Oracle Cloud Infrastructure Documentation


Skip to main content

Security Design: Quick Links

Whether you're a security architect, a security administrator, or in security operations, Oracle Cloud Infrastructure (OCI) provides detailed security documentation and resources to support your role.

The following table helps you to quickly navigate to our most popular security resources.

  • The Services column is a collection of OCI cloud-native security services and tools. These tools were designed and built as cloud services to help you achieve and maintain your target security posture. There's an assortment of tools to help you manage the security components at each layer of technology.
  • The Best Practices Framework for OCI column provides architectural guidance about how to build OCI services in a secure fashion, based on recommendations in the Best practices framework for Oracle Cloud Infrastructure. Topics cover all security layers, and discuss recommended designs and configurations, including how best to apply OCI security tooling.
  • The Security Guide column includes links to documentation in the Oracle Cloud Infrastructure Security Guide. The Security Guide provides detailed instructions about how to deploy and implement security functionality across OCI resources. Review the security guide with your organization's architect and operations teams in the planning phase of your implementation.
Services Best Practices Framework for OCI Security Guide
General concepts and architecture About Effective Strategies for Security and Compliance

Security Overview

Security Services

Tenancy and Oracle Cloud Infrastructure Identity and Access Management

  • Organization Management
  • IAM with Identity Domains
  • IAM without Identity Domains
Manage Identities and Authorization Policies

Securing Your Tenancy

Securing IAM

Security Credentials

Data security

  • Data Safe
  • Vault

Secure Your Databases

Protect Data at Rest

Database

  • Securing Database

Storage

  • Securing Block Volume
  • Securing File Storage
  • Securing Object Storage

Integration and management

  • Securing Data Transfer
  • Securing GoldenGate
  • Securing Data Integration
  • Securing Data Catalog

Platform and infrastructure security

  • Bastion
  • Shielded instances
  • OS Management
  • Oracle Autonomous Linux
Isolate Resources and Control Access

Platform operations

  • Security for Core Services
  • Securing Resource Manager
  • Securing Monitoring

Compute resources

  • Securing Compute
  • Securing Container Engine for Kubernetes

Network security

  • VCN security
  • Security lists and network security groups (NSGs)
  • Certificates
  • FastConnect with MACsec
  • DNS and Traffic Management
Ensure Secure Network Access
  • Securing Networking: VCN, Load Balancers, and DNS
  • Oracle Cloud Marketplace Security Partners

Application security

  • Web Application Firewall
  • Private access and endpoints
  • Container Registry image signing

Scanning Images for Vulnerabilities

Signing Images for Security

Enforcing the Use of Signed Images from Registry

Securing Email Delivery

Securing Notifications

Securing Service Connector Hub

Securing DevOps

Security operations

  • Cloud Guard
  • Security Advisor
  • Security Zones
  • Cloud Advisor
  • Vulnerability Scanning
Optimize the Security Posture of Your Environment

Securing Vulnerability Scanning

Securing Cloud Advisor

Critical Patch Updates, Security Alerts and Bulletins

Oracle Cloud Security Testing Policies

Oracle Cloud Security Responses to Vulnerabilities

Legal, risk, and compliance

  • Audit
  • Compliance Documents

Monitor and Audit Your Environment

Integration with third-party security information and event management (SIEM) solutions, such as Splunk and QRadar

-

Reference Implementation

  • Security checklist for Oracle Cloud Infrastructure
  • Self-Service Landing Zone
  • Cloud Adoption Framework Landing Zone

Explore More

  • Oracle Cloud Security Practices
  • Oracle Cloud Infrastructure Security Architecture
  • Oracle Cloud Security blog
  • A-Team Chronicles: Identity Access Management and Security
  • OCI Adoption Framework Thunder
  • Oracle Database Security Guide, Release 21
  • Security Design: Quick Links
  • Reference Implementation
  • Explore More
  • Copyright © 2022, Oracle and/or its affiliates.
  • About Oracle
  • Contact Us
  • Legal Notices
  • Terms of Use & Privacy
  • Document Conventions