Effective and manageable cloud security for your most important workloads

We've built our cloud security approach based on seven core pillars to ensure you have the level of isolation, data protection, control and visibility you need for your cloud infrastructure. We deliver a fault-tolerant, resilient and verifiably secure cloud infrastructure that enables integration with your existing security assets.
 
 

Core Security Pillars

Read the Oracle Security White Paper to learn more about Oracle's security strategy and our seven core security pillars.
 

Customer Isolation

Deploy your application and data assets, isolated from other tenants and Oracle.
 

Data Encryption

Leverage controls to protect your data so that you can meet security and compliance requirements.
 

Security Controls

Manage access to your services and segregate operational responsibilities to help reduce risk associated with malicious and accidental user actions.
 

Visibility

Audit and monitor actions on your resources through comprehensive log data and security monitoring solutions to help reduce security and operational risk.

Hybrid Cloud

Use your existing security assets, such as user accounts, policies and third-party security solutions, when accessing cloud resources and securing data and application assets.
 

High Availability

Take advantage of consistent uptime through fault-tolerant data centers that are resilient against network attacks.
 

Verifiably Secure Infrastructure

Run business critical workloads on a verifiably secure infrastructure that follows rigorous processes and security controls in all phases of development and operation.
 
 
 
 

Oracle Cloud Infrastructure Security Services

Take advantage of integrated cloud security services to help control your data protection and ensure security governance more efficiently.

Oracle Cloud Infrastructure Identity and Access Management

Oracle Identity and Access Management (IAM) service lets you control who has access to your cloud resources, what type of access they have, and to which specific resources. Manage complex organizations and rules with logical groups of users and resources, and simple to define policies.
Leverage a single model for authentication and authorization to securely control access and easily manage your IT resources across all Oracle Cloud Infrastructure services.

Oracle Cloud Infrastructure Audit

Oracle Audit provides comprehensive visibility into your Oracle Cloud Infrastructure services. Access all public API activities in your tenancy over the past 365 days at no additional cost.
Automatically log events that can be retrieved, stored, and analyzed for security, compliance, and resource optimization across your Oracle Cloud Infrastructure entitlements and compartments.

Oracle Cloud Infrastructure Key Management

Oracle Cloud Infrastructure Key Management is a managed service that enables you to encrypt your data using keys that you control.
Oracle Key Management provides you with highly available, durable, and secure key storage using FIPS 140-2 Level 3 certified hardware security modules (HSMs). It offers centralized key management capabilities and integration with select Oracle Cloud Infrastructure services.

Oracle CASB for Oracle Cloud Infrastructure

Oracle CASB Cloud Service is the only Cloud Access Security Broker that offers full visibility over your Oracle Cloud Infrastructure resources and uses machine learning to help predict threats.
Protect your cloud footprint with automated and continuous security monitoring. Oracle CASB simplifies management of your security configuration settings, detects anomalous behavior with user behavior analytics, and secures against threats that span multiple cloud services.

Oracle Cloud Infrastructure Web Application Firewall

The Oracle Cloud Infrastructure Web Application Firewall (WAF) is an enterprise-grade, cloud-based edge security solution that's designed to protect internet-facing applications from cyberattacks. The WAF provides several security services—including bot management and DDoS protection—and uses a layered approach to safeguard websites and web applications against malicious incoming traffic.
The Oracle Cloud Infrastructure Web Application Firewall (WAF) provides web application security for Oracle cloud workloads. But it doesn’t stop there. The WAF can simultaneously protect web applications located within Oracle Cloud Infrastructure, in your data center, and across hybrid and multicloud environments.
 
The WAF is tightly integrated into the Oracle cloud console along with the many other applications and services, providing ease of use and tight control for Oracle Cloud Infrastructure deployments.
 
 
 
 

Security Solutions from Trusted Partners

Launch solutions from leading security providers directly on Oracle Cloud Infrastructure via the Oracle Cloud Marketplace.
Fortinet FortiGate-VM Next-Generation Firewall
Fortinet FortiGate-VM enables mitigation of blind spots to improve policy compliance by implementing critical security controls within Oracle Cloud Infrastructure environments.
 
Fortinet FortiADC Application Delivery Controller
Fortinet Application Delivery Controller (ADC) optimizes the availability, user experience, and scalability of enterprise application delivery. They enable fast, secure, and intelligent acceleration and distribution of even the most demanding enterprise applications running on Oracle Cloud Infrastructure.
 
Check Point CloudGuard IaaS
Check Point CloudGuard IaaS is a next-generation firewall that delivers advanced, multilayered threat prevention to protect customer assets in Oracle Cloud Infrastructure from malware and malicious hackers.
 
 
 

Featured Resources

Oracle CASB Enables Security Monitoring for Oracle Cloud Infrastructure
White Paper on Oracle's Security Approach and Service Offerings
Oracle Cloud Infrastructure Security Best Practices
×
Soita meille
1-800-633-0738 (Yhdysvallat)

Ota yhteyttä
×
Soita meille
1-800-633-0738 (Yhdysvallat)


Oracle Cloud -keskustelufoorumit