Oracle Identity Management: Governance, Risk, and Compliance Architecture, Third Edition
In today’s competitive marketplace with its focus on profit, maintaining integrity can often be a challenge. Further complicating this challenge is the fact that those assigned to the task of assuring accountability within an organization often have little, if any, visibility into the inner workings...
Đã lưu trong:
Tác giả chính: | |
---|---|
Định dạng: | Sách |
Ngôn ngữ: | English |
Được phát hành: |
CRC Press
2009
|
Truy cập trực tuyến: | http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1572 |
Các nhãn: |
Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
|
Thư viện lưu trữ: | Thư viện Trường Đại học Đà Lạt |
---|
id |
oai:scholar.dlu.edu.vn:DLU123456789-1572 |
---|---|
record_format |
dspace |
institution |
Thư viện Trường Đại học Đà Lạt |
collection |
Thư viện số |
language |
English |
description |
In today’s competitive marketplace with its focus on profit, maintaining integrity can often be a challenge. Further complicating this challenge is the fact that those assigned to the task of assuring accountability within an organization often have little, if any, visibility into the inner workings of that organization.
Oracle Identity Management: Governance, Risk, and Compliance Architecture is the definitive guide for corporate stewards who are struggling with the challenge of meeting regulatory compliance pressures while embarking on the path of process and system remediation. The text is written by Marlin Pohlman, a director with Oracle who is recognized as one of the primary educators worldwide on identity management, regulatory compliance, and corporate governance.
In the book’s first chapters, Dr. Pohlman examines multinational regulations and delves into the nature of governance, risk, and compliance. He also cites common standards, illustrating a number of well-known compliance frameworks. He then focuses on specific software components that will enable secure business operations. To complete the picture, he discusses elements of the Oracle architecture, which permit reporting essential to the regulatory compliance process, and the vaulting solutions and data hubs, which collect, enforce, and store policy information.
Examining case studies from the five most regulated business verticals, financial services, retail, pharma-life sciences, higher education, and the US public sector, this work teaches corporation stewards how to—
· Attain and maintain high levels of integrity
· Eliminate redundancy and excessive expense in identity management
· Map solutions directly to region and legislation
· Hold providers accountable for contracted services
Identity management is the first line of defense in the corporate internal ecosystem. Reconcilingtheory and practicality, this volume makes sure that defense is workable, responsive, and effective |
format |
Book |
author |
Pohlman, Marlin |
spellingShingle |
Pohlman, Marlin Oracle Identity Management: Governance, Risk, and Compliance Architecture, Third Edition |
author_facet |
Pohlman, Marlin |
author_sort |
Pohlman, Marlin |
title |
Oracle Identity Management: Governance, Risk, and Compliance Architecture, Third Edition |
title_short |
Oracle Identity Management: Governance, Risk, and Compliance Architecture, Third Edition |
title_full |
Oracle Identity Management: Governance, Risk, and Compliance Architecture, Third Edition |
title_fullStr |
Oracle Identity Management: Governance, Risk, and Compliance Architecture, Third Edition |
title_full_unstemmed |
Oracle Identity Management: Governance, Risk, and Compliance Architecture, Third Edition |
title_sort |
oracle identity management: governance, risk, and compliance architecture, third edition |
publisher |
CRC Press |
publishDate |
2009 |
url |
http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1572 |
_version_ |
1757676301697679360 |
spelling |
oai:scholar.dlu.edu.vn:DLU123456789-15722009-12-04T02:04:05Z Oracle Identity Management: Governance, Risk, and Compliance Architecture, Third Edition Pohlman, Marlin In today’s competitive marketplace with its focus on profit, maintaining integrity can often be a challenge. Further complicating this challenge is the fact that those assigned to the task of assuring accountability within an organization often have little, if any, visibility into the inner workings of that organization. Oracle Identity Management: Governance, Risk, and Compliance Architecture is the definitive guide for corporate stewards who are struggling with the challenge of meeting regulatory compliance pressures while embarking on the path of process and system remediation. The text is written by Marlin Pohlman, a director with Oracle who is recognized as one of the primary educators worldwide on identity management, regulatory compliance, and corporate governance. In the book’s first chapters, Dr. Pohlman examines multinational regulations and delves into the nature of governance, risk, and compliance. He also cites common standards, illustrating a number of well-known compliance frameworks. He then focuses on specific software components that will enable secure business operations. To complete the picture, he discusses elements of the Oracle architecture, which permit reporting essential to the regulatory compliance process, and the vaulting solutions and data hubs, which collect, enforce, and store policy information. Examining case studies from the five most regulated business verticals, financial services, retail, pharma-life sciences, higher education, and the US public sector, this work teaches corporation stewards how to— · Attain and maintain high levels of integrity · Eliminate redundancy and excessive expense in identity management · Map solutions directly to region and legislation · Hold providers accountable for contracted services Identity management is the first line of defense in the corporate internal ecosystem. Reconcilingtheory and practicality, this volume makes sure that defense is workable, responsive, and effective Fundamental Concepts Enterprise Risk What is Risk Management? Risk Mitigation What is Risk Analysis? Definitions Used in the Risk Analysis Process Risk Analysis Standards Common Vulnerabilities Australia/New Zealand Standard 4360:1795, 1799, and 1800 British Standard BS 6079–3:1800 and PD6668:2000 Maintaining the Knowledge Pool, Plans, and the Management Process Canadian Standard 1797 (CSA-Q850–97) Germany IT-Grundschutz 100-3 South Africa: IRMSA and King II Report Section 2 United States NIST SP 800-30 International Standards Organization/UN: ISO/IEC 13335-2 Academia: Octave Method from Carnegie Mellon Academia: McCumber Cube Methodology Basel II Compliance Frameworks Compliance Framework Taxonomy Joint EU Framework Control Mapping—Joint EU Framework COBIT Information Criteria Control Mapping—COBIT ISO 27001 Control Mapping—ISO 27001 ITIL ITIL Process Description Terms and Definitions Associated with ITIL Control Mapping—ITIL BSI IT-Grundschutz Methodology Control Mapping—BSI IT-Grundschutz Methodology CMMI-SEI Control Mapping—CMMI-SEI SoGP Control Mapping—ISF Standard of Good Practice (SoGP) GAIT and GAISP Control Mapping—GAIT and GAISP NIST 800 Series Control Mapping—NIST 800 Series COSO and Turnbull Guidance Control Environment Risk Assessment Control Activities Monitoring Information and Communication Controls for Information Systems Control Mapping—COSO and Turnbull Guidance SAS 70 Control Mapping—SAS 70 Oracle Governance, Risk, and Compliance Management Architecture Governance, Risk, and Compliance Control Domain Approach Conclusion Identity Management Suite Oracle Identity and Access Management Suite Overview Oracle Identity Federation Oracle Enterprise Single Sign-On Oracle Internet Directory (OID) Oracle Virtual Directory (OVD) Oracle Security Developer Tools Oracle Access Manager Oracle Web Services Manager (OWSM) Oracle Identity Manager (OIM) Oracle Identity Tracker Oracle Identity Authenticator Oracle’s Extended Identity Management Ecosystem and Control Effectiveness Regulatory Governance Mapping Oracle Identity Federation Overview Typical Deployment Architecture Preliminary Concepts Assertion Sources Assertion Consumers Assertion Exchange Profiles—POST and Artifact Typical Deployment Architecture Source Domain Deployment Destination Domain Deployment Deployment Scenarios Scenario One Scenario Two Scenario Three POST Profile Revisited: OIF Implementation Artifact Profile Revisited: OIF Implementation Installation and Configuration Overview OIF Source Domain OAM IdM Bridge Configuration Access Server SDK: Access Management API Repository Parameters OAM Configuration Parameters Assertion Profiles Domains Scenario One: Source User’s Session Expired Scenario Two: User at Source Domain Requests the Federated Resource via a Bookmark Assertion Mappings Summary Oracle Identity Governance Framework ISF Feature Function Regulatory Governance Mapping Oracle Enterprise Single Sign-On Overview User Datafiles NSS PAM Administrative Console Example of An Administrator Adding A New Application Encryption Deployment Architecture Installation and Administration Unlocking Users Building Users in AD Language Packs Password Changing Password Generation Policies Example: SSO in Operation Integrating Oracle eSSO with OIM Installation and Configuration of eSSO-PG with OIM Connector Step 1: Installation of the eSSO PG Server Step 2: Create or Identify a User Account for Anonymous Log-In Step 3: Enable SSL for eSSO-PG Web Services Step 4: Configuring the eSSO-PG Server Settings Step 5: Installing the eSSO-PG Client Program Files Step 6 : Deploying the OIM connector Step 7: Additional Configurations for the OIM Connector Step 8: Testing the Provisioning to eSSO Using OIM Connector Regulatory Governance Mapping Oracle Internet Directory and Related Services Overview Scalability High Availability Security Integration Integration with, and Extensions for, Oracle Environments Manageability and Monitoring LDAP-Aware Application Development Implementation Detail Oracle Identity Management Start Sequence Start Summary Stopping Oracle Internet Directory Changing Password for OID Administrator Changing Password for Metadata Repository Edit via Permanent Configuration Monitoring OID Servers for Business Continuity Compliance Backing Up and the Restoring of Metadata Repository Data Integrity Protection Managing Super-User, Guest User, and Proxy User Controlling Anonymous Binds Password Storage in OID Password Policies Managing Audit Log Entries Access Control for DIP Server and Profiles Directory Replication Groups Single-Master DRG Multimaster DRG Fan-Out DRG Multimaster and Fan-Out DRG Oracle Directory Integration Platform Connectors How Synchronization Works Command Line Tool for Active Directory Synchronization Regulatory Compliance Key Feature Oracle Certificate Authority Process Flow Features Summary of the Certificate Oracle Certificate Authority Components Using the Certificate Authority Starting and Stopping the Oracle Certificate Authority Certificate Management Policy Enforcement—a Key to Compliance Predicates in Policy Rules Oracle Wallet Starting Oracle Wallet Manager Uploading Wallets Oracle Virtual Directory Overview Benefits Benefits of Deploying Oracle Virtual Directory Oracle Virtual Directory Scenarios Benefits of Oracle Virtual Directory and Oracle Internet Directory Deployment Architecture Installation and Configuration OVD Components OVD Server Installing OVD Manager and Connecting to OVD Server OVD Manager A Simple OVD Deployment Connecting to Active Directory via LDAP Adapter Connecting to Database Join Adapter OVD BiDirectional Mappings and Plug-Ins Bidirectional Mapping Java Plug-In Framework Example: Data Transformation Regulatory Governance Mapping Oracle Security Developer Tools Overview Deployment of Cryptographic Architecture Installation and Configuration Deploying and Running the Application Regulatory Governance Mapping Oracle Access Manager Overview User Interface Enforcement Points Service Providers Extensions and Integration Points Example: Integration Access Manager with Oracle Portal Installing Oracle Portal Installing the OAM Identity Server Installing the OAM WebPass Installing the OAM Policy Manager Configuring the Access System Console Installing the OAM Access Server Installing the OAM WebGate Integrating the OAM with Oracle Single Sign-On and Oracle Portal Deployment Architecture Walkthrough Access Elements Business Logic Oracle Access Manager—Event Plug-In API Event Plug-In Execution Architecture Library Plug-Ins Executables Integration Access Manager with Oracle SSO (not eSSO) Authentication and Authorization Plug-ins Installation and Configuration Identity System Installation Concepts Directory Server Installation and Configuration Identity Server Installation and Configuration Transport Mode Auditing Configuration Execution Parameters WebPass Installation and Configuration Identity System Console System Configuration Directory Profiles System Management Access Server Installation and Configuration System Configuration System Management Access System Configuration Controlling Security with OAM Creating Policy Domains and Security Policies Regulatory Governance Mapping Oracle Web Services Manager Architecture PEP (Policy Enforcement Points) Administrative Components Monitor Policy Manager Administration Console Service-Oriented Architecture in OWSM The Power of SOA Installation and Configuration Installation Packages and Configuration Files Preinstallation Recommendations Installation Process Overview OWSM Administration Registering a Gateway Deploying Agents Extensibility of OWSM Custom Step Development Step: Templates Step: Interface Note: Exception Handling Step: Deployment Security for Web Services Step 1: Extract Credentials Step 2: OAM Authenticate/Authorized (COREid Authenticate/Authorize) Example: Authentication and Authorization Integrated with COREid Policy Configuration Create Policy Domain for OWSM services Create Test Cases in OWSM Test Engine Provide the WSDL URL Regulatory Governance Mapping Oracle Identity Management Overview Logical Architecture Presentation Layer Dynamic Presentation Logic Layer Business Logic Layer Data Access Layer Backend System Integration Layer Administration How to Launch the Server Self-Service Account Generation Password Reset Tracking Self-Registration Requests Administration of Users and User Entities Assigning Connectors to Users Granting Resource Requests Disabling a Resource Request Customizing the OIM Administrative Console Branding the Console Functionality How to Restore an Inadvertently Locked xelsysadmin User Account Creating Operational and Historical Reports Attestation Processes Integration Transferring OIM Connectors Properly Exporting the File Installation and Configuration Preparing a Database for OIM Installing the OIM Diagnostic Dashboard Installing the OIM Design Console Installing Audit/Compliance Module Adding Audit/Compliance Module after a Default Installation Post Installation Tasks Increasing the Size of the Java Pool Change the Authentication Mode from Default to Single Sign On Verifying that the OIM Scheduler Is Running Deployment Methodology Requirements and Architecture Planning and Analysis Design Development Test Rollout and Operations Regulatory Governance Mapping Oracle Smart Roles Identity Management Audit and Attestation Enterprise Manager for Identity Management Enterprise Manager Elements Server Tier Client Tier Web Browser Middle Tier Communication Components Consolidated Management Focusing on Enterprise Manager Identity Manager Pack Feature Function Electronic Discovery Monitoring and Diagnostics End-User Monitoring and Service-Level Management Configuration Management for Oracle Access Manager Integration with Identity Suite 10g (10.1.4.0.1) Grid Control Plug-in Configuration Management Database Identity Services Dashboard Compliance System Dashboard Oracle Identity Tracker “Gated” Security Dynamic Rules-Based Authentication Multifactor Online Security Oracle Tracker Key Capabilities Oracle Identity Authenticator Oracle Authenticator Key Capabilities Oracle Adaptive Access Manager Oracle Adaptive Authentication Key Capabilities Oracle SSN Vault Oracle Identity Audit Oracle Integrating IdM and GRC Application Framework Oracle UMX User Management Peoplesoft Applications User Management Deploying the PeopleSoft User Management Connector for Oracle Identity Manager Step 1: Verifying Installation Requirements Step 2: Copying the Connector Files Step 3: Configuring the Target System Step 4: Import the Connector Files Step 5: Configure the Reconciliation Module Step 6: Compiling Adapters PeopleSoft Configuration for Use with Oracle Internet Directory LDAP_Authentication Considerations SSO_Authentication Considerations LDAP_ProfileSynch Considerations Siebel Universal Customer Master Audit and Attestation Siebel Branch Teller iFlex Reveleus Mantas Flexcube Daybreak Oracle Governance, Risk, and Compliance Manager Stellent Financial Director Stellent Policy and Procedure Portal Internal Controls Manager (For E-Business Suite) Internal Controls Enforcer (for PeopleSoft Enterprise) Stellent UCM/FCD Integrating IdM and GRC Technology Platform Database Vault Installation Clustered Installation Stand-Alone Installation Installation Details Realms Roles Secure Application Roles Factors Identities Creating an Identity Modify Identities Rule Sets and Command Rule Data Vault Reports Alert on Data Vault Audit Events Configuring Database Vault with Audit Vault Audit Vault Collectors Installation Basic Advanced Database Install Agent Configuration Web Applications Enterprise User Security Schema-Independent Users Enterprise Manager Console Oracle Enterprise Security Manager Stellent Universal Content Manager Installation Integration Points Records DB Secure Enterprise Search Deployment Guide Oracle Data Integrator Integration Styles User Interfaces The Oracle Data Integrator Knowledge Modules Installation Instructions Compliance Designs Data Integrity Firewall in the Integration Process Enforcing the Rules Information Rights Management How Does Oracle Information Rights Management Work? Modifying the Global Configuration Configuring an Adapter for Content Server Running CIS Validation Tests for compliance Trusted Information Sharing XML Publisher Hyperion Compliance Management Dashboard The Hyperion Basel II Compliance Solution Hyperion XBRL Server Governance Landscape Asia Pacific and Oceana Oceana Australia New Zealand Asia China Hong Kong Taiwan Japan Malaysia Philippines Singapore South Korea Thailand India Europe and Africa European Union Key Aspects of MiFID Austria Belgium Bulgaria Czech Republic Denmark Estonia Finland France Germany Greece Hungary Ireland Isle of Man, Territory of United Kingdom Italy Latvia Lithuania Luxembourg Netherlands Poland Portugal Slovakia Slovenia Spain Sweden Turkey United Kingdom Non-EU European Countries and Africa Iceland Norway Russia Switzerland Ukraine South Africa Latin America Argentina Brazil Chile Columbia Ecuador Mexico Paraguay Peru Uruguay Venezuela North America North American Payment Card Industry—Visa, Mastercard, American Express, Discover, and JCL United States United States: Government and Public Sector Technical Controls United States: Nonprofit United States: State and Local Government Canada Appendices A Regulatory to Technical Control Mapping B FISMA Technical Control Mapping FISMA Background and Related Standards DoD Information Technology Security Certification and Accreditation Process National Information Assurance Certification and Accreditation Process Defense Information Assurance Certification and Accreditation Process Response to Suspected Threats or Intrusions C Oracle Governance Risk and Compliance Ecosystem 2009-12-04T02:04:05Z 2009-12-04T02:04:05Z 2008 Book http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1572 en application/rar CRC Press |