Database Reference
In-Depth Information
Security Governance
In this chapter, we will talk to the Chief Security Officer of the company and get an
understanding of his sense of security risks that the company faces and the security
posture that it adopts. We will help him express his priorities and objectives in the
form of a balanced scorecard and ensure that the objectives are in concert with the
corporate strategy. We will show him how to limit the access to systems only to
authorized users and how to ensure that such authorization is based on specific
needs. We will show how some of the security policies limit the duties of any
individual so that privileges required to commit a fraud are separated. Next, we
will show how to follow the guidance for hardening the system. Finally, we will
guide him through setting up the security incident management and security
incident response through the capabilities provided in Oracle Service.
Note that it is beyond the scope of this topic to advise you on security
for the E-Business Suite. This chapter aims to put security into a
governance perspective and take you through some general themes
in security management. For a detailed review of E-Business Suite
security, the topic "Oracle E-Business Suite Security(in italics)", Oracle
Press(in italics), written by John Abel is a great resource.
Search WWH ::




Custom Search