc…
  • #23: Security is the most important requirement for cloud customers. Security and availability of keys Keys securely stored and protected Inaccessible by cloud administrators Keys are highly available Customer control of keys Keys can be deleted by customers to remove their data from cloud On-premise control by customers Data is encrypted by default in the Oracle Cloud Databases using Transparent Data Encryption You can use Oracle Key Vault on-premise to centrally collect, manager, and control the encryption keys for both on-prem and cloud databases Data Masking and Subsetting helps to mask and subset data for test, dev, and partner environments on-premise or in the cloud You can restrict Database Administrative access to the sensitive information using Database Vault You can centrally collect, manage, and control database audit activity on-premise using Audit Vault Database security policies are transparently migrated during Database lift and shift operations using Pluggable databases In hybrid cloud deployments, the on-premise Oracle Audit Vault Server (AV Server) collects audit data from both on-premise and Oracle Database Cloud Service (DBCS) instances. On-premise agents retrieve audit data from the DBCS instances over encrypted channels, and then transfer it to the on-premise AV Server. Appropriate port on the DBCS instance needs to be open, but no other networking changes are needed on premise side. Utilizing the same AV Server for both DBCS and on-premise database instances makes it easier to ensure that the same audit policies have been applied across all database instances. Similarly, existing alert configurations and data retention polices can be utilized for cloud ones. Thus the same resources can be utilized for configuration and maintenance tasks across on-premise and cloud.
  • #25: 24
  • #26: Key Takeaways: Learn more about Oracle Cloud Security and how we can help you Join a local Breakout Sessions Request a Security Assessment with your local sales team Updated Oracle.com/security page