Download Publication
Critical Controls Implementation for Oracle E-Business Suite
Release Date: 04/05/2021
Working Group: Enterprise Resource Planning
However, deploying EBS in the cloud can also bring severe risks if not done right. This paper outlines 20 critical controls that will help an organization determine what security changes are needed when deploying Oracle EBS in the cloud. These controls map to CSA’s overarching Top 20 Critical Controls for Cloud Enterprise Resource Planning Customers.
Please note that this is a reference document whose purpose is to promote best practices for cloud deployments of the Oracle E-Business Suite. It does not replace Oracle Corporation's documentation and specific instructions. Specifically, this document is to be used as part of the Enterprise Resource Planning Working Group's ongoing dialogue.
Key Takeaways:
- The control implementation (rationale) for 20 critical controls, including: segregation of duties, change management, continuous monitoring, data encryption, and more
- The specific requirements and steps needed to implement the 20 critical controls
Download this Resource
Prefer to access this resource without an account? Download it now.
Acknowledgements
Shamun Mahmud
Senior Research Analyst, CSA
Bowen Close
Juan Perez-Etchegoyen
As CTO and co-founder of Onapsis, JP leads the innovation and research teams that keeps Onapsis on the cutting edge of the Business-Critical Application Security market, addressing some of the most complex problems that organizations are currently facing while managing and securing their ERP landscapes. JP helps manage the development of new products as well as support the ERP cybersecurity research efforts that have garnered critical a...
Frederik Weidemann
Dan Hiestand
Michael Miller
Interested in helping develop research with CSA?
Related Certificates & Training
Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, recommendations from ENISA, and the Cloud Controls Matrix, you will come away understanding how to leverage information from CSA's vendor-neutral research to keep data secure on the cloud.
Learn more