Security - Support Documentation

Executive Summary

Security is a multi-faceted issue that requires comprehensive attention across all aspects of software development, deployment, and operations. We build secure software through a rigorous set of formal, continuously evolving security standards and practices that encompass every phase of the product development lifecycle.

To address SaaS security effectively, we have defined and categorized the many aspects of security into distinct domains that work together to create a robust security posture. This document outlines our comprehensive approach to SaaS security across the following categories:

1. Secure Product Engineering

Security Development Lifecycle Implementation

Our application development follows a rigorous Security Development Lifecycle (SDL) that integrates security considerations at every phase of the software development process. All development teams are required to complete security training and follow our secure coding standards before contributing to production systems.

Development Security Controls

Application Security Architecture

Our application architecture implements defense-in-depth security controls across all layers of the technology stack.

Security Architecture Components

Security Coding Standards

All code developed for our application adheres to established secure coding standards based on OWASP guidelines and industry best practices.

Coding Security Requirements

2. Secure Deployment

Infrastructure Security Implementation

Our deployment infrastructure operates on a zero-trust security model with multiple layers of protection. All infrastructure components are deployed using Infrastructure as Code (IaC) templates that incorporate security best practices and undergo security review before deployment.

Infrastructure Security Controls

Bastion hosts for secure administrative access with session recording and monitoring

Container and Orchestration Security

Pipeline Security Controls

Our CI/CD pipeline incorporates security controls at every stage to ensure that only secure, tested code reaches production environments.

Pipeline Security Controls

3. Secure Management

Standard Operating Procedures (SOPs)

Our application manages SaaS services based on a well-documented set of security-focused Standard Operating Procedures (SOPs). The SOPs provide direction and describe activities and tasks undertaken by Oracle’s personnel when delivering services to customers. SOPs are managed centrally and are available to authorized personnel through Oracle’s intranet on a need-to-know basis.

All SOPs undergo regular review and updates to ensure they remain current with evolving security requirements and industry best practices. Personnel are required to complete training on relevant SOPs and acknowledge their understanding before being granted access to systems or data.

Security Information and Event Management (SIEM)

All network devices, servers, operating systems, applications and databases underlying our product are configured to maintain comprehensive auditing and logging. All logs are forwarded to a Security Information and Event Management (SIEM) system. The SIEM is managed by the Security Engineering team and is monitored 24/7 by our Security Operations team.

The SIEM is configured to alert the Security Operations team regarding any conditions deemed to be potentially suspicious, for further investigation. Access given to review logs is restricted to a subset of security administrators and security operations personnel only. Log retention policies ensure that security-relevant logs are maintained for a minimum of one year, with critical security logs retained for up to seven years to support forensic investigations and compliance requirements.

Identity and Access Management (IAM) Implementation

Our comprehensive identity and access management program ensures secure authentication and authorization across all systems and applications. IAM controls are implemented at multiple layers to provide defense-in-depth protection.

IAM Components

Data Classification and Compliance Implementation

Our development information follows the Oracle standard security protocols.

Data Classification Framework

Compliance Data Handling

Link to Oracle Cloud Hosting and Delivery Policies

Physical Security Implementation

Our physical security program protects facilities, equipment, and personnel through comprehensive physical and environmental controls. All facilities housing critical systems implement multiple layers of physical protection.

Governance controls are in place to minimize the resources that are able to access systems. Physical security safeguards are further detailed in Oracle’s Cloud Hosting and Delivery Policies.

Link to Oracle Cloud Hosting and Delivery Policies

4. Assessment and Audit

Oracle Cloud meets all ISO/IEC 27002 Codes of Practice for Information Security Controls. Third Party Audit Reports and letters of compliance for Oracle Cloud Services are periodically published.

5. Data Protection and Privacy

Data Protection Implementation

Our data protection program implements comprehensive technical and organizational measures to protect personal data throughout its lifecycle. All personal data processing activities are documented and assessed for privacy impact.

Data Protection Controls

Encryption and Key Management Implementation

All sensitive data is protected using industry-standard encryption algorithms with centralized key management and regular key rotation procedures.

Privacy Rights Management

Our privacy program provides customers and data subjects with comprehensive rights management capabilities in compliance with global privacy regulations.

Privacy Rights Implementation:

6. Incident Response and Recovery

Service Recovery Metrics

The following recovery objectives have been established to ensure business continuity and minimize service disruption during adverse events.

Recovery Time Objective (RTO): 24 Hours

Oracle Cloud Policies and Pillar Documentation

Your order for this Oracle Cloud Service is subject to the Oracle Cloud Hosting and Delivery Policies and Oracle Industries Cloud Service Pillar Document, which may be viewed at the following link.

Oracle Cloud Service Contracts