Typical Workflow for Maintaining Secure Configuration Settings
With Oracle CASB Cloud Service, you can monitor most cloud services for weak or non-compliant security configurations.
Task | Description | Additional Information |
---|---|---|
Understand security configuration monitoring. | You can learn about how Oracle CASB Cloud Service can help maintain security configurations for a cloud app or service. | About Security Configuration Monitoring |
Manage security controls. | You can manage alerts that Oracle CASB Cloud Service generates when it detects non-conforming security configuration values. | Managing Weak or Noncompliant Security Controls |
Manage suspicious IP addresses. | You can use Oracle CASB Cloud Service to monitor for suspicious IP addresses and address ranges, and whitelist or blacklist them. | Putting IP Addresses on Blacklists or Whitelists |
Push security control values. | You can have Oracle CASB Cloud Service set configuration values in an AWS. | Pushing Security Control Values to an Application Instance |