Security Strategies for Risk Management Cloud (draft)

Cloud Security Methodology can be summarized with a simple statement: "WHO can do WHAT on WHICH set of data?" where:
  1. WHO is the User
  2. WHAT actions the user can perform, reflected in job and duty roles
  3. WHICH set of data is reflected in data security policies
An example is below:

Security Processes




For more full-detailed Tutorials and Tips, check out #TheOracleProdigy at https://lifeofanoracleprodigy.blogspot.com/
Follow The Oracle Prodigy on Facebook (https://www.facebook.com/theOracleProdigy/) and Twitter (https://twitter.com/D_OracleProdigy)

No comments:

Post a Comment