Authorization

All requests to access Oracle Cloud Infrastructure resources are authenticated based on the provided credentials and authorized based on IAM policies that you define, as shown in the following graphic:



Use the following checklist to manage authorization:

Done? Security Controls and Recommendations
Check box Map IAM groups to your organization’s functional roles.
Check box Create IAM groups based on the permissions required.
Check box Write appropriate IAM policies for IAM groups.
Check box Add users to relevant IAM groups.
Check box When assigning IAM permissions for users and instances, follow the principles of least privilege and separation of duties.

The following graphic shows the syntax of a policy statement, the supported policy verbs, and a few examples of the resource types. For a full list of the supported resource types, see Policy Reference.