Leverage T echnology:
Move Your Business Forward™
Enterprise Risk Management Financial Close Monitor Advanced Controls Catalog Enterprise Audit GRC Monitor
FulcrumWay Leading Provider of Enterprise Risk Assessment Mitigation and Remediation Solutions
Copyright ©. Fulcrum Information Technology, Inc. Give me a lever long enough and a fulcrum on which to place it, and I shall move the world - Archimedes
Oracle Fusion Security Simplified
Simplifying Security with Fusion Applications Security Console
Nigel King
Vice President
Ryan Golden
Software Architect
Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 3
The following is intended to outline our general product direction. It is intended
for information purposes only, and may not be incorporated into any contract.
It is not a commitment to deliver any material, code, or functionality, and should
not be relied upon in making purchasing decisions. The development, release,
and timing of any features or functionality described for Oracle’s products
remains at the sole discretion of Oracle.
Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 4
Program Agenda
Challenges in Security Administration
Shaping Security to Match Your Business
Staying Ahead of Changes
Demo
Q&A
Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 5
Challenges in Security Administration
Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 6
The Security Diaspora
One tool for role design
One tool for user provisioning
One tool for data security management
One tool for supporting end user access
and authorization issues
One tool for upgrade assessment
Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 8
Envision a Global View
Single UI for all security activities
Visualization of the entire security model
Assisted search across all security artifacts
Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 10
Visualizing the Security Model
Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 11
Shape Security to Match Your Business
Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 12
Role Design and Customization Challenges
Leverage the Fusion Applications security reference model
Customize roles from a business or menu perspective
Match privileges to on-screen elements
Adjust the reference roles
Test the resulting user interface
Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 16
Product Upgrade Challenges
Disruptive new functionality
Identifying the new functionality
Fitting new functionality to your existing model
Identifying users that need to be (re)trained
Offering a complete security assessment
Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 18
Graphic Section Divider
DEMO
Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 19
Unified Search
Compare Roles
Security Model Visualization
Solutions
Scenario: Assessing Product Upgrade Impact
Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 20
Unified Search
Security Model Visualization
Graph Pivot
Menu Simulator
Copy Role
Scenario: Help Desk User Missing a Menu
Solutions
www.fulcrumway.com Page 21 Copyright © FulcrumWay
Fusion Security and Oracle
Enterprise Governance Risk and
Compliance
by
Tony Olivo
Sr. Client Services Director
FulcrumWay
www.fulcrumway.com Page 22 Copyright © FulcrumWay
GRC Security Components Fusion RBAC
Security
User
Job Role
Duty Role
Privileges
Data Role
Module
Document State
Action
Perspective
www.fulcrumway.com Page 23 Copyright © FulcrumWay
Manage User Security – User
Management
Manage user community across the application.
A user’s access is the combination of all their assigned job roles
Fusion RBAC
Security
www.fulcrumway.com Page 24 Copyright © FulcrumWay
Using Perspectives on Objects
Perspectives are used to secure data.
– A Perspective node is assigned to an object.
– That object is only available to a user that has that
perspective node assigned to their data role for that
object.
Sample Perspective
Fusion RBAC
Security
ABC Company
North America
New York
Chicago
Los Angeles
Latin America
Mexico
Europe
London
Paris
www.fulcrumway.com Page 25 Copyright © FulcrumWay
Using Perspectives on Objects
Perspectives can be associated with various
objects
– AACG / TCG
• Continuous Controls
• Models
• Incidents
– EGRCM
• Process
• Risk
• Control
Fusion RBAC
Security
www.fulcrumway.com Page 26 Copyright © FulcrumWay
EGRC Objects Secured by RBAC
Models
– View and Manage Access
Continuous Controls
– View and Manage Access
Incidents
– View, Manage and Investigator Access
Fusion RBAC
Security
AACG and TCG
www.fulcrumway.com Page 27 Copyright © FulcrumWay
EGRC Objects Secured by RBAC
Following EGRCM objects have View, Manage, Review
and Approve job roles
– Perspective
– Process
– Risk
– Control
– Issue
– Remediation Plans
Fusion RBAC
Security
EGRCM
www.fulcrumway.com Page 28 Copyright © FulcrumWay
Sample Job Roles Fusion RBAC
Security
OOTB INCIDENT RESULT MANAGER JOB ROLE
www.fulcrumway.com Page 29 Copyright © FulcrumWay
Sample Job Roles Fusion RBAC
Security
OOTB INCIDENT RESULT MANAGER JOB DATA ROLE
www.fulcrumway.com Page 30 Copyright © FulcrumWay
Sample Custom Job Roles Fusion RBAC
Security
CUSTOM INCIDENT RESULT MANAGER JOB DATA ROLE