00 Security Portfolio
00 Security Portfolio
OCI Security
Ricardo Carrillo
[email protected]
Cloud Specialist
1 2 3
Security of Cloud Security Security Services
the Cloud Shared
Responsability
Model
4 5
DB Security Security Services
Services Architecture
Compliance Requirements
Disparate SaaS
Sources: IDC 2021 Ransomware Study: Where You Are Matters, (ISC)² Cybersecurity Workforce Study 2021, and Verizon Data Breach Investigations Report 2022
BIG DATA AI SERVICES MESSAGING ORACLE DATABASES DISTRIBUTED & OSS DBs SECURITY
APPDEV Big Data, Data Flow, Data Science, Streaming, ATP, ADW, DBCS VM/BM, NoSQL, MySQL, Cloud Guard, Security
Visual Builder Studio, Data Integration, Data Text Analytics, Queueing, Service JSON, Dedicated, Exadata, Postgres, Search Indexing, Zones, Vault, KMS,
GraalVM, Helidon, SQL Catalog, Golden Gate Anomaly Detection Connector Exadata C@C Distributed Cache Data Safe, DDoS, WAF
Developer, Shell,
APIs/CLI/SDKs/Docs
Core Infrastructure
OBSERVABILITY
Monitoring, Logging,
INFRASTRUCTURE as
COMPUTE CONTAINERS OS, VMWARE STORAGE NETWORKING Logging Analytics,
CODE Containers, Kubernetes, Autonomous Linux, NVMe, Block, File, VCN, LB, Service Notifications, Events,
Resource Manager,
Bare metal, VM, CPUs,
Service Mesh, Registry OS Mgmt Service, Object, Archive, Gateway, FC, VPN, Operations Insights,
Terraform, Ansible GPUs, HPC APM, Management Cloud
Marketplace Data Transfer Cluster Networking
Customer
Compute Blockchain Database Event Hub Visual Builder
Experience
Database
Storage Developer Big Data Java ERP
Backup
Autonomous
Bare Metal Database Mysql SOA Developer EPM
Database
Analytics Goldengate APEX HCM
Schema
• Configure your applications securely to meet your User Access/Identity User Access/Identity User Access/Identity User Access/Identity
compliance obligations
• Application and OS patching, OS configuration Data Data Data Data
• Identity and access management
• Network security Application Application Application Application
• Endpoint protection
• Data classification and compliance Guest OS Guest OS Guest OS Guest OS
Copyright © 2024, Oracle and/or its affiliates Cloud Service Provider Responsibility Customer Responsibility 7
2
Six Four
Focus on proactive monitoring and not Make use of policies for the
reactive monitoring of all activities that authorization of requests to assets
happen in the environment (users, Five according to the las privilege
services and devices) Authenticate (AuthN) and authorize approach and division of duties
(AuthZ) users, groups, services and
Copyright © 2024, Oracle and/or its affiliates devices.
10
Oracle offers a full stack of stack of cybersecurity capabilities
Storage and Database Safeguards
Compute and OS
OS Isolated Oracle
Signed Hardware Harden Disk Autonomous
Bare Metal Management Network
Firmware Root of Trust Images Linux
Compute Hub Virtualization
Network
Virtual Cloud Security Lists Network Bastion Dynamic Routing FastConnect VPN NAT Gateway
Network Firewall Gateway
Cloud Security
Identity and Operator Access
OCI Identity and
Access Governance Access Management Policies Federation
Security Portfolio
Casos de uso
Servicios de Seguridad
*FREE
FREE
• Políticas y acceso de usuarios administrados
• Administrar la autenticación multi-factor Gestión de identidad y Enterprise class
• Inicio de sesión único para proveedores de identidad
• Grabar llamadas API automáticamente
acceso IAM OCI IAM for tenancy OCI IAM Access
administration Identity Domains Governance
FREE FREE
• Arranque seguro, Arranque medido FREE FREE
• Aislamiento de carga de trabajo OS & Workloads
• Bastión Protección de SO
• Gestión de parches y paquetes del sistema operativo Protection Shielded Confidential
Dedicated Host Bastions OS Management Instances Computing
FREE FREE
• DDoS Protection
• Network Security Controls Protección de Network
• Virtual Firewalls Protection
• Filter malicious web traffic
infraestructura Security Lists Network
DDoS Protection WAF
& NSG Firewall
Dedicated Region
Other
Clouds
“CSPM provides the tools necessary to identify, analyze, and remediate cloud
assets”
Security "of " the cloud and security "on" the cloud
Security ON the
cloud Firewall Configuration Applications
OCI Compliance
System & Organization ZERO-TRUST SECURITY
PCI Compliance OCI & GDPR
Controls with OCI
Security Services
Oracle capabilities help
address core compliance
SOC reports PCI Compliance Advisory Whitepaper
needs at all levels
Data Safe Logging OCI IAM ISO, PCI, SOC
compliant
deployment
solutions
Your compliance Cloud Guard
Vulnerability Access
Scanning Governance
obligations
…and many more
Oracle’s
compliance
obligations
Identity and Access Data Safe / DB SAT Audit Vault Advanced Security Zero Data Loss Isolated network
Management (IAM) Database Firewall and Key Vault services virtualization
(AVDF)
Seamless identity Continuously assess Detect suspicious Encrypt the data and Recover up to the last Separates
integration with OCI IAM your configuration and activity with Audit protect encryption valid transaction with virtualization layer
helps decrease the risk of users with Data Safe Vault and Database keys with Advanced immutable backups from the network
attacks with multi-factor and database security Firewall (AVDF) Security and Key ZDLRA (Zero Data Loss layer to protect
authentication and role- assessment tool
based access control Vault Recovery Appliance) customer instances
and ZFS
Security "of " the cloud and security "on" the cloud
Data Safe
Yes to quickly evaluate data security risks and manage compliance
Self-service requirements
Already
Security
on OCI ? Reference Architectures
to adopt the proven best practices