Database Reference
In-Depth Information
Chapter 20
Management and Conclusions
This last chapter will consider some interesting topics not previously covered which represent further work, then discuss
management aspects relating to the topic as a whole, and then draw some strategic conclusions to end the topic.
Topics Not Covered-Future Work
My favorite recent book on Oracle Security is Applied Security by David Knox and Patrick Sack among others. One
reason is that the topic covers a wish list of future research topics. This is great for a vendor provided book. The same
is true with this topic in that I have not had time to go into all the subjects I would have liked, so have provided a
selection of further topics with links to more reading if you wish to investigate yourself, and maybe even write your
own book.
Cloud Identity Management
We touched briefly on cloud identity management areas and IDaaS (Identity as as Service), but there is potential for a
whole new book to be written on this subject. For a cutting-edge view of this subject please see the following paper:
http://www.educause.edu/ero/article/identity-management-and-trust-services-foundations-cloud-computing .
It seems the main functionality that is not becoming cloud oriented is Business Intelligence due to its internal
sensitivity. A company's future may rely on keeping its intelligence private, but even this area is seeing cloud
innovation from the BI experts at Rittman Mead, among others ( http://www.rittmanmead.com/ ) .
If you do plan to use a cloud provider please do subject them to a free SSL security check first
(see https://www.ssllabs.com/ssltest/ ) , also consider using browser based email encryption such as
www.enlocked.com for cloud communications.
Enterprise User Security (EUS)
We did not cover EUS in this topic. It is reasonably well solved and is mainly of use for managing large volumes of
lower-privileged users. We concentrated instead in trying to solve the difficult problem of high-privilege access
control. EUS is already covered in practical detail at this URL:
http://www.dbspecialists.com/files/presentations/implementing_oracle_11g_enterprise_user_security.pdf .
 
Search WWH ::




Custom Search