《扩展云、数据库和劳动力系统的访问、安全性和合规性 [THR4209](1).pdf》由会员分享,可在线阅读,更多相关《扩展云、数据库和劳动力系统的访问、安全性和合规性 [THR4209](1).pdf(17页珍藏版)》请在三个皮匠报告上搜索。
1、 Scaling Access,Security&ComplianceBrajesh JhaSVP&Global Leader,AI Value TransformationsGenpactAcross Cloud,Database&Workforce SystemsErin CarlsonSr.Principal Product Manager,OCI Core PlatformsOracleIntroductionsCopyright 2025,Oracle and/or its affiliates|Confidential:Internal/Restricted/Highly Rest
2、rictedBrajesh JhaSVP&Global Leader,AI Value TransformationsGenpactErin CarlsonSr.Principal Product Manager,OCI Core PlatformsOracle2+Our very ambitious topic areas for todays conversationSecurityProtects data and systems from unauthorized access,usage,and attacks.AccessThe mechanisms that companies
3、use to authorize or deny resource access and usage.ComplianceSet of mandatory rules and standards set by governing bodies.Many rules focus on security and access.3Copyright 2025,Oracle and/or its affiliates|Confidential:Internal/Restricted/Highly Restricted4Copyright 2025,Oracle and/or its affiliate
4、s|Confidential:Internal/Restricted/Highly Restricted“Sometimes working in this space security,access,and compliance makes the whole world seem upside-down and backwards,all at once.”-Anonymous Customer,August 20215Copyright 2025,Oracle and/or its affiliates|Confidential:Internal/Restricted/Highly Re
5、stricted1.Nail the basicsCombine these core constructs to build controls.DatabaseSecurityInfrastructureComplianceRulesAccessIdentitiesWorkforce SystemsAssets&SystemsControlsThe nexus of any enterprise security,access,and compliance strategyCopyright 2025,Oracle and/or its affiliates|Confidential:Int
6、ernal/Restricted/Highly Restricted6CONTROLSSecurityAccessComplianceControlsThe nexus of any enterprise security,access,and compliance strategyTypes of ControlsPreventive ControlsDetective ControlsCorrective ControlsCopyright 2025,Oracle and/or its affiliates|Confidential:Internal/Restricted/Highly R