You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This document provides a high-level solution definition for the Oracle solution and aims at describing the current state, and to-be state as well as a potential high-level project scope and timeline for ${doc.config.impl.type}.
36
+
This document provides a high-level solution definition for the Oracle solution and aims at describing the current state, and to-be state as well as a potential high-level project scope and timeline for \<Service Provider\>.
36
37
37
38
The document may refer to a ‘Workload’, which summarizes the full technical solution for a customer (You) during a single engagement. The Workload is described in the chapter [Workload Requirements and Architecture](#workload-requirements-and-architecture).
38
39
39
-
This is a living document, additional sections will be added as the engagement progresses resulting in a final Document to be handed over to the ${doc.config.impl.type}.
40
+
This is a living document, additional sections will be added as the engagement progresses resulting in a final Document to be handed over to the \<Service Provider\>.
40
41
41
42
# Business Context
42
43
@@ -242,11 +243,17 @@ Implementation Partner will capture the current PeopleSoft workload sizing here.
242
243
243
244
The recovery time objective (downtime tolerance) and recovery point objective (data loss tolerance) details are very important considerations for the Customer. The overall DR requirement is a cross region DR strategy with the goal of minimizing RTO.
244
245
245
-
#### Backup and Recovery Practices
246
+
#### Reliability and Resilience
246
247
247
248
*Guide:*
248
249
249
-
*A section describing the Current PeopleSoft workload of the Customer: Backup and Recovery- RTO and RPO*
250
+
*This section captures the resilience and recovery requirements for the Workload. Note that these may be different from the current system.*
251
+
252
+
*The Recovery Point Objective (RPO) and Recovery Time Objective (RTO) requirement of each environment should be captured in the environments section above, and wherever possible.*
253
+
254
+
-*What are the RTO and RPO requirements of the Application?*
255
+
-*What are the SLAs of the application?*
256
+
-*What are the backup requirements*
250
257
251
258
*Example:*
252
259
@@ -280,6 +287,28 @@ In general, the foundation of security is access control, which refers to how th
280
287
281
288
At the time of this document creation, no Security requirements have been specified.
282
289
290
+
### Networking Requirements
291
+
292
+
*Guide*
293
+
294
+
*Capture the Non-Functional Requirements for networking-related topics. You can use the networking questions in the [Annex](#networking-requirement-considerations)*
295
+
296
+
*As businesses increasingly rely on Cloud Infrastructure to store, process, and transmit sensitive data, the need for comprehensive security solutions has never been more important. Potential customers evaluating network security solutions typically prioritize the following requirements: Some of the broader category considerations are below.*
297
+
298
+
-*Data Protection: Safeguarding sensitive information against unauthorized access, theft, or modification is a primary concern for any organization and industry today.*
299
+
-*Threat Prevention: Advanced capabilities like IDPS and malware detection for blocking threats.*
300
+
-*Data Loss Prevention (DLP): Monitoring and controlling sensitive data transmission.*
301
+
-*Encryption and Decryption: Inspecting encrypted traffic without compromising privacy.*
302
+
-*Threat Prevention: Proactively identifying and mitigating security threats is essential for maintaining the integrity of network infrastructure. *
303
+
-*Intrusion Detection and Prevention: Monitoring for suspicious or malicious activity.*
304
+
-*Application Control: Granular control over specific applications or services.*
305
+
-*URL Filtering: Controlling access to permitted URLs.*
306
+
-*Security compliance: Does your organization have network security requirements based on industry or organization compliance? For example - SAMA (Saudi Arabia Monetary Authority), HIPAA (Health Insurance Portability and Accountability Act), GDPR (General Data Protection Regulation), SWIFT, etc.*
307
+
308
+
*Example:*
309
+
310
+
At the time of this document creation, no Networking requirements have been specified.
311
+
283
312
### Workload Access Requirement
284
313
285
314
*Guide:*
@@ -341,16 +370,6 @@ The OEM product includes the Management Agent, Oracle Management Service, Manage
341
370
| Log Management | All targets | OCI (Migration) | No ||
342
371
| Insight | All Oracle DBs | OCI (Migration) | No ||
343
372
344
-
### Networking Requirements
345
-
346
-
*Guide*
347
-
348
-
*Capture the Non-Functional Requirements for networking-related topics. You can use the networking questions in the [Annex](#networking-requirement-considerations)*
349
-
350
-
*Example:*
351
-
352
-
At the time of this document creation, no Networking requirements have been specified.
353
-
354
373
## Future State Architecture
355
374
356
375
*Guide:*
@@ -359,21 +378,23 @@ At the time of this document creation, no Networking requirements have been spec
359
378
360
379
*Additional architectures, in the subsections, can be used to describe needs for specific workloads.*
361
380
362
-
### Mandatory Security Best Practices
381
+
### Solution Best Practices
382
+
383
+
**Mandatory Security Best Practices**
363
384
364
385
*Guide:*
365
386
366
387
*Use this text for every engagement. Do not change. Align with the Cloud Adoption Framework.*
367
388
368
-
The safety of the ${doc.customer.name}'s Oracle Cloud Infrastructure (OCI) environment and data is the ${doc.customer.name}’s priority.
389
+
The safety of the \<Customer Name\>'s Oracle Cloud Infrastructure (OCI) environment and data is the \<Customer Name\>’s priority.
369
390
370
391
The following table of OCI Security Best Practices lists the recommended topics to provide a secure foundation for every OCI implementation. It applies to new and existing tenancies and should be implemented before the Workload defined in this document will be implemented.
371
392
372
393
Workload-related security requirements and settings like tenancy structure, groups, and permissions are defined in the respective chapters.
373
394
374
-
Any deviations from these recommendations needed for the scope of this document will be documented in the chapters below. They must be approved by ${doc.customer.name}.
395
+
Any deviations from these recommendations needed for the scope of this document will be documented in the chapters below. They must be approved by \<Customer Name\>.
375
396
376
-
${doc.customer.name} is responsible for implementing, managing, and maintaining all listed topics.
397
+
\<Customer Name\> is responsible for implementing, managing, and maintaining all listed topics.
377
398
378
399
<tablestyle="width:25%;">
379
400
<colgroup>
@@ -382,14 +403,14 @@ ${doc.customer.name} is responsible for implementing, managing, and maintaining
382
403
<colstyle="width: 19%" />
383
404
</colgroup>
384
405
<thead>
385
-
<trclass="header">
406
+
<tr>
386
407
<th>CATEGORY</th>
387
408
<th>TOPIC</th>
388
409
<th>DETAILS</th>
389
410
</tr>
390
411
</thead>
391
412
<tbody>
392
-
<trclass="odd">
413
+
<tr>
393
414
<td>User Management</td>
394
415
<td>IAM Default Domain</td>
395
416
<td><p>Multi-factor Authentication (MFA) should be enabled and enforced for every non-federated OCI user account.</p>
@@ -401,7 +422,7 @@ ${doc.customer.name} is responsible for implementing, managing, and maintaining
401
422
<li>For configuration details see <ahref="https://docs.oracle.com/en-us/iaas/Content/Identity/adaptivesecurity/overview.htm">Managing Adaptive Security and Risk Providers</a>.</li>
402
423
</ul></td>
403
424
</tr>
404
-
<trclass="even">
425
+
<tr>
405
426
<td></td>
406
427
<td>OCI Emergency Users</td>
407
428
<td><p>A maximum of <strong>three</strong> non-federated OCI user accounts should be present with the following requirements:</p>
@@ -413,7 +434,7 @@ ${doc.customer.name} is responsible for implementing, managing, and maintaining
413
434
<li>Has MFA enabled and enforced (see IAM Default Domain).</li>
414
435
</ul></td>
415
436
</tr>
416
-
<trclass="odd">
437
+
<tr>
417
438
<td></td>
418
439
<td>OCI Administrators</td>
419
440
<td><p>Daily business OCI Administrators are managed by the Customer’s Enterprise Identity Management System. This system is federated with the IAM Default Domain following these configuration steps:</p>
@@ -423,12 +444,12 @@ ${doc.customer.name} is responsible for implementing, managing, and maintaining
423
444
<li>For configuration guidance for major Identity Providers see the OCI IAM Identity Domain tutorials.</li>
424
445
</ul></td>
425
446
</tr>
426
-
<trclass="even">
447
+
<tr>
427
448
<td></td>
428
449
<td>Application Users</td>
429
450
<td>Application users like OS users, Database users, or PaaS users are not managed in the IAM Default Domain but either directly or in dedicated identity domains. These identity domains and users are covered in the Workload design. For additional information see <ahref="https://docs.oracle.com/en-us/iaas/Content/cloud-adoption-framework/iam-security-structure.htm">Design Guidance for IAM Security Structure</a>.</td>
430
451
</tr>
431
-
<trclass="odd">
452
+
<tr>
432
453
<td>Cloud Posture Management</td>
433
454
<td>OCI Cloud Guard</td>
434
455
<td><p>OCI Cloud Guard will be enabled at the root compartment of the tenancy home region. This way it covers all future extensions, like new regions or new compartments, of your tenancy automatically. It will use the Oracle Managed Detector and Responder recipes at the beginning and can be customized by the Customer to fulfill the Customer’s security requirements.</p>
@@ -437,20 +458,20 @@ ${doc.customer.name} is responsible for implementing, managing, and maintaining
437
458
<li>For configuration details see <ahref="https://docs.oracle.com/en-us/iaas/cloud-guard/using/part-customize.htm">Customizing Cloud Guard Configuration</a></li>
438
459
</ul></td>
439
460
</tr>
440
-
<trclass="even">
461
+
<tr>
441
462
<td></td>
442
463
<td>OCI Vulnerability Scanning Service</td>
443
464
<td><p>In addition to OCI Cloud Guard, the OCI Vulnerability Scanning Service will be enabled at the root compartment in the home region. This service provides vulnerability scanning of all Compute instances once they are created.</p>
444
465
<ul>
445
466
<li>For configuration details see <ahref="https://docs.oracle.com/en-us/iaas/scanning/home.htm">Vulnerability Scanning</a>.</li>
446
467
</ul></td>
447
468
</tr>
448
-
<trclass="odd">
469
+
<tr>
449
470
<td>Monitoring</td>
450
471
<td>SIEM Integration</td>
451
472
<td>Continuous monitoring of OCI resources is key for maintaining the required security level (see <ahref="#regulations-and-compliances-requirements">Regulations and Compliance</a> for specific requirements). See <ahref="https://docs.oracle.com/en-us/iaas/Content/cloud-adoption-framework/siem-integration.htm">Design Guidance for SIEM Integration</a> to implement integration with the existing SIEM system.</td>
452
473
</tr>
453
-
<trclass="even">
474
+
<tr>
454
475
<td>Additional Services</td>
455
476
<td>Budget Control</td>
456
477
<td><p>OCI Budget Control provides an easy-to-use and quick notification on changes in the tenancy’s budget consumption. It will be configured to quickly identify unexpected usage of the tenancy.</p>
@@ -501,30 +522,25 @@ In the **following sections** we are describing the **Solution Design Diagrams f

518
536
519
-
```{=tex}
520
537
\pagebreak
521
-
```
538
+
522
539

523
540
524
-
```{=tex}
525
541
\pagebreak
526
-
```
527
-
## Solutions Considerations
542
+
543
+
###Solutions Considerations
528
544
529
545
*Guide:*
530
546
@@ -538,7 +554,7 @@ Proposed deployment plan is to move PeopleSoft PeopleTools **(8.59.21)** and Peo
538
554
539
555
We can leverage OCI Web Application Firewall (WAF) which helps to make the application endpoints more secure by monitoring and filtering out potentially malicious traffic. It is also cloud-based, Payment Card Industry (PCI) compliant.
540
556
541
-
### High Availability and Disaster Recovery
557
+
**Reliability and Resilience:**
542
558
543
559
*Guide:*
544
560
@@ -554,19 +570,15 @@ Please refer to the following high level MAA diagrams for PepleSoft workload.
554
570
555
571

556
572
557
-
```{=tex}
558
573
\pagebreak
559
-
```
574
+
560
575

561
576
562
577
*Reference:*
563
578
564
579
[HA Reference for PeopleSoft](https://www.oracle.com/a/tech/docs/psft-maa-exacs-tech-brief.pdf)
565
580
566
-
```{=tex}
567
-
\pagebreak
568
-
```
569
-
#### Backup and Recovery
581
+
**Backup and Recovery:**
570
582
571
583
*Guide:*
572
584
@@ -579,7 +591,7 @@ We will follow the current Backup and Recovery strategy and practices of the Cus
579
591
- Official RTO practices: less than 24 hrs
580
592
- Official RPO practices: 4 hours
581
593
582
-
### Security
594
+
**Security:**
583
595
584
596
*Guide:*
585
597
@@ -621,7 +633,7 @@ Please note:**WAF policy** is a **regional solution** that works as a plug-in fo
621
633
622
634
\_\_Note:\_\_Please see generic OCI security guidelines in the [Annex](#security-guidelines).
623
635
624
-
### Workload Access
636
+
**Workload Access:**
625
637
626
638
*Guide:*
627
639
@@ -631,7 +643,7 @@ Please note:**WAF policy** is a **regional solution** that works as a plug-in fo
631
643
632
644
Customer will access the PeopleSoft workload internally over the OCI FastConnect connectivity solution and PeopleSoft external endpoints will be secured by OCI WAF. FastConnect is a private, dedicated connectivity that improves security. It supports bandwidths from 1Gbps to 10Gbps. An alternative option to FastConnect is Virtual Private Network (VPN). VPN could also be a backup configuration if FastConnect is down.
633
645
634
-
### Workload Monitoring
646
+
**Workload Monitoring:**
635
647
636
648
*Guide:*
637
649
@@ -645,7 +657,7 @@ Customer will use 'Enterprise Manager Plug-in' for PeopelSoft to monitor their P
645
657
646
658
[Use OEM data with OCI to unlock new insights](https://blogs.oracle.com/observability/post/em-data-to-oci-part-1)[OCI Stack Monitoring for PeopleSoft](https://blogs.oracle.com/observability/post/stack-monitoring-now-supports-windows-server-solaris-and-peoplesoft-process-monitor-and-elasticsearch)
647
659
648
-
### Manageability and Observability (OCI)
660
+
**Manageability and Observability (OCI):**
649
661
650
662
*Example:*
651
663
@@ -699,7 +711,7 @@ Cost control and chargeback are critical concerns, especially for companies tran
699
711
700
712
Please find all references for this chapter in the [Annex](#cost-control-and-chargeback-annex).
701
713
702
-
### Regulations and Compliances
714
+
**Regulations and Compliances:**
703
715
704
716
*Guide:*
705
717
@@ -709,15 +721,15 @@ Please find all references for this chapter in the [Annex](#cost-control-and-cha
709
721
710
722
None has been discussed at the time of Migration.
711
723
712
-
### Cloud Manger - PeopleSoft Automation Tool
724
+
**Cloud Manger - PeopleSoft Automation Tool:**
713
725
714
726
*Guide:*
715
727
716
728
*A section describing the Cloud Manager Tooling for PeopleSoft Workload*
717
729
718
730
*Example:*
719
731
720
-
#### What is PCM
732
+
**What is PCM:**
721
733
722
734
- Oracle PCM is a key component of the Oracle PeopleSoft **automation** for OCI.
723
735
@@ -727,7 +739,7 @@ None has been discussed at the time of Migration.
727
739
728
740
- This is Oracle’s recommended way to deploy PeopleSoft on OCI.
729
741
730
-
#### Requirements for PCM
742
+
**Requirements for PCM:**
731
743
732
744
- See the PeopleTools support information on PCM Home Page **(My Oracle Support, Doc ID 2231255.2)**.
733
745
@@ -737,7 +749,7 @@ None has been discussed at the time of Migration.
Using CM, one can provision a new environment or can perform a 'lift-and-shift' as depicted in the diagram below:
743
755
@@ -751,7 +763,7 @@ How PeopleSoft CM can help to migrate PeopleSoft workload to OCI is depicted in
751
763
752
764
- Another scenario could be to move Customer Workload and/or other Solution components 'as-is' to OCI using Rackware or similar tool.
753
765
754
-
###Networking
766
+
**OCI Networking:**
755
767
756
768
*Guide:*
757
769
@@ -1025,3 +1037,19 @@ The observability and management services include the following services:
1025
1037
|**Ops Insights Capacity Planning**| This OCI-managed service allows one to predict the resource consumption for a year. With tags, you can associate the forecast and the consumption to a specific department. |[Operations Insight Capacity Planning](https://docs.oracle.com/en-us/iaas/operations-insights/doc/operations-insights.html#GUID-B2A3E104-494B-46A5-9F3E-8E3977C9328F)|
1026
1038
|**Cost Analysis**| Cost Analysis is an easy-to-use visualization tool to help you track and optimize your Oracle Cloud Infrastructure spending. It allows for the generation of charts and the download of accurate and reliable tabular reports of aggregated cost data. With tags, you can associate the forecast and the consumption to a specific department. |[OCI Cost Analysis](https://docs.oracle.com/en-us/iaas/Content/Billing/Concepts/costanalysisoverview.htm)`</br>`{=html} |
1027
1039
|**Usage RestAPI**| OCI offers various RestAPI’s to manage services, including the one for cost management. |[OCI Usage RestAPI](https://docs.oracle.com/en-us/iaas/Content/Billing/Concepts/costanalysisoverview.htm#cost_analysis_using_the_api)`</br>`{=html} |
1040
+
1041
+
## Onboarding
1042
+
1043
+
Oracle offers a comprehensive onboarding program for new customers, designed to facilitate their initial journey within the OCI (Oracle Cloud Infrastructure) environment. The [OCI Digital Onboarding Home](https://github.com/oracle-devrel/oci-hub/wiki/OCI-Digital-Onboarding-Home) is an excellent starting point for customers to familiarize themselves with OCI. This resource provides a self-guided learning path covering essential aspects such as initial access, cloud console navigation, fundamental resource creation, and implementing security best practices.
1044
+
1045
+
The onboarding process continues with a self-service kick-off workshop, tailored for EMEA customers, which includes an extensive playbook. This workshop delves deeper into various topics:
1046
+
1047
+
- An introduction to OCI and its features.
1048
+
- A step-by-step guide to getting started.
1049
+
- A guided tour of the platform.
1050
+
- An overview of live lab sandbox environments for hands-on practice.
1051
+
- Comprehensive best practices encompassing security, reliability, performance optimization, cost management, and monitoring strategies.
1052
+
- A support guide to assist customers with any queries or issues.
1053
+
- A satisfaction survey to gather feedback and ensure an optimal user experience.
1054
+
1055
+
This structured approach ensures that new customers receive a well-rounded introduction to OCI, empowering them to make the most of their new tenancy.
0 commit comments