This topic provides security information and recommendations for the Oracle Cloud Infrastructure Connector Hub service.
Security Responsibilities
To use Connector Hub securely, learn about your security and compliance responsibilities.
In general, Oracle provides security of cloud infrastructure and operations, such as cloud operator access controls and infrastructure security patching. You are responsible for securely configuring your cloud resources. Security in the cloud is a shared responsibility between you and Oracle.
Oracle is responsible for the following security requirements:
Physical Security: Oracle is responsible for protecting the global infrastructure that runs all services offered in Oracle Cloud Infrastructure. This infrastructure consists of the hardware, software, networking, and facilities that run Oracle Cloud Infrastructure services.
Your security responsibilities are described on this page, which include the following areas:
Access Control: Limit privileges as much as possible. Users should be given only the access necessary to perform their work.
Initial Security Tasks 🔗
Use this checklist to identify the tasks you perform to secure Connector Hub
in a new Oracle Cloud Infrastructure tenancy.
Task
More Information
Use IAM policies to grant access to users and resources
After getting started with Connector Hub, use this checklist to identify security tasks that we recommend you perform regularly.
Connector Hub does not have any security tasks that you need to perform regularly.
IAM Policies 🔗
Use policies to limit access to Connector Hub.
A policy specifies who can access Oracle Cloud Infrastructure resources and how. For more information, see How Policies Work.
Assign a group the least privileges that are required to perform their responsibilities. Each policy has a verb that describes what actions the group is allowed to do. From the least amount of access to the most, the available verbs are: inspect, read, use, and manage.
User Access Policies 🔗
Create this policy to allow group ConnectorUsers to create, update, and delete connectors in the ABC compartment.
Allow group ConnectorUsers to manage serviceconnectors in compartment ABC
Create this policy to allow group ConnectorUsers to update connectors only (not allowing the group to create or delete connectors) in the ABC compartment.
Allow group ConnectorUsers to use serviceconnectors in compartment ABC
Ensure that any policy you create complies with your company guidelines.
To move data, your connector must have authorization to access the specified resources in the source , task , and target services. Some resources are accessible without policies.
Default policies providing the required authorization are offered when you use the Console to define a connector. These policies are limited to the context of the connector. You can either accept the default policies or ensure that you have the proper authorizations in custom policies for user and service access.
allow any-user to use metrics in compartment id <target_metric_compartment_OCID>
where all {
request.principal.type='serviceconnector',
target.metrics.namespace='<metric_namespace>',
request.principal.compartment.id='<serviceconnector_compartment_OCID>'
}
Use cross-tenancy connector access to share connectors with another organization that has its own tenancy. For example, share connectors with another business unit in your company, a customer of your company, or a company that provides services to your company.
Note
To create a connector that accesses resources in other tenancies, you must use the OCI SDK, CLI, or API. (The policy builder in the Console doesn't provide information from other tenancies, or suggest Endorse, Admit, or Define statements.) For CLI and API instructions, see Creating a Connector.
To access and share resources, the administrators of both tenancies need to create special policy statements that explicitly state the resources that can be accessed and shared. These special statements use the words Define, Endorse, and Admit. For more information about these statements, see Cross-Tenancy Access Policies.
Source Tenancy Policy Statements 🔗
Use a policy statement in the source tenancy to:
Admit a connector from a destination tenancy to access resources in your (source) tenancy
Endorse a connector to access resources in the destination tenancy
Endorse a group to access resources in the destination tenancy
Note
The following example policy statements are formatted for readability. Before using copies of these statements, remove new lines, tabs, and spaces.
Admit any connector from the destination tenancy to access a specific kind of resource in your (source) tenancy
Define tenancy DestinationTenancy as <destination_tenancy_OCID>
Admit any-user of tenancy DestinationTenancy to <permissions_for_resource_kind> in compartment id <compartment_OCID_in_source_tenancy>
where all
{
request.principal.type='serviceconnector',
request.principal.compartment.id=<compartment_OCID_in_destination_tenancy>'
}
For examples, see Examples. To find the permissions required for a specific type of resource accessed by a connector, see Default Policies.
Endorse a group in your (source) tenancy to do anything with any connector in any tenancy
Copy
Endorse group <group_name> to manage serviceconnectors in any-tenancy
Endorse a group in your (source) tenancy to do anything with any connector in the destination tenancy only
To write a policy that reduces the scope of tenancy access, the source administrator must reference the destination tenancy OCID provided by the destination administrator.
Copy
Define tenancy DestinationTenancy as <destination_tenancy_OCID>
Endorse group <group_name> to read serviceconnectors in tenancy DestinationTenancy
Destination Tenancy Policy Statements 🔗
Use a policy statement in the destination tenancy to:
Endorse a connector to access resources in the source tenancy
Admit a connector from the source tenancy to access resources in your (destination) tenancy
Admit a group or dynamic group from the source tenancy to access resources in your (destination) tenancy
Note
The following example policy statements are formatted for readability. Before using copies of these statements, remove new lines, tabs, and spaces.
Endorse any connector in your (destination) tenancy to access a specific kind of resource in the source tenancy
Define tenancy SourceTenancy as <source_tenancy_OCID>
Endorse any-user to <permissions_for_resource_kind> in tenancy SourceTenancy
where all
{
request.principal.type='serviceconnector'
}
For examples, see Examples. To find the permissions required for a specific type of resource accessed by a connector, see Default Policies.
Admit a group from the source tenancy to do anything with any connector in your (destination) tenancy
Copy
Define tenancy SourceTenancy as <source_tenancy_OCID>
Define group <group_name> as <group_OCID>
Admit group <group_name> of tenancy SourceTenancy to manage serviceconnectors
in tenancy
Admit a group from the source tenancy to read connectors in the SharedConnectors compartment only (in your destination tenancy)
Copy
Define tenancy SourceTenancy as <source_tenancy_OCID>
Define group <group_name> as <group_OCID>
Admit group <group_name> of tenancy SourceTenancy to read serviceconnectors
in compartment SharedConnectors
Admit a dynamic group from the source tenancy to read connectors in the SharedConnectors compartment only (in your destination tenancy)
Copy
Define tenancy SourceTenancy as <source_tenancy_OCID>
Define dynamic-group <dynamic_group_name> as <group_OCID>
Admit dynamic-group <dynamic_group_name> of tenancy SourceTenancy to read serviceconnectors
in compartment SharedConnectors
To find the permissions required for a specific type of resource accessed by a dynamic group, see Custom Policies.
Examples 🔗
Note
Write cross-tenancy policies before creating the connector. You must use the OCI SDK, CLI, or API to create a cross-tenancy connector.
The following example policy statements are formatted for readability. Before using copies of these statements, remove new lines, tabs, and spaces.
To endorse or admit a connector for access to a source, target, or task resource that isn't covered in these examples, use the resource permissions in the default policies.
Stream Source in Another Tenancy 🔗
Write policies for a connector to move data from a stream in a different tenancy to a bucket in the connector's tenancy.
Callout
Description
1
Stream used as connector source
2
Connector that moves data from the stream to the bucket
3
Bucket used as connector target
Following are the policies for moving this data from the stream in Tenancy A to the bucket in Tenancy B, using the connector in Tenancy B.
Tenancy A
Admit any connector in the specified compartment of Tenancy B to access any stream in the specified compartment of this tenancy.
Define tenancy ConnectorTenancy as <tenancy_b_OCID>
Admit any-user of tenancy ConnectorTenancy to {STREAM_READ, STREAM_CONSUME} in compartment id <compartment_OCID_in_tenancy_a>
where all
{
request.principal.type='serviceconnector',
request.principal.compartment.id=<compartment_OCID_in_tenancy_b>'
}
Tenancy B
Endorse any connector in this tenancy to access any stream in Tenancy A.
Define tenancy StreamTenancy as <tenancy_a_OCID>
Endorse any-user to {STREAM_READ, STREAM_CONSUME} in tenancy StreamTenancy
where all
{
request.principal.type='serviceconnector'
}
Allow any connector in the specified compartment of this tenancy to move data to the bucket (same tenancy).
Allow any-user to manage objects in compartment id <target_bucket_compartment_OCID>
where all {
request.principal.type='serviceconnector',
target.bucket.name='<bucket_name>',
request.principal.compartment.id='<serviceconnector_compartment_OCID>'
}
Log Source in Another Tenancy 🔗
Write policies for a connector to move data from a log in a different tenancy to a log group in the connector's tenancy.
Callout
Description
1
Log used as connector source
2
Connector that moves data from the log to the log group
3
Log group used as connector target
Tenancy A
Admit any connector in the specified compartment of Tenancy B to access any log in the specified compartment of this tenancy.
Define tenancy ConnectorTenancy as <tenancy_b_OCID>
Admit any-user of tenancy ConnectorTenancy to read log-content in compartment id <compartment_OCID_in_tenancy_a>
where all
{
request.principal.type='serviceconnector',
request.principal.compartment.id=<compartment_OCID_in_tenancy_b>'
}
Tenancy B
Endorse any connector in this tenancy to access any log in Tenancy A.
Define tenancy LogTenancy as <tenancy_a_OCID>
Endorse any-user to read log-content in tenancy LogTenancy
where all
{
request.principal.type='serviceconnector'
}
Allow any connector in the specified compartment of this tenancy to move data to the log group (same tenancy).
Allow any-user to use loganalytics-log-group in compartment id <target_log_group_compartment_OCID>
where all {
request.principal.type='serviceconnector',
target.loganalytics-log-group.id=<log_group_OCID>,
request.principal.compartment.id=<serviceconnector_compartment_OCID>
}
Function Target in Another Tenancy 🔗
Write policies for a connector to move data from a log in the connector's tenancy to a function in a different tenancy.
Callout
Description
1
Log used as connector source
2
Connector that moves data from the log to the function
3
Function used as connector target
Tenancy A
Endorse any connector in the specified compartment of this tenancy to access any function in the specified compartment of Tenancy B.
Define tenancy FunctionTenancy as <tenancy_b_OCID>
Endorse any-user to use fn-function in tenancy FunctionTenancy
where all
{
request.principal.type='serviceconnector'
}
Define tenancy FunctionTenancy as <tenancy_b_OCID>
Endorse any-user to use fn-invocation in tenancy FunctionTenancy
where all
{
request.principal.type='serviceconnector'
}
Allow any connector in the specified compartment of this tenancy to access any log (same tenancy).
Allow any-user to read log-content in compartment id <source_log_compartment_OCID>
where all {
request.principal.type='serviceconnector',
request.principal.compartment.id='<serviceconnector_compartment_OCID>'
}
Tenancy B
Admit any connector in Tenancy A to access any function in this tenancy.
Define tenancy ConnectorTenancy as <tenancy_a_OCID>
Admit any-user to use fn-function in tenancy ConnectorTenancy
where all
{
request.principal.type='serviceconnector'
}
Define tenancy ConnectorTenancy as <tenancy_a_OCID>
Admit any-user to use fn-invocation in tenancy ConnectorTenancy
where all
{
request.principal.type='serviceconnector'
}
Source Metric and Target Bucket in Other Tenancies 🔗
Write policies for a connector to move data from a metric in a different tenancy (A) to a function in a different tenancy (C).
Callout
Description
1
Metric used as connector source
2
Connector that moves data from the metric to the bucket
3
Bucket used as connector target
Tenancy A
Admit any connector in the specified compartment of Tenancy B to access any metric in the specified compartment of this tenancy.
Define tenancy ConnectorTenancy as <tenancy_b_OCID>
Admit any-user of tenancy ConnectorTenancy to read metrics in compartment id <compartment_OCID_in_tenancy_a>
where all
{
request.principal.type='serviceconnector',
request.principal.compartment.id=<compartment_OCID_in_tenancy_b>'
}
Tenancy B
Endorse any connector in this tenancy to access any metric in Tenancy A.
Define tenancy MetricTenancy as <tenancy_a_OCID>
Endorse any-user to read metrics in tenancy MetricTenancy
where all
{
request.principal.type='serviceconnector'
}
Endorse any connector in this tenancy to access any bucket in Tenancy C.
Define tenancy BucketTenancy as <tenancy_c_OCID>
Endorse any-user to manage objects in tenancy BucketTenancy
where all
{
request.principal.type='serviceconnector'
}
Tenancy C
Admit any connector in the specified compartment of Tenancy B to move data to any bucket in the specified compartment of this tenancy.
Define tenancy ConnectorTenancy as <tenancy_b_OCID>
Admit any-user of tenancy ConnectorTenancy to manage objects in compartment id <compartment_OCID_in_tenancy_c>
where all
{
request.principal.type='serviceconnector',
request.principal.compartment.id=<compartment_OCID_in_tenancy_b>'
}