Create IAM Policies for Oracle Data Safe Users

A tenancy administrator can create policies in Oracle Cloud Infrastructure Identity and Access Management (IAM) that grant users access to resources for Oracle Data Safe.

For more information about the resources and their permissions, see OCI Resources for Oracle Data Safe.

General Steps for Creating an IAM Policy for Oracle Data Safe

Follow these general steps to create an IAM policy that grants a user group permissions on Oracle Data Safe resources.

  1. As a tenancy administrator, from the navigation menu in Oracle Cloud Infrastructure, select Identity & Security, and then select Policies.

    The Policies page opens in Oracle Cloud Infrastructure Identity and Access Management (IAM).

  2. Next to Applied filters, select the compartment in which you want to store the policy. You can select the root compartment, if needed. A policy applies to the compartment it is defined in and all of its subcompartments.

  3. Click Create Policy.

    The Create Policy page opens.

  4. Enter a name for your policy. No spaces are allowed. Only letters, numerals, hyphens, periods, and underscores are allowed.

  5. Enter a brief description for your policy.

  6. Select a different compartment if needed.

  7. In the Policy Builder section, select Show manual editor.

    A box appears where you can enter policy statements.

  8. Enter one or more policy statements using the following syntax.

     Allow group <group-name> to <verb> <resource-type> in compartment <compartment-name>
    

    For <group-name>, enter the name of the IAM group to which the policy applies.

    For <verb>, you can use inspect, read, use, or manage.

    For <resource-type>, enter a resource that is used by Oracle Data Safe. For a list of resources, see OCI Resources for Oracle Data Safe.

    For <compartment>, enter the name of the compartment that contains the resources to which you want to grant permissions.

    To specify subcompartments in a policy statement, use the following syntax, where <parent-compartment> is the compartment under the root compartment and <child-compartment> is the compartment under the <parent-compartment>. You can add as many child compartments as needed separated by a colon.

     allow group <group-name> to <verb> <resource-type> in compartment <parent-compartment>:<child-compartment>
    
  9. To add tags, select Add Tag and configure tags.

  10. Select Create.

Create an Oracle Data Safe Administrators Group

A tenancy administrator can create an Oracle Data Safe administrators group in Oracle Cloud Infrastructure Identity and Access Management (IAM). The purpose of this group is to oversee and manage the Oracle Data Safe resources in a region.

  1. As a tenancy administrator, access IAM in Oracle Cloud Infrastructure.

  2. Create a group for Oracle Data Safe administrators and appropriate users to the group.

  3. Create a policy for the Oracle Data Safe administrators group that allows the group to manage the data-safe-family resource. The following examples show you different ways to do this.

    • Option 1: Allow the Data-Safe-Admins group to manage Oracle Data Safe resources across the entire tenancy.

      Allow group Data-Safe-Admins to manage data-safe-family in tenancy
      
    • Option 2: Allow the Data-Safe-Admins group to manage all types of Oracle Cloud Infrastructure resources in the tenancy (including Oracle Data Safe resources).

      Allow group Data-Safe-Admins to manage all-resources in tenancy
      
    • Option 3: Allow a Data-Safe-Admins group to manage all types of Oracle Data Safe resources in the us-phoenix-1 region of a tenancy.

      Allow group Data-Safe-Admins to manage data-safe-family in tenancy where request.region='phx'
      

Permission to Access all Resources of an Oracle Data Safe Feature

You can use an Oracle Data Safe family resource to quickly grant a user group permission on all resources for a particular Oracle Data Safe feature. For example, to grant a user group permission to perform all tasks in Data Masking, grant the user group the manage permission on the data-safe-masking-family resource. Family resources that pertain to specific features include data-safe-assessment-family (for Security Assessment and User Assessment), data-safe-discovery-family (for Data Discovery), data-safe-masking-family (for Data Masking), data-safe-alert-family (for Alerts), data-safe-audit-family (for Activity Auditing), and data-safe-family (for all features).

To grant a user group permission to access an Oracle Data Safe feature, create a policy in Oracle Cloud Infrastructure Identity and Access Management (IAM) that allows the group to either list, read, use, or manage resources for the feature.

Here are two examples:

Permission to Access a Specific Resource

Each Oracle Data Safe family resource consists of several resources that pertain to that feature. In most cases, you can grant a user group the inspect, read, use, or manage permission on any one of those specific resources, rather than grant the group access to all the resources in the family.

Keep in mind that all four permissions (inspect, read, use, and manage) may not be available for all resources. And, sometimes the manage permission grants only a subset of operations (for example: list, read, update, create, delete, and/or move). Therefore, it’s best to refer to the resource itself to understand what is possible.

Here are three examples:

Permissions to Register an Autonomous AI Database with Oracle Data Safe

To register an Autonomous AI Database with Oracle Data Safe, a user group requires permissions in Oracle Cloud Infrastructure Identity and Access Management (IAM) to do the following:

Permissions to Register an Oracle Cloud Database with Oracle Data Safe

To register an Oracle Cloud Database with Oracle Data Safe, a user group requires permissions in Oracle Cloud Infrastructure Identity and Access Management (IAM) to do the following:

Permissions to Register an On-Premises Oracle Database with Oracle Data Safe

To register an On-premises Oracle Database with Oracle Data Safe, a user group requires permissions in Oracle Cloud Infrastructure Identity and Access Management (IAM) to do the following:

Permissions to Register an Oracle Database on a Compute Instance with Oracle Data Safe

To register an Oracle Database on a compute instance in Oracle Cloud Infrastructure with Oracle Data Safe, a user group requires permissions in Oracle Cloud Infrastructure Identity and Access Management (IAM) to do the following:

Permissions to Register an Oracle Cloud@Customer Database with Oracle Data Safe

To register an Oracle Cloud@Customer database (Oracle Exadata Database Service on Cloud@Customer or Oracle Autonomous AI Database on Exadata Cloud@Customer) with Oracle Data Safe, a user group requires permissions in Oracle Cloud Infrastructure Identity and Access Management (IAM) to do the following:

Permissions to Register an Amazon RDS for Oracle Database with Oracle Data Safe

To register an Amazon RDS for Oracle Database with Oracle Data Safe, a user group requires permissions in Oracle Cloud Infrastructure Identity and Access Management (IAM) to do the following:

Permissions to Register a Target Database with Oracle Data Safe

To register a target database with Oracle Data Safe, a user group requires the manage permission on the target-databases resource in Oracle Cloud Infrastructure Identity and Access Management (IAM).

Example: Register a target database with Oracle Data Safe

allow group <group-name> to manage target-databases in compartment <compartment-name>

Permissions for an Oracle Data Safe Private Endpoint

To use or create an Oracle Data Safe private endpoint, a user group requires permissions on the data-safe-private-endpoints and virtual-network-family resources in Oracle Cloud Infrastructure Identity and Access Management (IAM).

If your target database has a private IP address, you can connect to it using an Oracle Data Safe private endpoint. The user group requires at least the use permission on an Oracle Data Safe private endpoint and on the underlying virtual networking resources of the private endpoint for the relevant compartments.

Example: The following statements allow a group to create a private endpoint

allow group <group-name> to manage data-safe-private-endpoints in compartment <compartment-name>
allow group <group-name> to manage virtual-network-family in compartment <compartment-name>

If the group already has an Oracle Data Safe private endpoint and wants to reuse it, then replace manage with use in the statements above.

Permissions for an Oracle Data Safe On-Premises Connector

To use or create an Oracle Data Safe on-premises connector, a user group requires permissions on the onprem-connectors resource in Oracle Cloud Infrastructure Identity and Access Management (IAM).

If your target database has a private IP address, you can connect to it using an Oracle Data Safe on-premises connector.

Example: Include permission to access or create an on-premises connector

allow group <group-name> to manage onprem-connectors in compartment <compartment-name>

Permission to Run Assessments and View Audit and Alert Data

If a user group only needs to be able to run assessments and view audit and alert data, you can create a policy with the following statements. With this policy, the user group cannot change masking policies, mask sensitive data, discover sensitive data, or register target databases.

allow group <user-group> to manage data-safe-assessment-family in compartment <compartment name>
Allow group <user-group> to read data-safe-report-definitions in compartment <compartment-name>
Allow group <user-group> to read data-safe-reports in compartment <compartment-name>
Allow group <user-group> to read data-safe-alerts in compartment <compartment-name>

Permissions to Discover Sensitive Data

A tenancy administrator can grant permissions on specific Data Discovery resources in specified compartments in Oracle Cloud Infrastructure Identity and Access Management to allow a user group to perform certain tasks.

Example 1: Run data discovery jobs (create sensitive data models)

allow group <user-group> to manage data-safe-sensitive-data-models in compartment <compartment-name>
allow group <group-name> to read target-databases in compartment <compartment-name>

Example 2: Run incremental data discovery jobs on target databases

allow group <user-group> to manage data-safe-discovery-jobs in compartment <compartment-name>
allow group <user-group> to read data-safe-sensitive-data-models in compartment <compartment-name>
allow group <user-group> to read data-safe-work-requests in compartment <compartment-name>

Example 3: Create sensitive types

allow group <user-group> to manage data-safe-sensitive-types in compartment <compartment-name>

Example 4: Perform all tasks in Data Discovery

allow group <user-group> to manage data-safe-discovery-family in compartment <compartment-name>

Permission to Mask Sensitive Data

A tenancy administrator can grant permissions on specific Data Masking resources in specified compartments in Oracle Cloud Infrastructure Identity and Access Management to allow a user group to perform certain tasks.

Example 1: Mask sensitive data on target databases in a specified compartment using a precreated masking policy

allow group <user-group> to manage data-safe-masking-policies in compartment <compartment-name>
allow group <user-group> to manage data-safe-masking-reports in compartment <compartment-name>
allow group <user-group> to read data-safe-work-requests in compartment <compartment-name>
allow group <user-group> to read target-databases in compartment <compartment-name>

Example 2: Create and manage masking policies in a specified compartment

allow group <user-group> to manage data-safe-masking-policies in compartment <compartment-name>

Example 3: Create and manage library masking formats in a specified compartment

allow group <user-group> to manage data-safe-library-masking-formats in compartment <compartment-name>