Overview of Critical Controls for Oracle Cloud Applications
Blog Article Published: 07/13/2022
CSA’s Enterprise Resource Planning (ERP) Working Group is pleased to release the latest in a series of security guidance for deploying ERP systems in the cloud. This latest whitepaper focuses on Oracle Cloud Applications.
Oracle Cloud Application clients share with Oracle Corporation the responsibilities for security. Using Oracle Cloud Applications is also a significant opportunity to “start over” regarding security by using best practices, tools, services, and techniques unique to the cloud. Adopting Oracle Cloud Applications can significantly strengthen an organization’s security posture.
However, deploying Oracle Cloud Applications also opens the door to significant risks if not done right. This paper outlines 20 critical controls that will help an organization determine what security changes are needed when deploying Oracle Cloud Applications. These controls map to CSA’s overarching Top 20 Critical Controls for Cloud Enterprise Resource Planning Customers.
Please note that this is a reference document whose purpose is to promote best practices for cloud deployments of the Oracle Cloud Applications. It does not replace Oracle Corporation's documentation and specific instructions. Specifically, this document is to be used as part of the ERP Working Group's ongoing dialogue.
Key Takeaways:
- The control implementation (rationale) for 20 critical controls, including: segregation of duties, change management, continuous monitoring, data encryption, and more
- The specific requirements and steps needed to implement the 20 critical controls
Who It’s For:
Information security professionals, compliance professionals, and database and system administrators who belong to organizations that use Oracle Cloud Applications.
Please contact us with any questions and/or join our next meeting.
Download the full publication here.Trending This Week
#1 Shared Responsibility Model Explained
#2 Remote Working Strategy Desktop Virtualization or Remote Access
#3 How CASB Is Different from Web Proxy/Firewall
#4 Top Threat #5 to Cloud Computing: Insecure Software Development
#5 The Service Mesh Wars: Why Istio might not be favorite after all
Sign up to receive CSA's latest blogs
This list receives 1-2 emails a month.
Related Articles:
Using ChatGPT for Cloud Security Audits
Published: 06/08/2023
Is Your Data Leaking via ChatGPT?
Published: 06/07/2023
Top Ways to Find and Protect Sensitive Data in the Cloud
Published: 06/06/2023