SANS Whitepaper- Blueprint for CIS Control Application: Security Oracle E-Business Suite

This white paper mapping the CIS Controls for Effective Cyber Defense to Oracle EBS’s cybersecurity framework outlines a step-by-step approach organizations can take to secure EBS implementations. This approach is largely application oriented, but also applies network restrictions to underlying network devices and firewalls, in addition to closing loopholes through operational procedures and training. T

he four-step approach to applying the CIS Critical Security Controls is:

  • Step 1: Tailor Enterprise Processes (CIS Control: 1, 2, 3, 4, 5, 6, 10, 13, 14, 16)
  • Step 2: Secure the Landscape (CIS Control: 3, 7, 9, 10, 11, 12, 18)
  • Step 3: Configure the Technical Controls (CIS Control: 2, 3, 4, 5, 6, 8, 13, 14,16)
  • Step 4: Create the Human Action Framework (CIS Control: 17, 19, 20) 


We use cookies to optimize your experience, enhance site navigation, analyze site usage, assist in our marketing efforts. Privacy Policy