Oracle Cloud Infrastructure Security OCI Infographic...Oracle has put the security of critical...
Transcript of Oracle Cloud Infrastructure Security OCI Infographic...Oracle has put the security of critical...
Oracle Cloud Infrastructure (OCI) Security
Reduce concerns of advanced persistent threats
Adopt the cloud infrastructure that's designed using security-�rst architecture
Security by design
Reduce risks from constant threats with security-�rst design principles that utilize built-in tenant isolation and least privilege access.
Isolated Network Virtualization Security designed to prevent lateral movement
Zero trust architecture with malware free hosts
Infrastructure-as-a-Service (IaaS)
Isolated Network Virtualization
Host OS/Kernel
HypervisorContainer (Optional)
VM/ Guest
OS
VM/ Guest
OS
VM/ Guest
OS
VM/ Guest
OS
VM/ Guest
OS
VM/ Guest
OS
Isolated Network Virtualization
Host OS/Kernel
HypervisorContainer (Optional)
VM/ Guest
OS
VM/ Guest
OS
VM/ Guest
OS
VM/ Guest
OS
VM/ Guest
OS
VM/ Guest
OS
Easy to implement security controls
Prevent miscon�guration errors and implement mandatory security best practices. Oracle Cloud Infrastructure has 24/7 always-on controls, with layered defenses.
5F 68 61 5F 68 6163 6B 2B 63 6B 2B2A 72 2F 2A 71 2F63 6B 2B 63 6B 2B2A 72 2F 2A 71 2F
Data Encryption CASB Cloud Guard
Web Application Firewall
Security Zones
Identity
Key Management System
Defense in Depth
Internet
Edge
Monitoring
Virtual Network
Instance
Data
Identity
Control and automation
Reduce miscon�guration errors and make security best practices mandatory.
On Oracle Cloud Infrastructure
Autonomous Data Warehouse
Cross-cloud support
Available on
Oracle Cloud Marketplace
Copyright © 2020, Oracle and/or its a�liates. All rights reserved. Oracle and Java are registered trademarks of Oracle and/or its af�liates. Other names may be trademarks of their respective owners.
Foundational security controls in OCI
Deep expertise in global data protection
Oracle Cloud Infrastructure is a second-generation infrastructure-as-a-service (IaaS) o�ering built with more than 40 years in global data protection. The security-�rstarchitecture design principles include isolated network virtualization and pristinephysical host deployment, which provide superior customer isolation compared to earlierpublic cloud designs and reduced risk from advanced persistent threats. Oracle CloudInfrastructure bene�ts from tiered defenses and highly secure operations that span fromthe physical hardware in our data centers to the web layer, in addition to the protectionsand controls available in our cloud. Many of these protections also work with third-partyclouds and on-premises solutions to help secure modern enterprise workloads anddata where they reside.
Learn more