You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: cloud-architecture/oracle-apps-hyperion-siebel-gbu/gbu/construction-engineering/README.md
+2-1
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ These resources aim to offer guidance throughout your migration, enabling you to
6
6
7
7
Explore these materials to enhance your migration strategy. We appreciate your participation and are committed to supporting your cloud migration journey.
8
8
9
-
Reviewed: 20.11.2023
9
+
Reviewed: 7.2.2024
10
10
11
11
# Table of Contents
12
12
@@ -22,6 +22,7 @@ The reusable assets available in this repository:
22
22
23
23
# Useful Links
24
24
25
+
-[Primavera 24 is now available for download. Read more about the latest release in the Documentation Library](https://docs.oracle.com/en/industries/construction-engineering/index.html)
25
26
-[Oracle Construction and Engineering Applications documentation](https://docs.oracle.com/en/industries/construction-engineering/index.html)
26
27
-[Oracle Construction and Engineering Applications Lifetime Support Policy](https://www.oracle.com/us/assets/lifetime-support-applications-069216.pdf)
Copy file name to clipboardExpand all lines: cloud-architecture/oracle-apps-hyperion-siebel-gbu/gbu/construction-engineering/primavera-solution-definition/README.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
3
3
This repository contains an in-depth guide for Oracle Primavera migration projects. It offers a high-level solution definition for migrating or establishing Primavera Workloads on Oracle Cloud Infrastructure (OCI). With a comprehensive representation of the current state, prospective state, potential project scope, and anticipated timeline, this document aims to provide a precise understanding of the project's scope and intention to all participating entities.
Copy file name to clipboardExpand all lines: cloud-architecture/oracle-apps-hyperion-siebel-gbu/gbu/construction-engineering/primavera-solution-definition/files/primavera-solution-definition.md
+28-4
Original file line number
Diff line number
Diff line change
@@ -24,7 +24,7 @@ Version | Author | Date | Comment
24
24
:--- |:--- |:--- |:---
25
25
0.1 | Name | June 12th, 2023 | Updates to network design
26
26
1.0 | Name | June 13th, 2023 | Updates to HA design
27
-
2.2 | Name | October 25th, 2023 | Updates to Annex
27
+
2.4 | Name | February 26th, 2024 | Added the network firewall in the requirment, the solution considerations and in the Annex.
28
28
29
29
## Team
30
30
@@ -309,6 +309,19 @@ At the time of this document creation, no Security requirements have been specif
309
309
310
310
*Capture the Non-Functional Requirements for networking-related topics. You can use the networking questions in the [Annex](#networking-requirement-considerations)*
311
311
312
+
*As businesses increasingly rely on Cloud Infrastructure to store, process, and transmit sensitive data, the need for comprehensive security solutions has never been more important. Potential customers evaluating network security solutions typically prioritize the following requirements: Some of the broader category considerations are below.*
313
+
314
+
-*Data Protection: Safeguarding sensitive information against unauthorized access, theft, or modification is a primary concern for any organization and industry today.*
315
+
-*Threat Prevention: Advanced capabilities like IDPS and malware detection for blocking threats.*
316
+
-*Data Loss Prevention (DLP): Monitoring and controlling sensitive data transmission.*
317
+
-*Encryption and Decryption: Inspecting encrypted traffic without compromising privacy.*
318
+
-*Threat Prevention: Proactively identifying and mitigating security threats is essential for maintaining the integrity of network infrastructure. *
319
+
-*Intrusion Detection and Prevention: Monitoring for suspicious or malicious activity.*
320
+
-*Application Control: Granular control over specific applications or services.*
321
+
-*URL Filtering: Controlling access to permitted URLs.*
322
+
-*Security compliance: Does your organization have network security requirements based on industry or organization compliance? For example - SAMA (Saudi Arabia Monetary Authority), HIPAA (Health Insurance Portability and Accountability Act), GDPR (General Data Protection Regulation), SWIFT, etc.*
323
+
324
+
312
325
*Example:*
313
326
314
327
At the time of this document creation, no Networking requirements have been specified.
@@ -571,8 +584,7 @@ Please see our security guidelines in the [Annex](#security-guidelines).
571
584
572
585
*Reference:*
573
586
574
-
*A list of possible Oracle solutions can be found in the [Annex](#networking-solutions).*
575
-
587
+
*If your customers have any or one of the needs described in the guide of the [Network Requirements](#networking-requirements), then the OCI Network Firewall (OCI NFW) is the cloud native solution that provides all of it. It is based on the industry-leading Nextgen firewall solution by Palo Alto (VM-Series). Refer to the Annex for more best practices around deployment models.*
576
588
577
589
### Operations (Optional)
578
590
@@ -660,7 +672,7 @@ Oracle Cloud Infrastructure (OCI) is designed to protect customer workloads with
660
672
661
673
Cloud computing is fundamentally different from traditionally on-premises computing. In the traditional model, organizations are typically in full control of their technology infrastructure located on-premises (e.g., physical control of the hardware, and full control over the technology stack in production). In the cloud, organizations leverage resources and practices that are under the control of the cloud service provider, while still retaining some control and responsibility over other components of their IT solution. As a result, managing security and privacy in the cloud is often a shared responsibility between the cloud customer and the cloud service provider. The distribution of responsibilities between the cloud service provider and customer also varies based on the nature of the cloud service (IaaS, PaaS, SaaS).
662
674
663
-
# Additional Resources
675
+
##Additional Resources
664
676
-[Oracle Cloud Compliance](https://www.oracle.com/corporate/cloud-compliance/) – Oracle is committed to helping customers operate globally in a fast-changing business environment and address the challenges of an ever more complex regulatory environment. This site is a primary reference for customers on Shared Management Model with Attestations and Advisories.
665
677
-[Oracle Security Practices](https://www.oracle.com/corporate/security-practices/) – Oracle’s security practices are multidimensional, encompassing how the company develops and manages enterprise systems, and cloud and on-premises products and services.
@@ -709,8 +721,20 @@ The below questions help to identify networking requirements.
709
721
710
722
## Security and Access Control
711
723
724
+
<!--
712
725
- Are you familiar with the concept of Next-Generation Firewalls (NGFW) and their benefits over traditional firewalls?
713
726
- Have you considered the importance of protecting your web applications from potential cyber threats using a Web Application Firewall (WAF)?
727
+
-->
728
+
729
+
- Some of the below questions help you to adopt the right sizing and deployment model of the network firewall.
730
+
- Does the customer need to protect traffic from VCN to VCN?
731
+
- Does the customer need to protect traffic from subnet to subnet in the same VCN?
732
+
- When deploying an OCI Network Firewall in a dedicated HUB or secure VCN, do you want to protect inter-VCN traffic and/or inter-subnet traffic from within the same VCN?
733
+
- Does the customer need to protect incoming or egressing traffic to the internet?
734
+
- Does the customer need to protect internal traffic (including on-premises via IPSEC/FC)?
735
+
- Is the network performance critical?
736
+
- Does the customer have any requirement on network isolation (i.e., internet traffic never traverses or is mixed with internal traffic)?
737
+
- Have you considered the importance of protecting your web applications from potential cyber threats using a Web Application Firewall (WAF)?
Copy file name to clipboardExpand all lines: cloud-architecture/oracle-apps-hyperion-siebel-gbu/gbu/financial-services/flexcube-solution-definition/README.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
3
3
This repository contains an in-depth guide for Oracle Flexcube migration projects. It offers a high-level solution definition for migrating or establishing Flexcube Workloads on Oracle Cloud Infrastructure (OCI). With a comprehensive representation of the current state, prospective state, potential project scope, and anticipated timeline, this document aims to provide a precise understanding of the project's scope and intention to all participating entities.
Copy file name to clipboardExpand all lines: cloud-architecture/oracle-apps-hyperion-siebel-gbu/gbu/financial-services/flexcube-solution-definition/files/flexcube-solution-definition.md
+30-4
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,8 @@ Version | Author | Date | Comment
18
18
:--- |:--- |:--- |:---
19
19
0.1 | Name | June 12th, 2023 | Updates to network design
20
20
1.0 | Name | June 13th, 2023 | Updates to HA design
21
-
2.2 | Name | October 25th, 2023 | Updates to Annex
21
+
2.4 | Name | February 26th, 2024 | Added the network firewall in the requirement, the solution considerations and in the Annex.
22
+
22
23
23
24
## Team
24
25
@@ -355,10 +356,22 @@ At the time of this document creation, no Security requirements have been specif
355
356
356
357
*Capture the Non-Functional Requirements for networking-related topics. You can use the networking questions in the [Annex](#networking-requirement-considerations)*
357
358
359
+
*As businesses increasingly rely on Cloud Infrastructure to store, process, and transmit sensitive data, the need for comprehensive security solutions has never been more important. Potential customers evaluating network security solutions typically prioritize the following requirements: Some of the broader category considerations are below.*
360
+
361
+
-*Data Protection: Safeguarding sensitive information against unauthorized access, theft, or modification is a primary concern for any organization and industry today.*
362
+
-*Threat Prevention: Advanced capabilities like IDPS and malware detection for blocking threats.*
363
+
-*Data Loss Prevention (DLP): Monitoring and controlling sensitive data transmission.*
364
+
-*Encryption and Decryption: Inspecting encrypted traffic without compromising privacy.*
365
+
-*Threat Prevention: Proactively identifying and mitigating security threats is essential for maintaining the integrity of network infrastructure. *
366
+
-*Intrusion Detection and Prevention: Monitoring for suspicious or malicious activity.*
367
+
-*Application Control: Granular control over specific applications or services.*
368
+
-*URL Filtering: Controlling access to permitted URLs.*
369
+
-*Security compliance: Does your organization have network security requirements based on industry or organization compliance? For example - SAMA (Saudi Arabia Monetary Authority), HIPAA (Health Insurance Portability and Accountability Act), GDPR (General Data Protection Regulation), SWIFT, etc.*
370
+
371
+
358
372
*Example:*
359
373
360
374
At the time of this document creation, no Networking requirements have been specified.
361
-
362
375
### Integration and Interfaces (Optional)
363
376
364
377
*Guide:*
@@ -615,7 +628,7 @@ Please see our security guidelines in the [Annex](#security-guidelines).
615
628
616
629
*Reference:*
617
630
618
-
*A list of possible Oracle solutions can be found in the [Annex](#networking-solutions).*
631
+
*If your customers have any or one of the needs described in the guide of the [Network Requirements](#networking-requirements), then the OCI Network Firewall (OCI NFW) is the cloud native solution that provides all of it. It is based on the industry-leading Nextgen firewall solution by Palo Alto (VM-Series). Refer to the Annex for more best practices around deployment models.*
619
632
620
633
621
634
### Operations (Optional)
@@ -741,7 +754,7 @@ Oracle Cloud Infrastructure (OCI) is designed to protect customer workloads with
741
754
742
755
Cloud computing is fundamentally different from traditionally on-premises computing. In the traditional model, organizations are typically in full control of their technology infrastructure located on-premises (e.g., physical control of the hardware, and full control over the technology stack in production). In the cloud, organizations leverage resources and practices that are under the control of the cloud service provider, while still retaining some control and responsibility over other components of their IT solution. As a result, managing security and privacy in the cloud is often a shared responsibility between the cloud customer and the cloud service provider. The distribution of responsibilities between the cloud service provider and customer also varies based on the nature of the cloud service (IaaS, PaaS, SaaS).
743
756
744
-
# Additional Resources
757
+
##Additional Resources
745
758
-[Oracle Cloud Compliance](https://www.oracle.com/corporate/cloud-compliance/) – Oracle is committed to helping customers operate globally in a fast-changing business environment and address the challenges of an ever more complex regulatory environment. This site is a primary reference for customers on Shared Management Model with Attestations and Advisories.
746
759
-[Oracle Security Practices](https://www.oracle.com/corporate/security-practices/) – Oracle’s security practices are multidimensional, encompassing how the company develops and manages enterprise systems, and cloud and on-premises products and services.
@@ -790,8 +803,21 @@ The below questions help to identify networking requirements.
790
803
791
804
## Security and Access Control
792
805
806
+
<!--
793
807
- Are you familiar with the concept of Next-Generation Firewalls (NGFW) and their benefits over traditional firewalls?
794
808
- Have you considered the importance of protecting your web applications from potential cyber threats using a Web Application Firewall (WAF)?
809
+
-->
810
+
811
+
- Some of the below questions help you to adopt the right sizing and deployment model of the network firewall.
812
+
- Does the customer need to protect traffic from VCN to VCN?
813
+
- Does the customer need to protect traffic from subnet to subnet in the same VCN?
814
+
- When deploying an OCI Network Firewall in a dedicated HUB or secure VCN, do you want to protect inter-VCN traffic and/or inter-subnet traffic from within the same VCN?
815
+
- Does the customer need to protect incoming or egressing traffic to the internet?
816
+
- Does the customer need to protect internal traffic (including on-premises via IPSEC/FC)?
817
+
- Is the network performance critical?
818
+
- Does the customer have any requirement on network isolation (i.e., internet traffic never traverses or is mixed with internal traffic)?
819
+
- Have you considered the importance of protecting your web applications from potential cyber threats using a Web Application Firewall (WAF)?
Copy file name to clipboardExpand all lines: cloud-architecture/oracle-apps-hyperion-siebel-gbu/hyperion-essbase/README.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ These resources aim to offer guidance throughout your migration, enabling you to
6
6
7
7
Explore these materials to enhance your migration strategy. We appreciate your participation and are committed to supporting your cloud migration journey.
8
8
9
-
Reviewed: 4.12.2023
9
+
Reviewed: 7.2.2024
10
10
11
11
# Table of Contents
12
12
@@ -22,8 +22,8 @@ Reviewed: 4.12.2023
22
22
23
23
# Useful Links
24
24
25
+
-[EPM System Release 11.2.16 announcement](https://blogs.oracle.com/proactivesupportepm/post/enterprise-performance-management-epm-11216-is-available)
25
26
-[Essbase 21.5 New Features and Enhancements YouTube Playlist](https://www.youtube.com/playlist?list=PLdtXkK5KBY57davwRTIGtDn05A9N4ybrI)
26
-
-[EPM System Release 11.2.15 announcement](https://blogs.oracle.com/proactivesupportepm/post/enterprise-performance-management-epm-11215-is-available)
Copy file name to clipboardExpand all lines: cloud-architecture/oracle-apps-hyperion-siebel-gbu/hyperion-essbase/essbase-discovery-questionnaire/README.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
3
3
This document serves as a standard questionnaire designed to gather crucial information necessary for the execution of Essbase application migration projects. It captures specific data that aids in estimating the effort required for a successful migration.
Copy file name to clipboardExpand all lines: cloud-architecture/oracle-apps-hyperion-siebel-gbu/hyperion-essbase/essbase-solution-definition/README.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ This document serves as an integral asset for individuals and organizations seek
10
10
11
11
Use this document as a starting point for the solution definition of your Essbase implementation project. This asset includes example architecture diagrams for DrawIO in the file essbase-architecture-diagrams-example.drawio.
12
12
13
-
Reviewed: 4.12.2023
13
+
Reviewed: 27.2.2024
14
14
15
15
## Conclusion
16
16
The Essbase Workload Solution Definition is expected to serve as a definitive guide to the project. All participants are encouraged to provide feedback, raise queries, and make contributions to enhance the overall project's success.
0 commit comments