IT Security Manager (Job Role)

Protects assets such as information technology systems, data, and networks.

Role Hierarchy

The IT Security Manager job role directly and indirectly inherits these roles.

  • IT Security Manager
    • Functional Setups

    • Manage Users
      • Manage User Account
        • Edit User Name

        • Manage User Roles

    • Partner Account Administration

    • Payments Data Security Administration

    • Security Management
      • Separation of Duties Role Analysis

    • Security Reporting
      • Separation of Duties Role Analysis

    • Security Transaction Analysis

    • Upload data for Access Groups Import

    • Upload data for Assignment Rule Import

    • View Portrait User Account Details Card

Duties

This table lists the duties assigned directly and indirectly to the IT Security Manager job role.

Duty Role Description

Functional Setups

Uses the functional user overview, and assigned tasks, and task lists.

Manage User Account

Manages user roles.

Manage Users

Creates and updates users and assigns roles to users.

Partner Account Administration

Maintains a partner account, including managing members and partner profile information.

Payments Data Security Administration

Manages security features, such as encryption and masking of sensitive data like credit card or bank account numbers.

Security Management

Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning.

Security Reporting

Reviews and reports security information, including user access and role design.

Security Transaction Analysis

Analyzes applications security configurations, including role definitions and security policies.

Separation of Duties Role Analysis

Allows user to analyze separation of duty violations on a new or existing role in security.

Upload data for Access Groups Import

Allows to upload data file to import Access Groups.

Upload data for Assignment Rule Import

Allows to upload data file to import Assignment Rule related data.

Aggregate Privileges

This table lists aggregate privileges assigned directly and indirectly to the IT Security Manager job role.

Aggregate Privilege Description

Edit User Name

Updates the user name associated with a person.

Manage User Roles

Allows management of user roles assignments.

View Portrait User Account Details Card

Views the User Account Details card in the Person Gallery.

Privileges

This table lists privileges granted to duties of the IT Security Manager job role.

Granted Role Granted Role Description Privilege

Functional Setups

Uses the functional user overview, and assigned tasks, and task lists.

Execute Setup Tasks

Functional Setups

Uses the functional user overview, and assigned tasks, and task lists.

Review Applications Offering

Functional Setups

Uses the functional user overview, and assigned tasks, and task lists.

Review Setups Functional User Overview

Functional Setups

Uses the functional user overview, and assigned tasks, and task lists.

Setup and Maintain Applications

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Administer Student Group

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Apply HCM Role Provisioning Rules

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Assign Oracle Fusion General Ledger Data Access Set Definition

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Configure Interface

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Define Oracle Fusion General Ledger Data Access Set

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Delete Access Group

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Delete Scheduled Process Tracker

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Enable and Disable Access Groups

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Grant Search Framework Manager Permissions

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Import Workers

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Load Batch Data

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Manage Active Directory Integration

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Manage Application Pages Security

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Manage Candidate Security Profile

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Manage Country Security Profile

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Manage Data Access for Users

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Manage Data Security Grants

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Manage Data Security Profiles

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Manage Document Type Security Profile

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Manage Group Access

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Manage HCM Data Role

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Manage HCM Exclusion Rules

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Manage HCM LDAP User Account Options

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Manage HCM Role Provisioning Rules

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Manage Job Requisition Security Profile

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Manage Legislative Data Group Security Profile

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Manage Oracle Search ACL Exclusion Rules for HCM

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Manage Organization Security Profile

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Manage Page Permissions Security

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Manage Payroll Element Security Profile

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Manage Payroll Flow Security Profile

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Manage Payroll Security Profile

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Manage Person Security Profile

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Manage Person and Assignment Security Profile

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Manage Position Security Profile

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Manage Profile Content Section Access

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Manage Run Results

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Manage Sales and Service Access

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Manage Security Roles

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Manage Student Group Configurations

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Manage Student Management Home Page Setups

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Manage Supplier User Roles

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Manage Talent Pool Security Profile

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Manage Transaction Security Profile

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Manage Workforce Structures Work Area

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Monitor Batch Load Process

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Preview HCM Data Security

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Request Enterprise Role

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Reset Password

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Run Batch Load Job Set

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Run Data Access Set Listing Report

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Run Regenerate HCM Data Security Grants Process

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Run Retrieve Latest LDAP Changes Process

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Run Send Pending LDAP Requests Process

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Run Users by Service Report

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Use REST Service - Identity Integration

IT Security Manager

Protects assets such as information technology systems, data, and networks.

Use REST Service - Users and Roles Lists of Values

IT Security Manager

Protects assets such as information technology systems, data, and networks.

View Access Explorer

IT Security Manager

Protects assets such as information technology systems, data, and networks.

View Application Pages Security

IT Security Manager

Protects assets such as information technology systems, data, and networks.

View Business Objects

IT Security Manager

Protects assets such as information technology systems, data, and networks.

View Data Security Grants

IT Security Manager

Protects assets such as information technology systems, data, and networks.

View Data Security Profiles

IT Security Manager

Protects assets such as information technology systems, data, and networks.

View Oracle Fusion General Ledger Data Access Set Definition

IT Security Manager

Protects assets such as information technology systems, data, and networks.

View Scheduled Process Tracker

IT Security Manager

Protects assets such as information technology systems, data, and networks.

View Student Management Home Page Setups

IT Security Manager

Protects assets such as information technology systems, data, and networks.

View User Accounts

Manage User Account

Manages user roles.

Copy Personal Data to LDAP

Manage User Account

Manages user roles.

Manage User Account

Manage User Account

Manages user roles.

Manage User Account and My Account

Manage User Account

Manages user roles.

Reset Password

Manage Users

Creates and updates users and assigns roles to users.

Manage User Details

Partner Account Administration

Maintains a partner account, including managing members and partner profile information.

Assign Partner Account

Partner Account Administration

Maintains a partner account, including managing members and partner profile information.

Create Partner

Partner Account Administration

Maintains a partner account, including managing members and partner profile information.

Create Partner Member

Partner Account Administration

Maintains a partner account, including managing members and partner profile information.

Create Partner User

Partner Account Administration

Maintains a partner account, including managing members and partner profile information.

Import Partner

Partner Account Administration

Maintains a partner account, including managing members and partner profile information.

Manage Enrollment Notes

Partner Account Administration

Maintains a partner account, including managing members and partner profile information.

Manage Partner Account Team

Partner Account Administration

Maintains a partner account, including managing members and partner profile information.

Manage Partner User Security Role

Partner Account Administration

Maintains a partner account, including managing members and partner profile information.

Remove Partner Member

Partner Account Administration

Maintains a partner account, including managing members and partner profile information.

Run Purge Batch Assignment Information Process

Partner Account Administration

Maintains a partner account, including managing members and partner profile information.

Update Partner Member

Partner Account Administration

Maintains a partner account, including managing members and partner profile information.

Update Partner Profile

Partner Account Administration

Maintains a partner account, including managing members and partner profile information.

View Partner

Partner Account Administration

Maintains a partner account, including managing members and partner profile information.

View Partner Contract

Payments Data Security Administration

Manages security features, such as encryption and masking of sensitive data like credit card or bank account numbers.

Manage System Security Options

Payments Data Security Administration

Manages security features, such as encryption and masking of sensitive data like credit card or bank account numbers.

Manage Wallet

Payments Data Security Administration

Manages security features, such as encryption and masking of sensitive data like credit card or bank account numbers.

Submit Credit Card Decryption Process

Payments Data Security Administration

Manages security features, such as encryption and masking of sensitive data like credit card or bank account numbers.

Submit Credit Card Detokenization Process

Payments Data Security Administration

Manages security features, such as encryption and masking of sensitive data like credit card or bank account numbers.

Submit Credit Card Encryption Process

Payments Data Security Administration

Manages security features, such as encryption and masking of sensitive data like credit card or bank account numbers.

Submit Credit Card Masking Process

Payments Data Security Administration

Manages security features, such as encryption and masking of sensitive data like credit card or bank account numbers.

Submit Credit Card Tokenization Process

Payments Data Security Administration

Manages security features, such as encryption and masking of sensitive data like credit card or bank account numbers.

Submit Import Credential Process

Payments Data Security Administration

Manages security features, such as encryption and masking of sensitive data like credit card or bank account numbers.

Submit Payments Sensitive Data Decryption

Payments Data Security Administration

Manages security features, such as encryption and masking of sensitive data like credit card or bank account numbers.

Submit Payments Sensitive Data Encryption

Payments Data Security Administration

Manages security features, such as encryption and masking of sensitive data like credit card or bank account numbers.

Submit Third Party Bank Account Decryption Process

Payments Data Security Administration

Manages security features, such as encryption and masking of sensitive data like credit card or bank account numbers.

Submit Third Party Bank Account Encryption Process

Payments Data Security Administration

Manages security features, such as encryption and masking of sensitive data like credit card or bank account numbers.

Submit Third Party Bank Account Masking Process

Payments Data Security Administration

Manages security features, such as encryption and masking of sensitive data like credit card or bank account numbers.

Submit Transaction Encryption Process

Security Management

Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning.

Administer API Authentication

Security Management

Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning.

Administer App Extensions

Security Management

Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning.

Administer SSO

Security Management

Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning.

Administer Security

Security Management

Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning.

Analyze Security

Security Management

Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning.

Create Role

Security Management

Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning.

Create User Account

Security Management

Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning.

Delete User Account

Security Management

Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning.

Edit Role

Security Management

Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning.

Edit User Account

Security Management

Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning.

Enable Database Resource Management

Security Management

Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning.

Enable Two-Factor Authentication for User Account

Security Management

Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning.

Export Certificate

Security Management

Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning.

Generate Certificate

Security Management

Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning.

Import Certificate

Security Management

Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning.

Import Users and Roles

Security Management

Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning.

Lock and Unlock User Account

Security Management

Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning.

Manage All Application Profile Values

Security Management

Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning.

Manage Scheduled Processes

Security Management

Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning.

Run Password Expiry Job

Security Management

Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning.

Update Password for User Account

Security Management

Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning.

View App Extensions

Security Management

Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning.

View Certificate

Security Management

Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning.

View Role

Security Management

Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning.

View User Account

Security Reporting

Reviews and reports security information, including user access and role design.

Analyze Security

Security Reporting

Reviews and reports security information, including user access and role design.

Import User Login History

Security Reporting

Reviews and reports security information, including user access and role design.

Manage All Application Profile Values

Security Reporting

Reviews and reports security information, including user access and role design.

Manage Reports and Analytics

Security Reporting

Reviews and reports security information, including user access and role design.

Manage Scheduled Processes

Security Reporting

Reviews and reports security information, including user access and role design.

Run Inactive Users Report

Security Reporting

Reviews and reports security information, including user access and role design.

Run Privilege Discoverer Report

Security Reporting

Reviews and reports security information, including user access and role design.

Run Role Hierarchy Optimization Report

Security Reporting

Reviews and reports security information, including user access and role design.

Run User Access Audit Report

Security Reporting

Reviews and reports security information, including user access and role design.

Run User Password Changes Audit Report

Security Reporting

Reviews and reports security information, including user access and role design.

Run User Role Membership Report

Security Reporting

Reviews and reports security information, including user access and role design.

View Role

Security Reporting

Reviews and reports security information, including user access and role design.

View User Account

Separation of Duties Role Analysis

Allows user to analyze separation of duty violations on a new or existing role in security.

Use REST Service for Advanced Access Control Role Analysis

Separation of Duties Role Analysis

Allows user to analyze separation of duty violations on a new or existing role in security.

Use REST Service for GRC Server Status

Separation of Duties Role Analysis

Allows user to analyze separation of duty violations on a new or existing role in security.

View Access Provisioning Rules

Data Security Policies

This table lists data security policies and their enforcement across analytics application for the IT Security Manager job role.

Business Object Policy Description Policy Store Implementation

Application Objects

A It Security Manager can manage application objects for all applications common objects

Role: IT Security Manager

Privilege: Manage Application Objects (Data)

Resource: Application Objects

Application Objects

A It Security Manager can manage application objects for all customer relationship management application objects

Role: IT Security Manager

Privilege: Manage Application Objects (Data)

Resource: Application Objects

Application Objects

A It Security Manager can manage application objects for all financial supply chain manufacturing application objects

Role: IT Security Manager

Privilege: Manage Application Objects (Data)

Resource: Application Objects

Application Objects

A It Security Manager can manage application objects for all human capital management application objects

Role: IT Security Manager

Privilege: Manage Application Objects (Data)

Resource: Application Objects

Application Objects

A It Security Manager can manage application objects for all objects

Role: IT Security Manager

Privilege: Manage Application Objects (Data)

Resource: Application Objects

Application Objects

An IT Security Manager can manage application objects for all objects

Role: Security Management

Privilege: Manage Application Objects (Data)

Resource: Application Objects

Application Reference Territory

A It Security Manager can choose application reference territory for all application reference territories in the enterprise

Role: IT Security Manager

Privilege: Choose Application Reference Territory (Data)

Resource: Application Reference Territory

Assignment Grade

A It Security Manager can choose assignment grade for all grades in the enterprise

Role: IT Security Manager

Privilege: Choose Assignment Grade (Data)

Resource: Assignment Grade

Business Unit

A It Security Manager can choose business unit for all business units in the enterprise

Role: IT Security Manager

Privilege: Choose Business Unit Organization (Data)

Resource: Business Unit

Business Unit

A It Security Manager can choose business unit for business units in their organization security profile

Role: IT Security Manager

Privilege: Choose Business Unit Organization (Data)

Resource: Business Unit

Department

A It Security Manager can choose department for all departments in the enterprise

Role: IT Security Manager

Privilege: Choose Department (Data)

Resource: Department

File Import Activity

An IT Security Manager can view standard file import activity object type for all standard file import activities that are accessible for partner account administration duty

Role: Partner Account Administration

Privilege: View Standard File Import Activity Object Type

Resource: File Import Activity

File Import Mapping

An IT Security Manager can view standard file import mapping object type for all standard file import maps that are accessible for partner account administration duty

Role: Partner Account Administration

Privilege: View Standard File Import Mapping Object Type

Resource: File Import Mapping

HR Job

A It Security Manager can choose hr job for all jobs in the enterprise

Role: IT Security Manager

Privilege: Choose HR Job (Data)

Resource: HR Job

Legal Employer

A It Security Manager can choose legal employer for all legal employers in the enterprise

Role: IT Security Manager

Privilege: Choose Legal Employer (Data)

Resource: Legal Employer

Legal Employer

A It Security Manager can choose legal employer for legal employers in their organization security profile

Role: IT Security Manager

Privilege: Choose Legal Employer (Data)

Resource: Legal Employer

Legislative Data Group

A It Security Manager can choose legislative data group for all legislative data groups in the enterprise

Role: IT Security Manager

Privilege: Choose Legislative Data Group (Data)

Resource: Legislative Data Group

Location

A It Security Manager can choose location for all locations in the enterprise

Role: IT Security Manager

Privilege: Choose Location (Data)

Resource: Location

Managed Student Group

A It Security Manager can manage managed student group for all managed student groups

Role: IT Security Manager

Privilege: Manage Student Group (Data)

Resource: Managed Student Group

Person Assignment

An IT Security Manager can search worker for persons and assignments in their person and assignment security profile

Role: Manage Users

Privilege: Search Worker (Data)

Resource: Person Assignment

Person Assignment

An IT Security Manager can view person assignment for persons and assignments in their person and assignment security profile

Role: Manage Users

Privilege: View Person Assignment (Data)

Resource: Person Assignment

Person Type

An IT Security Manager can choose person type for person types in their person type security profile

Role: Manage Users

Privilege: Choose Person Type (Data)

Resource: Person Type

Position

A It Security Manager can choose position for all positions in the enterprise

Role: IT Security Manager

Privilege: Choose Position (Data)

Resource: Position

Public Person

A It Security Manager can choose public person for all people in the enterprise

Role: IT Security Manager

Privilege: Choose Public Person (Data)

Resource: Public Person

Sales Objects

An IT Security Manager can view standard file import export object type for all standard file import export objects that are accessible for partner account administration duty

Role: Partner Account Administration

Privilege: View Standard File Import Export Object Type

Resource: Sales Objects

User

An IT Security Manager can edit user name for persons in their person security profile.

Role: Edit User Name

Privilege: Edit User Name (Data)

Resource: User

User

An IT Security Manager can link user account for persons and assignments in their person and assignment security profile

Role: Manage User Account

Privilege: Link User Account (Data)

Resource: User

User

An IT Security Manager can manage user accounts for persons and assignments in their person and assignment security profile

Role: Manage User Account

Privilege: Manage User Accounts (Data)

Resource: User

User

An IT Security Manager can view user accounts for persons and assignments in their person and assignment security profile

Role: Manage User Account

Privilege: View User Accounts (Data)

Resource: User