1、 Scaling Access,Security&ComplianceBrajesh JhaSVP&Global Leader,AI Value TransformationsGenpactAcross Cloud,Database&Workforce SystemsErin CarlsonSr.Principal Product Manager,OCI Core PlatformsOracleIntroductionsCopyright 2025,Oracle and/or its affiliates|Confidential:Internal/Restricted/Highly Rest
2、rictedBrajesh JhaSVP&Global Leader,AI Value TransformationsGenpactErin CarlsonSr.Principal Product Manager,OCI Core PlatformsOracle2+Our very ambitious topic areas for todays conversationSecurityProtects data and systems from unauthorized access,usage,and attacks.AccessThe mechanisms that companies
3、use to authorize or deny resource access and usage.ComplianceSet of mandatory rules and standards set by governing bodies.Many rules focus on security and access.3Copyright 2025,Oracle and/or its affiliates|Confidential:Internal/Restricted/Highly Restricted4Copyright 2025,Oracle and/or its affiliate
4、s|Confidential:Internal/Restricted/Highly Restricted“Sometimes working in this space security,access,and compliance makes the whole world seem upside-down and backwards,all at once.”-Anonymous Customer,August 20215Copyright 2025,Oracle and/or its affiliates|Confidential:Internal/Restricted/Highly Re
5、stricted1.Nail the basicsCombine these core constructs to build controls.DatabaseSecurityInfrastructureComplianceRulesAccessIdentitiesWorkforce SystemsAssets&SystemsControlsThe nexus of any enterprise security,access,and compliance strategyCopyright 2025,Oracle and/or its affiliates|Confidential:Int
6、ernal/Restricted/Highly Restricted6CONTROLSSecurityAccessComplianceControlsThe nexus of any enterprise security,access,and compliance strategyTypes of ControlsPreventive ControlsDetective ControlsCorrective ControlsCopyright 2025,Oracle and/or its affiliates|Confidential:Internal/Restricted/Highly R