Security Features Overview

Describes some of the robust security features that Autonomous Database provides.

Autonomous Database security features include:

  • Autonomous Database meets a broad set of international and industry-specific compliance standards, and as part of Oracle Cloud Infrastructure Autonomous Database has achieved attestations for the common compliance frameworks providing an independent assessment of the service's security, privacy, and compliance controls.

    See Regulatory Compliance Certification for more information.

  • Autonomous Database applies security patches automatically as soon as they become available.

    See Configuration Management for more information.

  • Autonomous Database is governed by the Oracle Cloud Hosting and Delivery Policies which explain the Oracle Cloud Security Policy. See the Delivery Policies area on Oracle Contracts for more information.

  • Autonomous Database is subject to the Oracle Cloud Security Testing policy, which describes when and how you may conduct certain types of security testing of Oracle Cloud Infrastructure services, including vulnerability and penetration tests and tests involving data scraping tools.

    See Security Testing Policies on Autonomous Database for more information.

  • Autonomous Database provides end-to-end encryption out of the box for the database, backups, and all network communication. All your data, including backups, are encrypted with AES256. You can use Oracle-managed or customer-managed keys to encrypt your data.

    See Manage Encryption Keys on Autonomous Database for more information.

  • All network connections are encrypted using TLS 1.2. You can use mutual TLS or one-way TLS connections.

  • Autonomous Database provides several options to control client access to your database. You can use public endpoints with access control lists to specify which clients can connect. You can also use private endpoints to place the database in your VCN and use security lists and network security groups to control access to the database.

    See Client Access Control for more information.

  • Autonomous Database provides fully automated immutable backups that cannot be tampered with by the users in your tenancy.

    See About Backup and Recovery on Autonomous Database for more information.

  • Autonomous Database provides several user authentication methods. You can use local database user names and passwords or external authentication methods, including:

    • Oracle Cloud Infrastructure Identity and Access Management

    • Microsoft Active Directory

    • Azure Active Directory

    • Kerberos

    See Manage Users for more information.

  • You can configure Oracle Database Vault to control access to specific schemas from privileged database users such as the ADMIN user.

    See Use Oracle Database Vault with Autonomous Database for more information,

  • Autonomous Database provides robust auditing capabilities that enable you to track who did what on the service and on specific databases. You can configure database auditing to audit all actions, such as access to specific objects, schema changes, logons by specific users, and much more.

    See Auditing Overview on Autonomous Database for more information.

  • Oracle Cloud Operators do not have authorization to access your data or any other information in your database schemas. When access to your database schemas is required to troubleshoot or mitigate an issue, you can allow a cloud operator to access your Autonomous Database schemas for a limited time.

    See Manage Oracle Cloud Operator Access for more information.

See Security and Authentication in Oracle Autonomous Database for more information.