Cloud

12/11/2017
10:30 AM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Oracle Product Rollout Underscores Need for Trust in the Cloud

Oracle updates its Identity SOC and management cloud with security tools to verify and manage users trusted with access to cloud-based data and applications.

Oracle is expanding its Identity SOC portfolio and Management Cloud with new cloud-based tools for identity control and configuration management, the company announced today. The rollout aims to improve user trust as people grapple with securing more data in the cloud.

The Identity Security Operations Center (SOC) and Oracle Management Cloud were announced a year ago and made available in October 2017. Gupta says the security and management suite is intended to give users an "adaptive security framework" and leverage data analytics, including user identity context, to find and remediate threats.

"The industry is departing from traditional notions of 'blocking the bad' and 'allowing the good' that don't work when everything is potentially compromised and we can't identify good from bad," says Felix Gaehtgens, Gartner research director. Businesses need an "adaptive" approach to continuously assess risk and trust, and adapt their stance accordingly.

Users are currently comfortable using automation for tasks like configuration and patching, says Rohit Gupta, group vice president of Oracle Identity Cloud. However, when there's suspicious activity around a user, most people want to closely inspect the issue before moving forward. Many have voiced the need for new technologies to bring identity context into the SOC flow.

"More businesses are going to trust their cloud assets to be more secure, and deal with security requirements in an automated fashion, to the point where we think on-prem environments will probably present a greater risk because many of them don't have the right principles in place to make automated changes," Gupta explains.

Cloud-based ID Governance

The first update introduces cloud-based identity governance software, which relies on machine learning and cloud application risk feeds from Oracle CASB Cloud Service. This simplifies tasks like approving employee requests to access new systems, Gupta says. Managers no longer have to go through dozens of steps to approve access through a custom Web portal or application.

"We do this while validating the risk quotient of the user," he says. If someone requested access, it checks to see how long they've been in the system and risks they've brought; for example, if they've logged in through unknown endpoints in the past. These factors prevent users logging in with stolen credentials and lessen the risk of misusing admin privileges.

"Identity is king in the contextual equation," says Gaehtgens. "We need to trust the identity of a person, business or entity acting on their behalf … and we need to evaluate this continuously, all the time."

He says the industry is picking up on this trend and making security tools more connected. Security governance has become more automated, replacing manual human approval and access certification "that can easily degrade into rubber stamping," he adds.

Configuration Management

Oracle updated its Configuration and Compliance Cloud Service, built on its Management Cloud. This automatically detects configuration settings across the business and uses machine learning to find and address outlier configurations. Oracle's Security Monitoring and Analytics (SMA) service baselines data access patterns and finds anomalies by user, database, or application.

Consumer Identity Management

To help businesses correlate consumer data with marketing data, Oracle has integrated consumer identity management with its Marketing Cloud and Data Cloud. This pulls built-in consent management, social profiles, preference management, and activity attributes from the Identity Cloud Service to build more targeted marketing campaigns with consumer analytics.

"In many cases, part of what they look for are insights on what consumer preferences are," says Gupta. For example, he says, consider a hotel rewards program. In this case, hotels could target services based on customers' past history and preferences, but in a manner compliant with privacy regulations around the world, he explains.

Oracle is launching the Identity SOC in Oracle Cloud Marketplace, making technology integrations available to security vendors across the industry. The idea is to lessen the amount of custom work businesses have to do, Gupta says.

The Identity SOC gives businesses access to threat intelligence feeds they may not otherwise have. For companies hiring new workers, these can prove useful for determining a new employee's risk. Data from the Identity SOC can provide insight on behavioral patterns and devices, which can help gauge the potential risk of a new hire.

Related Content:

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
hykerfred
50%
50%
hykerfred,
User Rank: Apprentice
12/13/2017 | 10:00:25 AM
Cloud is about Trust
As long as the supplier has the keys to your data you still have to trust THEM.
Want Your Daughter to Succeed in Cyber? Call Her John
John De Santis, CEO, HyTrust,  5/16/2018
Don't Roll the Dice When Prioritizing Vulnerability Fixes
Ericka Chickowski, Contributing Writer, Dark Reading,  5/15/2018
Why Enterprises Can't Ignore Third-Party IoT-Related Risks
Charlie Miller, Senior Vice President, The Santa Fe Group,  5/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Security through obscurity"
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11232
PUBLISHED: 2018-05-18
The etm_setup_aux function in drivers/hwtracing/coresight/coresight-etm-perf.c in the Linux kernel before 4.10.2 allows attackers to cause a denial of service (panic) because a parameter is incorrectly used as a local variable.
CVE-2017-15855
PUBLISHED: 2018-05-17
In Qualcomm Android for MSM, Firefox OS for MSM, and QRD Android with all Android releases from CAF using the Linux kernel, the camera application triggers "user-memory-access" issue as the Camera CPP module Linux driver directly accesses the application provided buffer, which resides in u...
CVE-2018-3567
PUBLISHED: 2018-05-17
In Qualcomm Android for MSM, Firefox OS for MSM, and QRD Android with all Android releases from CAF using the Linux kernel, a buffer overflow vulnerability exists in WLAN while processing the HTT_T2H_MSG_TYPE_PEER_MAP or HTT_T2H_MSG_TYPE_PEER_UNMAP messages.
CVE-2018-3568
PUBLISHED: 2018-05-17
In Qualcomm Android for MSM, Firefox OS for MSM, and QRD Android with all Android releases from CAF using the Linux kernel, in __wlan_hdd_cfg80211_vendor_scan(), a buffer overwrite can potentially occur.
CVE-2018-5827
PUBLISHED: 2018-05-17
In Qualcomm Android for MSM, Firefox OS for MSM, and QRD Android with all Android releases from CAF using the Linux kernel, a buffer overflow vulnerability exists in WLAN while processing an extscan hotlist event.