Understanding Security Compliance Features
Oracle employs a multi-faceted approach to ensure Oracle Fusion Cloud Enterprise Performance Management security and to protect the confidentiality, integrity, and availability of data.
In addition to physical security of data centers, Oracle has implemented the following security compliance features. These features help you satisfy the security compliance requirements of your organization.
- Transport Layer Security (TLS) 1.2 and 1.3 for Communication
- Periodic TLS Certificate Renewal
- Data Encryption Using Transparent Data Encryption
- Data Encryption Using OCI Block Volume Encryption
- Encryption Keys Stored in FIPS 140-2 Compliant HSM
- Password Encryption for Secure EPM Automate Access
- Secure Storage of User Credentials
- Data Masking in Snapshots
- Data Isolation
- Externalized Authentication (Single Sign-On)
- Synchronize Users and Groups Using SCIM
- Use of APIs and Commands to Manage Access
- Use of OAuth 2 Tokens for REST APIs, EPM Automate, and EPM Integration Agent
- Multiple Password Policies
- API Gateway Support for REST APIs and EPM Automate
- Role-Based Access Control For End Users
- Virus Scan on Uploaded Files
- Block Upload of Files with Invalid File Extensions
- Network Restricted Access
- Immutable Backup Archive
- Air-Gapped Backup in a Secondary Region
- Setup IP AllowList for Connections
- Deactivate Access to Environments
- Sign-On Policies to Restrict Access to Environments
- Maximum Session Duration
- Idle Session Timeout
- Protection Using Web Application Firewall (WAF)
- Compliance with Oracle Global Trade Policy
- Secure HTTP Headers
- DKIM Support
- SPF Support
- DMARC Support
- Bring Your Own Key Functionality for Database Access
- Control Manual Database Access
- Monitor Manual Database Access
- Restrict Data Access by Oracle
- Access Log for Information on Each Access to the Environment
- Audit Reports, Login Reports, and Audit Logs
- User Login Report for Security Audit
- Activity Report to Monitor Application Performance
- Integration with Custom SIEM Tools
- Oracle Software Security Assurance (OSSA)
- Oracle's Monitoring of Environments Using Realtime Dashboards and Alerts
- Threat and Vulnerability Management
- Secure Access to Cloud Environments by Oracle
- Automatic Security Patching
- Periodic Penetration Testing and Ethical Hacking to Identify and Fix Vulnerabilities
- External Security Audits
- Backup Data Residency and Retention
- 24X7 Support
- Security Policies for the United States Government
- Security Policies for the United Kingdom Government