IT Security Manager (Job Role)
Protects assets such as information technology systems, data, and networks.
Role Hierarchy
The IT Security Manager job role directly and indirectly inherits these roles.
-
IT Security Manager
-
Functional Setups
-
Manage Users
-
Manage User Account
-
Edit User Name
-
Manage User Roles
-
-
-
Partner Account Administration
-
Payments Data Security Administration
-
Security Management
-
Separation of Duties Role Analysis
-
-
Security Reporting
-
Separation of Duties Role Analysis
-
-
Security Transaction Analysis
-
Upload data for Access Groups Import
-
Upload data for Assignment Rule Import
-
View Portrait User Account Details Card
-
Duties
This table lists the duties assigned directly and indirectly to the IT Security Manager job role.
Duty Role | Description |
---|---|
Functional Setups |
Uses the functional user overview, and assigned tasks, and task lists. |
Manage User Account |
Manages user roles. |
Manage Users |
Creates and updates users and assigns roles to users. |
Partner Account Administration |
Maintains a partner account, including managing members and partner profile information. |
Payments Data Security Administration |
Manages security features, such as encryption and masking of sensitive data like credit card or bank account numbers. |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
Security Reporting |
Reviews and reports security information, including user access and role design. |
Security Transaction Analysis |
Analyzes applications security configurations, including role definitions and security policies. |
Separation of Duties Role Analysis |
Allows user to analyze separation of duty violations on a new or existing role in security. |
Upload data for Access Groups Import |
Allows to upload data file to import Access Groups. |
Upload data for Assignment Rule Import |
Allows to upload data file to import Assignment Rule related data. |
Aggregate Privileges
This table lists aggregate privileges assigned directly and indirectly to the IT Security Manager job role.
Aggregate Privilege | Description |
---|---|
Edit User Name |
Updates the user name associated with a person. |
Manage User Roles |
Allows management of user roles assignments. |
View Portrait User Account Details Card |
Views the User Account Details card in the Person Gallery. |
Privileges
This table lists privileges granted to duties of the IT Security Manager job role.
Granted Role | Granted Role Description | Privilege |
---|---|---|
Functional Setups |
Uses the functional user overview, and assigned tasks, and task lists. |
Execute Setup Tasks |
Functional Setups |
Uses the functional user overview, and assigned tasks, and task lists. |
Review Applications Offering |
Functional Setups |
Uses the functional user overview, and assigned tasks, and task lists. |
Review Setups Functional User Overview |
Functional Setups |
Uses the functional user overview, and assigned tasks, and task lists. |
Setup and Maintain Applications |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Administer Student Group |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Apply HCM Role Provisioning Rules |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Assign Oracle Fusion General Ledger Data Access Set Definition |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Configure Interface |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Define Oracle Fusion General Ledger Data Access Set |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Delete Access Group |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Delete Scheduled Process Tracker |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Enable and Disable Access Groups |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Grant Search Framework Manager Permissions |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Import Workers |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Load Batch Data |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Active Directory Integration |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Application Pages Security |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Candidate Security Profile |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Country Security Profile |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Data Access for Users |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Data Security Grants |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Data Security Profiles |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Document Type Security Profile |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Group Access |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage HCM Data Role |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage HCM Exclusion Rules |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage HCM LDAP User Account Options |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage HCM Role Provisioning Rules |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Job Requisition Security Profile |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Legislative Data Group Security Profile |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Oracle Search ACL Exclusion Rules for HCM |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Organization Security Profile |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Page Permissions Security |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Payroll Element Security Profile |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Payroll Flow Security Profile |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Payroll Security Profile |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Person Security Profile |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Person and Assignment Security Profile |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Position Security Profile |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Profile Content Section Access |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Run Results |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Sales and Service Access |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Security Roles |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Student Group Configurations |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Student Management Home Page Setups |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Supplier User Roles |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Talent Pool Security Profile |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Transaction Security Profile |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Manage Workforce Structures Work Area |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Monitor Batch Load Process |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Preview HCM Data Security |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Request Enterprise Role |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Reset Password |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Run Batch Load Job Set |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Run Data Access Set Listing Report |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Run Regenerate HCM Data Security Grants Process |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Run Retrieve Latest LDAP Changes Process |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Run Send Pending LDAP Requests Process |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Run Users by Service Report |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Use REST Service - Identity Integration |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
Use REST Service - Users and Roles Lists of Values |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
View Access Explorer |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
View Application Pages Security |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
View Business Objects |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
View Data Security Grants |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
View Data Security Profiles |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
View Oracle Fusion General Ledger Data Access Set Definition |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
View Scheduled Process Tracker |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
View Student Management Home Page Setups |
IT Security Manager |
Protects assets such as information technology systems, data, and networks. |
View User Accounts |
Manage User Account |
Manages user roles. |
Copy Personal Data to LDAP |
Manage User Account |
Manages user roles. |
Manage User Account |
Manage User Account |
Manages user roles. |
Manage User Account and My Account |
Manage User Account |
Manages user roles. |
Reset Password |
Manage Users |
Creates and updates users and assigns roles to users. |
Manage User Details |
Partner Account Administration |
Maintains a partner account, including managing members and partner profile information. |
Assign Partner Account |
Partner Account Administration |
Maintains a partner account, including managing members and partner profile information. |
Create Partner |
Partner Account Administration |
Maintains a partner account, including managing members and partner profile information. |
Create Partner Member |
Partner Account Administration |
Maintains a partner account, including managing members and partner profile information. |
Create Partner User |
Partner Account Administration |
Maintains a partner account, including managing members and partner profile information. |
Import Partner |
Partner Account Administration |
Maintains a partner account, including managing members and partner profile information. |
Manage Enrollment Notes |
Partner Account Administration |
Maintains a partner account, including managing members and partner profile information. |
Manage Partner Account Team |
Partner Account Administration |
Maintains a partner account, including managing members and partner profile information. |
Manage Partner User Security Role |
Partner Account Administration |
Maintains a partner account, including managing members and partner profile information. |
Remove Partner Member |
Partner Account Administration |
Maintains a partner account, including managing members and partner profile information. |
Run Purge Batch Assignment Information Process |
Partner Account Administration |
Maintains a partner account, including managing members and partner profile information. |
Update Partner Member |
Partner Account Administration |
Maintains a partner account, including managing members and partner profile information. |
Update Partner Profile |
Partner Account Administration |
Maintains a partner account, including managing members and partner profile information. |
View Partner |
Partner Account Administration |
Maintains a partner account, including managing members and partner profile information. |
View Partner Contract |
Payments Data Security Administration |
Manages security features, such as encryption and masking of sensitive data like credit card or bank account numbers. |
Manage System Security Options |
Payments Data Security Administration |
Manages security features, such as encryption and masking of sensitive data like credit card or bank account numbers. |
Manage Wallet |
Payments Data Security Administration |
Manages security features, such as encryption and masking of sensitive data like credit card or bank account numbers. |
Submit Credit Card Decryption Process |
Payments Data Security Administration |
Manages security features, such as encryption and masking of sensitive data like credit card or bank account numbers. |
Submit Credit Card Detokenization Process |
Payments Data Security Administration |
Manages security features, such as encryption and masking of sensitive data like credit card or bank account numbers. |
Submit Credit Card Encryption Process |
Payments Data Security Administration |
Manages security features, such as encryption and masking of sensitive data like credit card or bank account numbers. |
Submit Credit Card Masking Process |
Payments Data Security Administration |
Manages security features, such as encryption and masking of sensitive data like credit card or bank account numbers. |
Submit Credit Card Tokenization Process |
Payments Data Security Administration |
Manages security features, such as encryption and masking of sensitive data like credit card or bank account numbers. |
Submit Import Credential Process |
Payments Data Security Administration |
Manages security features, such as encryption and masking of sensitive data like credit card or bank account numbers. |
Submit Payments Sensitive Data Decryption |
Payments Data Security Administration |
Manages security features, such as encryption and masking of sensitive data like credit card or bank account numbers. |
Submit Payments Sensitive Data Encryption |
Payments Data Security Administration |
Manages security features, such as encryption and masking of sensitive data like credit card or bank account numbers. |
Submit Third Party Bank Account Decryption Process |
Payments Data Security Administration |
Manages security features, such as encryption and masking of sensitive data like credit card or bank account numbers. |
Submit Third Party Bank Account Encryption Process |
Payments Data Security Administration |
Manages security features, such as encryption and masking of sensitive data like credit card or bank account numbers. |
Submit Third Party Bank Account Masking Process |
Payments Data Security Administration |
Manages security features, such as encryption and masking of sensitive data like credit card or bank account numbers. |
Submit Transaction Encryption Process |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
Administer API Authentication |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
Administer App Extensions |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
Administer SSO |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
Administer Security |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
Analyze Security |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
Create Role |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
Create User Account |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
Delete User Account |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
Edit Role |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
Edit User Account |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
Enable Database Resource Management |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
Enable Two-Factor Authentication for User Account |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
Export Certificate |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
Generate Certificate |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
Import Certificate |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
Import Users and Roles |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
Lock and Unlock User Account |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
Manage All Application Profile Values |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
Manage Scheduled Processes |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
Run Password Expiry Job |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
Update Password for User Account |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
View App Extensions |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
View Certificate |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
View Role |
Security Management |
Manages the creation and maintenance of user accounts, roles and digital certificates. Manage role hierarchy, function security policies, data security policies and provisioning. |
View User Account |
Security Reporting |
Reviews and reports security information, including user access and role design. |
Analyze Security |
Security Reporting |
Reviews and reports security information, including user access and role design. |
Import User Login History |
Security Reporting |
Reviews and reports security information, including user access and role design. |
Manage All Application Profile Values |
Security Reporting |
Reviews and reports security information, including user access and role design. |
Manage Reports and Analytics |
Security Reporting |
Reviews and reports security information, including user access and role design. |
Manage Scheduled Processes |
Security Reporting |
Reviews and reports security information, including user access and role design. |
Run Inactive Users Report |
Security Reporting |
Reviews and reports security information, including user access and role design. |
Run Privilege Discoverer Report |
Security Reporting |
Reviews and reports security information, including user access and role design. |
Run Role Hierarchy Optimization Report |
Security Reporting |
Reviews and reports security information, including user access and role design. |
Run User Access Audit Report |
Security Reporting |
Reviews and reports security information, including user access and role design. |
Run User Password Changes Audit Report |
Security Reporting |
Reviews and reports security information, including user access and role design. |
Run User Role Membership Report |
Security Reporting |
Reviews and reports security information, including user access and role design. |
View Role |
Security Reporting |
Reviews and reports security information, including user access and role design. |
View User Account |
Separation of Duties Role Analysis |
Allows user to analyze separation of duty violations on a new or existing role in security. |
Use REST Service for Advanced Access Control Role Analysis |
Separation of Duties Role Analysis |
Allows user to analyze separation of duty violations on a new or existing role in security. |
Use REST Service for GRC Server Status |
Separation of Duties Role Analysis |
Allows user to analyze separation of duty violations on a new or existing role in security. |
View Access Provisioning Rules |
Data Security Policies
This table lists data security policies and their enforcement across analytics application for the IT Security Manager job role.
Business Object | Policy Description | Policy Store Implementation |
---|---|---|
Application Objects |
A It Security Manager can manage application objects for all applications common objects |
Role: IT Security Manager Privilege: Manage Application Objects (Data) Resource: Application Objects |
Application Objects |
A It Security Manager can manage application objects for all customer relationship management application objects |
Role: IT Security Manager Privilege: Manage Application Objects (Data) Resource: Application Objects |
Application Objects |
A It Security Manager can manage application objects for all financial supply chain manufacturing application objects |
Role: IT Security Manager Privilege: Manage Application Objects (Data) Resource: Application Objects |
Application Objects |
A It Security Manager can manage application objects for all human capital management application objects |
Role: IT Security Manager Privilege: Manage Application Objects (Data) Resource: Application Objects |
Application Objects |
A It Security Manager can manage application objects for all objects |
Role: IT Security Manager Privilege: Manage Application Objects (Data) Resource: Application Objects |
Application Objects |
An IT Security Manager can manage application objects for all objects |
Role: Security Management Privilege: Manage Application Objects (Data) Resource: Application Objects |
Application Reference Territory |
A It Security Manager can choose application reference territory for all application reference territories in the enterprise |
Role: IT Security Manager Privilege: Choose Application Reference Territory (Data) Resource: Application Reference Territory |
Assignment Grade |
A It Security Manager can choose assignment grade for all grades in the enterprise |
Role: IT Security Manager Privilege: Choose Assignment Grade (Data) Resource: Assignment Grade |
Business Unit |
A It Security Manager can choose business unit for all business units in the enterprise |
Role: IT Security Manager Privilege: Choose Business Unit Organization (Data) Resource: Business Unit |
Business Unit |
A It Security Manager can choose business unit for business units in their organization security profile |
Role: IT Security Manager Privilege: Choose Business Unit Organization (Data) Resource: Business Unit |
Department |
A It Security Manager can choose department for all departments in the enterprise |
Role: IT Security Manager Privilege: Choose Department (Data) Resource: Department |
File Import Activity |
An IT Security Manager can view standard file import activity object type for all standard file import activities that are accessible for partner account administration duty |
Role: Partner Account Administration Privilege: View Standard File Import Activity Object Type Resource: File Import Activity |
File Import Mapping |
An IT Security Manager can view standard file import mapping object type for all standard file import maps that are accessible for partner account administration duty |
Role: Partner Account Administration Privilege: View Standard File Import Mapping Object Type Resource: File Import Mapping |
HR Job |
A It Security Manager can choose hr job for all jobs in the enterprise |
Role: IT Security Manager Privilege: Choose HR Job (Data) Resource: HR Job |
Legal Employer |
A It Security Manager can choose legal employer for all legal employers in the enterprise |
Role: IT Security Manager Privilege: Choose Legal Employer (Data) Resource: Legal Employer |
Legal Employer |
A It Security Manager can choose legal employer for legal employers in their organization security profile |
Role: IT Security Manager Privilege: Choose Legal Employer (Data) Resource: Legal Employer |
Legislative Data Group |
A It Security Manager can choose legislative data group for all legislative data groups in the enterprise |
Role: IT Security Manager Privilege: Choose Legislative Data Group (Data) Resource: Legislative Data Group |
Location |
A It Security Manager can choose location for all locations in the enterprise |
Role: IT Security Manager Privilege: Choose Location (Data) Resource: Location |
Managed Student Group |
A It Security Manager can manage managed student group for all managed student groups |
Role: IT Security Manager Privilege: Manage Student Group (Data) Resource: Managed Student Group |
Person Assignment |
An IT Security Manager can search worker for persons and assignments in their person and assignment security profile |
Role: Manage Users Privilege: Search Worker (Data) Resource: Person Assignment |
Person Assignment |
An IT Security Manager can view person assignment for persons and assignments in their person and assignment security profile |
Role: Manage Users Privilege: View Person Assignment (Data) Resource: Person Assignment |
Person Type |
An IT Security Manager can choose person type for person types in their person type security profile |
Role: Manage Users Privilege: Choose Person Type (Data) Resource: Person Type |
Position |
A It Security Manager can choose position for all positions in the enterprise |
Role: IT Security Manager Privilege: Choose Position (Data) Resource: Position |
Public Person |
A It Security Manager can choose public person for all people in the enterprise |
Role: IT Security Manager Privilege: Choose Public Person (Data) Resource: Public Person |
Sales Objects |
An IT Security Manager can view standard file import export object type for all standard file import export objects that are accessible for partner account administration duty |
Role: Partner Account Administration Privilege: View Standard File Import Export Object Type Resource: Sales Objects |
User |
An IT Security Manager can edit user name for persons in their person security profile. |
Role: Edit User Name Privilege: Edit User Name (Data) Resource: User |
User |
An IT Security Manager can link user account for persons and assignments in their person and assignment security profile |
Role: Manage User Account Privilege: Link User Account (Data) Resource: User |
User |
An IT Security Manager can manage user accounts for persons and assignments in their person and assignment security profile |
Role: Manage User Account Privilege: Manage User Accounts (Data) Resource: User |
User |
An IT Security Manager can view user accounts for persons and assignments in their person and assignment security profile |
Role: Manage User Account Privilege: View User Accounts (Data) Resource: User |