Cloud 101CircleEventsBlog
Join AT&T Cybersecurity in Chicago to learn top 2024 resilience tactics on May 21st!

Download Publication

Critical Controls Implementation for Oracle E-Business Suite
Critical Controls Implementation for Oracle E-Business Suite

Critical Controls Implementation for Oracle E-Business Suite

Release Date: 04/05/2021

Oracle E-Business Suite (EBS) clients should address cloud migration as much more than a data center migration project. Cloud migration is a significant opportunity to “start over” regarding security by using best practices, tools, services, and techniques unique to the cloud. Moving an EBS implementation to the cloud can significantly strengthen an organization’s security posture.


However, deploying EBS in the cloud can also bring severe risks if not done right. This paper outlines 20 critical controls that will help an organization determine what security changes are needed when deploying Oracle EBS in the cloud. These controls map to CSA’s overarching Top 20 Critical Controls for Cloud Enterprise Resource Planning Customers.


Please note that this is a reference document whose purpose is to promote best practices for cloud deployments of the Oracle E-Business Suite. It does not replace Oracle Corporation's documentation and specific instructions. Specifically, this document is to be used as part of the Enterprise Resource Planning Working Group's ongoing dialogue.


Key Takeaways:
  • The control implementation (rationale) for 20 critical controls, including: segregation of duties, change management, continuous monitoring, data encryption, and more
  • The specific requirements and steps needed to implement the 20 critical controls
Who It’s For: Information security professionals, compliance professionals, and database and system administrators who belong to organizations that deploy (or want to deploy) EBS in the cloud.
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
HSM-as-a-Service Use Cases, Considerations, and Best Practices
HSM-as-a-Service Use Cases, Considerations, and...
Defining the Zero Trust Protect Surface
Defining the Zero Trust Protect Surface
The Six Pillars of DevSecOps - Collaboration and Integration
The Six Pillars of DevSecOps - Collaboration an...
Livin' on the Edge: Linux's Impact on Computing
Livin' on the Edge: Linux's Impact on Computing
Published: 05/01/2024
Navigating the Cloud – Beyond “Best Practices”
Navigating the Cloud – Beyond “Best Practices”
Published: 05/01/2024
Why Business Risk Should be Your Guiding North Star for Remediation
Why Business Risk Should be Your Guiding North Star for Remediation
Published: 04/25/2024
How to Prepare Your Workforce to Secure Your Cloud Infrastructure with Zero Trust
How to Prepare Your Workforce to Secure Your Cloud Infrastructure w...
Published: 04/24/2024

Acknowledgements

Shamun Mahmud
Shamun Mahmud
Senior Research Analyst, CSA

Shamun Mahmud

Senior Research Analyst, CSA

Bowen Close Headshot Missing
Bowen Close

Bowen Close

Juan Perez-Etchegoyen
Juan Perez-Etchegoyen

Juan Perez-Etchegoyen

As CTO and co-founder of Onapsis, JP leads the innovation and research teams that keeps Onapsis on the cutting edge of the Business-Critical Application Security market, addressing some of the most complex problems that organizations are currently facing while managing and securing their ERP landscapes. JP helps manage the development of new products as well as support the ERP cybersecurity research efforts that have garnered critical a...

Read more

Frederik Weidemann Headshot Missing
Frederik Weidemann

Frederik Weidemann

Dan Hiestand Headshot Missing
Dan Hiestand

Dan Hiestand

Michael Miller Headshot Missing
Michael Miller

Michael Miller

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training