Configure Access Control Lists When You Provision or Clone an Instance
When you provision or clone Autonomous Database with the Secure access from allowed IPs and VCNs only option, you can restrict network access by defining an Access Control List (ACL).
See Provision Autonomous Database for information on provisioning your Autonomous Database.
Configure one ore more Access Control Rules (ACLs), as follows:
After provisioning completes, you can update public endpoint ACLs or you can change the Autonomous Database configuration to use a private endpoint.
See Configure Access Control Lists for an Existing Autonomous Database Instance for information on updating ACLs.
See Change from Public to Private Endpoints with Autonomous Database for information on changing to a private endpoint.