Deployment
Define robust security controls and implement standard configurations that let you securely deploy resources in the cloud.
Your organization is responsible for the secure deployment of your resources in the cloud, including platforms, applications, data, and governance. Use the examples in the following table as a starting point to develop the security controls for your organization.
Security Control | Description |
---|---|
Identity and access management (IAM) |
Protect your cloud access credentials and set up individual user accounts. Manage and review access for your own employee accounts and for all activities that occur under your tenancy. Oracle provides the required IAM services, such as identity management, authentication, authorization, and auditing. Design your security approach based on zero trust principles:
|
Workload security |
Protect and secure the operating system and application layers of your compute instances from attacks and compromises. This protection includes patching applications and operating systems, ensuring that the operating system configuration is secure, and protecting your applications against malware and network attacks. Oracle provides secure images that are hardened and have the latest patches. Also, Oracle makes it simple for you to bring the same third-party security solutions that you use today. Use the OS Management service to manage updates and patches for the operating system environment of your Linux and Windows compute instances. |
Data classification and compliance | Classify and label your data appropriately to meet compliance requirements. Audit and monitor your deployments and applications to ensure that they continue to meet your compliance obligations. |
Host infrastructure security | Securely configure and manage your compute (virtual machines, bare metal instances, containers), storage (object, local storage, block volumes), and platform (database configuration) services. Oracle has a shared responsibility with you to ensure that the service is optimally configured and secured. This responsibility includes hypervisor security and the configuration of the permissions and network access controls. Ensure that hosts can communicate correctly and that devices are able to attach or mount the correct storage devices. |
Network security |
Securely configure network elements such as virtual networking, load balancing, DNS, and gateways. Oracle is responsible for providing a secure network infrastructure. Consider deploying tools such as perimeter-based firewalls, intrusion detection systems, and intrusion prevention systems. |
Client and endpoint protection | Your organization uses various hardware and software systems, such as mobile devices and browsers, to access your cloud resources. You are responsible for securing all clients and endpoints that you allow to access Oracle Cloud Infrastructure services. |