Skip to content

Commit 43c2f69

Browse files
authored
Merge pull request #869 from oracle-devrel/sdd-update-february
SDD v2.4 update
2 parents 24bacfa + 173bdc7 commit 43c2f69

File tree

12 files changed

+159
-28
lines changed

12 files changed

+159
-28
lines changed

cloud-architecture/oracle-apps-hyperion-siebel-gbu/gbu/construction-engineering/primavera-solution-definition/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
This repository contains an in-depth guide for Oracle Primavera migration projects. It offers a high-level solution definition for migrating or establishing Primavera Workloads on Oracle Cloud Infrastructure (OCI). With a comprehensive representation of the current state, prospective state, potential project scope, and anticipated timeline, this document aims to provide a precise understanding of the project's scope and intention to all participating entities.
44

5-
Reviewed: 20.11.2023
5+
Reviewed: 27.2.2024
66

77
# When to use this asset?
88

cloud-architecture/oracle-apps-hyperion-siebel-gbu/gbu/construction-engineering/primavera-solution-definition/files/primavera-solution-definition.md

Lines changed: 28 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ Version | Author | Date | Comment
2424
:--- |:--- |:--- |:---
2525
0.1 | Name | June 12th, 2023 | Updates to network design
2626
1.0 | Name | June 13th, 2023 | Updates to HA design
27-
2.2 | Name | October 25th, 2023 | Updates to Annex
27+
2.4 | Name | February 26th, 2024 | Added the network firewall in the requirment, the solution considerations and in the Annex.
2828

2929
## Team
3030

@@ -309,6 +309,19 @@ At the time of this document creation, no Security requirements have been specif
309309

310310
*Capture the Non-Functional Requirements for networking-related topics. You can use the networking questions in the [Annex](#networking-requirement-considerations)*
311311

312+
*As businesses increasingly rely on Cloud Infrastructure to store, process, and transmit sensitive data, the need for comprehensive security solutions has never been more important. Potential customers evaluating network security solutions typically prioritize the following requirements: Some of the broader category considerations are below.*
313+
314+
- *Data Protection: Safeguarding sensitive information against unauthorized access, theft, or modification is a primary concern for any organization and industry today.*
315+
- *Threat Prevention: Advanced capabilities like IDPS and malware detection for blocking threats.*
316+
- *Data Loss Prevention (DLP): Monitoring and controlling sensitive data transmission.*
317+
- *Encryption and Decryption: Inspecting encrypted traffic without compromising privacy.*
318+
- *Threat Prevention: Proactively identifying and mitigating security threats is essential for maintaining the integrity of network infrastructure. *
319+
- *Intrusion Detection and Prevention: Monitoring for suspicious or malicious activity.*
320+
- *Application Control: Granular control over specific applications or services.*
321+
- *URL Filtering: Controlling access to permitted URLs.*
322+
- *Security compliance: Does your organization have network security requirements based on industry or organization compliance? For example - SAMA (Saudi Arabia Monetary Authority), HIPAA (Health Insurance Portability and Accountability Act), GDPR (General Data Protection Regulation), SWIFT, etc.*
323+
324+
312325
*Example:*
313326

314327
At the time of this document creation, no Networking requirements have been specified.
@@ -571,8 +584,7 @@ Please see our security guidelines in the [Annex](#security-guidelines).
571584

572585
*Reference:*
573586

574-
*A list of possible Oracle solutions can be found in the [Annex](#networking-solutions).*
575-
587+
*If your customers have any or one of the needs described in the guide of the [Network Requirements](#networking-requirements), then the OCI Network Firewall (OCI NFW) is the cloud native solution that provides all of it. It is based on the industry-leading Nextgen firewall solution by Palo Alto (VM-Series). Refer to the Annex for more best practices around deployment models.*
576588

577589
### Operations (Optional)
578590

@@ -660,7 +672,7 @@ Oracle Cloud Infrastructure (OCI) is designed to protect customer workloads with
660672

661673
Cloud computing is fundamentally different from traditionally on-premises computing. In the traditional model, organizations are typically in full control of their technology infrastructure located on-premises (e.g., physical control of the hardware, and full control over the technology stack in production). In the cloud, organizations leverage resources and practices that are under the control of the cloud service provider, while still retaining some control and responsibility over other components of their IT solution. As a result, managing security and privacy in the cloud is often a shared responsibility between the cloud customer and the cloud service provider. The distribution of responsibilities between the cloud service provider and customer also varies based on the nature of the cloud service (IaaS, PaaS, SaaS).
662674

663-
# Additional Resources
675+
## Additional Resources
664676
- [Oracle Cloud Compliance](https://www.oracle.com/corporate/cloud-compliance/) – Oracle is committed to helping customers operate globally in a fast-changing business environment and address the challenges of an ever more complex regulatory environment. This site is a primary reference for customers on Shared Management Model with Attestations and Advisories.
665677
- [Oracle Security Practices](https://www.oracle.com/corporate/security-practices/) – Oracle’s security practices are multidimensional, encompassing how the company develops and manages enterprise systems, and cloud and on-premises products and services.
666678
- [Oracle Cloud Security Practices](https://www.oracle.com/corporate/security-practices/cloud/) documents.
@@ -709,8 +721,20 @@ The below questions help to identify networking requirements.
709721

710722
## Security and Access Control
711723

724+
<!--
712725
- Are you familiar with the concept of Next-Generation Firewalls (NGFW) and their benefits over traditional firewalls?
713726
- Have you considered the importance of protecting your web applications from potential cyber threats using a Web Application Firewall (WAF)?
727+
-->
728+
729+
- Some of the below questions help you to adopt the right sizing and deployment model of the network firewall.
730+
- Does the customer need to protect traffic from VCN to VCN?
731+
- Does the customer need to protect traffic from subnet to subnet in the same VCN?
732+
- When deploying an OCI Network Firewall in a dedicated HUB or secure VCN, do you want to protect inter-VCN traffic and/or inter-subnet traffic from within the same VCN?
733+
- Does the customer need to protect incoming or egressing traffic to the internet?
734+
- Does the customer need to protect internal traffic (including on-premises via IPSEC/FC)?
735+
- Is the network performance critical?
736+
- Does the customer have any requirement on network isolation (i.e., internet traffic never traverses or is mixed with internal traffic)?
737+
- Have you considered the importance of protecting your web applications from potential cyber threats using a Web Application Firewall (WAF)?
714738

715739
## Monitoring and Troubleshooting
716740

cloud-architecture/oracle-apps-hyperion-siebel-gbu/gbu/financial-services/flexcube-solution-definition/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
This repository contains an in-depth guide for Oracle Flexcube migration projects. It offers a high-level solution definition for migrating or establishing Flexcube Workloads on Oracle Cloud Infrastructure (OCI). With a comprehensive representation of the current state, prospective state, potential project scope, and anticipated timeline, this document aims to provide a precise understanding of the project's scope and intention to all participating entities.
44

5-
Reviewed: 20.11.2023
5+
Reviewed: 27.2.2024
66

77
# When to use this asset?
88

cloud-architecture/oracle-apps-hyperion-siebel-gbu/gbu/financial-services/flexcube-solution-definition/files/flexcube-solution-definition.md

Lines changed: 30 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,8 @@ Version | Author | Date | Comment
1818
:--- |:--- |:--- |:---
1919
0.1 | Name | June 12th, 2023 | Updates to network design
2020
1.0 | Name | June 13th, 2023 | Updates to HA design
21-
2.2 | Name | October 25th, 2023 | Updates to Annex
21+
2.4 | Name | February 26th, 2024 | Added the network firewall in the requirement, the solution considerations and in the Annex.
22+
2223

2324
## Team
2425

@@ -355,10 +356,22 @@ At the time of this document creation, no Security requirements have been specif
355356

356357
*Capture the Non-Functional Requirements for networking-related topics. You can use the networking questions in the [Annex](#networking-requirement-considerations)*
357358

359+
*As businesses increasingly rely on Cloud Infrastructure to store, process, and transmit sensitive data, the need for comprehensive security solutions has never been more important. Potential customers evaluating network security solutions typically prioritize the following requirements: Some of the broader category considerations are below.*
360+
361+
- *Data Protection: Safeguarding sensitive information against unauthorized access, theft, or modification is a primary concern for any organization and industry today.*
362+
- *Threat Prevention: Advanced capabilities like IDPS and malware detection for blocking threats.*
363+
- *Data Loss Prevention (DLP): Monitoring and controlling sensitive data transmission.*
364+
- *Encryption and Decryption: Inspecting encrypted traffic without compromising privacy.*
365+
- *Threat Prevention: Proactively identifying and mitigating security threats is essential for maintaining the integrity of network infrastructure. *
366+
- *Intrusion Detection and Prevention: Monitoring for suspicious or malicious activity.*
367+
- *Application Control: Granular control over specific applications or services.*
368+
- *URL Filtering: Controlling access to permitted URLs.*
369+
- *Security compliance: Does your organization have network security requirements based on industry or organization compliance? For example - SAMA (Saudi Arabia Monetary Authority), HIPAA (Health Insurance Portability and Accountability Act), GDPR (General Data Protection Regulation), SWIFT, etc.*
370+
371+
358372
*Example:*
359373

360374
At the time of this document creation, no Networking requirements have been specified.
361-
362375
### Integration and Interfaces (Optional)
363376

364377
*Guide:*
@@ -615,7 +628,7 @@ Please see our security guidelines in the [Annex](#security-guidelines).
615628

616629
*Reference:*
617630

618-
*A list of possible Oracle solutions can be found in the [Annex](#networking-solutions).*
631+
*If your customers have any or one of the needs described in the guide of the [Network Requirements](#networking-requirements), then the OCI Network Firewall (OCI NFW) is the cloud native solution that provides all of it. It is based on the industry-leading Nextgen firewall solution by Palo Alto (VM-Series). Refer to the Annex for more best practices around deployment models.*
619632

620633

621634
### Operations (Optional)
@@ -741,7 +754,7 @@ Oracle Cloud Infrastructure (OCI) is designed to protect customer workloads with
741754

742755
Cloud computing is fundamentally different from traditionally on-premises computing. In the traditional model, organizations are typically in full control of their technology infrastructure located on-premises (e.g., physical control of the hardware, and full control over the technology stack in production). In the cloud, organizations leverage resources and practices that are under the control of the cloud service provider, while still retaining some control and responsibility over other components of their IT solution. As a result, managing security and privacy in the cloud is often a shared responsibility between the cloud customer and the cloud service provider. The distribution of responsibilities between the cloud service provider and customer also varies based on the nature of the cloud service (IaaS, PaaS, SaaS).
743756

744-
# Additional Resources
757+
## Additional Resources
745758
- [Oracle Cloud Compliance](https://www.oracle.com/corporate/cloud-compliance/) – Oracle is committed to helping customers operate globally in a fast-changing business environment and address the challenges of an ever more complex regulatory environment. This site is a primary reference for customers on Shared Management Model with Attestations and Advisories.
746759
- [Oracle Security Practices](https://www.oracle.com/corporate/security-practices/) – Oracle’s security practices are multidimensional, encompassing how the company develops and manages enterprise systems, and cloud and on-premises products and services.
747760
- [Oracle Cloud Security Practices](https://www.oracle.com/corporate/security-practices/cloud/) documents.
@@ -790,8 +803,21 @@ The below questions help to identify networking requirements.
790803

791804
## Security and Access Control
792805

806+
<!--
793807
- Are you familiar with the concept of Next-Generation Firewalls (NGFW) and their benefits over traditional firewalls?
794808
- Have you considered the importance of protecting your web applications from potential cyber threats using a Web Application Firewall (WAF)?
809+
-->
810+
811+
- Some of the below questions help you to adopt the right sizing and deployment model of the network firewall.
812+
- Does the customer need to protect traffic from VCN to VCN?
813+
- Does the customer need to protect traffic from subnet to subnet in the same VCN?
814+
- When deploying an OCI Network Firewall in a dedicated HUB or secure VCN, do you want to protect inter-VCN traffic and/or inter-subnet traffic from within the same VCN?
815+
- Does the customer need to protect incoming or egressing traffic to the internet?
816+
- Does the customer need to protect internal traffic (including on-premises via IPSEC/FC)?
817+
- Is the network performance critical?
818+
- Does the customer have any requirement on network isolation (i.e., internet traffic never traverses or is mixed with internal traffic)?
819+
- Have you considered the importance of protecting your web applications from potential cyber threats using a Web Application Firewall (WAF)?
820+
795821

796822
## Monitoring and Troubleshooting
797823

cloud-architecture/oracle-apps-hyperion-siebel-gbu/hyperion-essbase/essbase-solution-definition/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ This document serves as an integral asset for individuals and organizations seek
1010

1111
Use this document as a starting point for the solution definition of your Essbase implementation project. This asset includes example architecture diagrams for DrawIO in the file essbase-architecture-diagrams-example.drawio.
1212

13-
Reviewed: 7.2.2024
13+
Reviewed: 27.2.2024
1414

1515
## Conclusion
1616
The Essbase Workload Solution Definition is expected to serve as a definitive guide to the project. All participants are encouraged to provide feedback, raise queries, and make contributions to enhance the overall project's success.

0 commit comments

Comments
 (0)