Title Summary File
PeopleSoft Security

This is a quick summary of Integrigy’s latest research on PeopleSoft. Was sending this to a client and decided it was a good posting: 

...
Whitepapers and Presentations, Oracle Security Blog
Guide to PeopleSoft Logging and Auditing

Most clients do not fully take advantage of PeopleSoft’s auditing and logging features. These features are sophisticated and are able to satisfy...

Whitepapers and Presentations File
How to Control and Secure Your DBAs and Developers in PeopleSoft

...

Security Resources File
How to Control and Secure PeopleSoft DBAs and Developers

A common compliance challenge for most PeopleSoft environments is how to control and secure direct database access by DBAs and developers,...

Whitepapers and Presentations File
PeopleSoft Data Mover Security

The Data Mover allows for total manipulation of data within PeopleSoft. You can use it to transfer data among PeopleSoft databases, regardless of...

Oracle Security Blog
PeopleSoft Process Scheduler Security

When performing a PeopleSoft security audit Integrigy carefully reviews batch processing activity generated through the Process Scheduler. Of...

Oracle Security Blog
PeopleSoft User Security

When performing a PeopleSoft security audit, reconciling users should be one of the first tasks. This includes default accounts created through...

Oracle Security Blog
PeopleSoft Jolt Security

Jolt along with Tuxedo supports PeopleSoft web requests. Specifically, Jolt is the layer between the application server and the web server. It is...

Oracle Security Blog
PeopleSoft Encryption

Protection of sensitive data while at-rest, in-motion or in-use all need to be addressed as part of a holistic security strategy. This includes...

Oracle Security Blog
PeopleSoft PUBLIC User Security

PeopleSoft Public users are not required to authenticate (sign on). These are generic accounts created for specific purposes, for example...

Oracle Security Blog

Pages