INFOCUS 22: What You Need to Know: Security Assessment & SoD - Not Just for Publicly Traded Companies
-
Posted by Quest Customer Learning Team
- Last updated 6/12/23
- Share
Presented at INFOCUS 22
Session ID: 101880
Join GSI as we deliver some insights to a successful security assessment that will form the foundations of a risk based, best practice security model for your company.
Leave this session with a plan for your security assessment and how to effectively design and implement a best practice security model.
Topics covered will include:
• What is a Security assessment and why do I need one?
• Health Check of current security
• Security integrities over users, roles, and security tables
• Identify users, and related user security that can be removed
• Identify roles, and related role security that can be removed
• Document security clean-up activities
• Remove “Orphaned records”
• Remove Redundant security details (This may correct many of your role sequencing issues)
• SoD, not just for publicly traded companies
• Best Practices
• Redesign Menu access for process-based vs job-based roles
• Opened to Closed security model
• Fine Cut / Menu Filtering
• Do I need a 3rd party tool for SoD?
Speaker: David Biles
Security Practice Manager
GSI
Watch the full-length video
You’ve reached the ultimate Oracle customer network—exclusively for Quest Corporate and Professional members.
Join Quest to unlock access to strategic content centers, event replays, exclusive programming, and expert insights—all designed to help Oracle users like you go further, faster.
Whether you're on JD Edwards, PeopleSoft, or Oracle Cloud, Quest connects you with a powerful peer network and Oracle experts so you can make smarter decisions, drive innovation, and get more from your investment.
Quest is where Oracle customers connect, learn, and lead with confidence. Ready to join them?
