Security Design: Quick Links
Whether you're a security architect, a security administrator, or in security operations, Oracle Cloud Infrastructure (OCI) provides detailed security documentation and resources to support your role.
The following table helps you to quickly navigate to our most popular security resources.
- The Services column is a collection of OCI cloud-native security services and tools. These tools were designed and built as cloud services to help you achieve and maintain your target security posture. There's an assortment of tools to help you manage the security components at each layer of technology.
- The Best Practices Framework for OCI column provides architectural guidance about how to build OCI services in a secure fashion, based on recommendations in the Best practices framework for Oracle Cloud Infrastructure. Topics cover all security layers, and discuss recommended designs and configurations, including how best to apply OCI security tooling.
- The Security Guide column includes links to documentation in the Oracle Cloud Infrastructure Security Guide. The Security Guide provides detailed instructions about how to deploy and implement security functionality across OCI resources. Review the security guide with your organization's architect and operations teams in the planning phase of your implementation.
Services | Best Practices Framework for OCI | Security Guide |
---|---|---|
General concepts and architecture | About Effective Strategies for Security and Compliance | |
Tenancy and Oracle Cloud Infrastructure Identity and Access Management |
Manage Identities and Authorization Policies | |
Data security |
Database Storage Integration and management |
|
Platform and infrastructure security |
Isolate Resources and Control Access |
Platform operations Compute resources |
Network security |
Ensure Secure Network Access | |
Application security |
||
Security operations |
Optimize the Security Posture of Your Environment |
Securing Vulnerability Scanning Critical Patch Updates, Security Alerts and Bulletins |
Legal, risk, and compliance |
Monitor and Audit Your Environment Integration with third-party security information and event management (SIEM) solutions, such as Splunk and QRadar |
- |