Skip to content

Commit f27b615

Browse files
Merge branch 'main' into security-product-folders
2 parents d057b39 + b6881c8 commit f27b615

File tree

52 files changed

+428
-264
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

52 files changed

+428
-264
lines changed

app-dev/VisualBuilder

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Sample application developed using Visual Builder platform
Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
# EU Sovereign Cloud
2+
3+
EU Sovereign Cloud is Oracle’s sovereign cloud offering, designed for the data laws and requirements of the EU.
4+
5+
Reviewed: 31.01.2024
6+
7+
# Table of Contents
8+
9+
1 [Useful Links](#useful-uinks)
10+
11+
<!--## Team Publications -->
12+
13+
14+
# Useful Links
15+
16+
- [EUSC Overview](https://www.oracle.com/uk/cloud/eu-sovereign-cloud/)
17+
- This page provides an overview of the EU Sovereign Cloud
18+
19+
- EUSC Documentation](https://docs.public.oneportal.content.oci.oraclecloud.com/en-us/iaas/Content/General/eu-sovereign-cloud.htm)
20+
- This page provides detailed documentation of the EU Sovereign Cloud
21+
22+
- [EUSC FAQs](https://www.oracle.com/uk/cloud/eu-sovereign-cloud/faq/)
23+
- This page provides the answers to the most frequently asked questions about EU Sovereign Cloud
24+
25+
26+
# License
27+
28+
Copyright (c) 2024 Oracle and/or its affiliates.
29+
30+
Licensed under the Universal Permissive License (UPL), Version 1.0.
31+
32+
See [LICENSE](https://github.com/oracle-devrel/technology-engineering/blob/main/LICENSE) for more details.
Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
# Oracle Cloud Isolated Region
2+
3+
Oracle Cloud Isolated Region is a secure, air-gapped Oracle Cloud Infrastructure (OCI) solution designed to meet the higher demands of global customers’ mission-critical classified workloads.
4+
5+
Reviewed: 31.01.2024
6+
7+
# Table of Contents
8+
9+
1 [Useful Links](#useful-uinks)
10+
11+
<!--## Team Publications -->
12+
13+
14+
# Useful Links
15+
16+
- [OCIR Overview](https://www.oracle.com/government/govcloud/isolated/)
17+
- This page provides an overview of the Oracle Cloud Isolated Region
18+
19+
- [OCIR DataSheet](https://www.oracle.com/a/ocom/docs/cloud/oracle-cloud-isolated-region-datasheet.pdf)
20+
- This document provides details about Oracle Cloud Isolated Region
21+
22+
- [OCIR FAQs](https://www.oracle.com/government/govcloud/isolated/faq/)
23+
- This page provides the answers to the most frequently asked questions about Oracle Cloud Isolated Region
24+
25+
26+
# License
27+
28+
Copyright (c) 2024 Oracle and/or its affiliates.
29+
30+
Licensed under the Universal Permissive License (UPL), Version 1.0.
31+
32+
See [LICENSE](https://github.com/oracle-devrel/technology-engineering/blob/main/LICENSE) for more details.

data-platform/autonomous-database/autonomous-serverless/README.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,9 @@ Oracle Cloud provides a set of data management services built on self-driving Or
3333

3434
- [Disaster Recovery with Autonomous Data Guard Serverless](https://www.youtube.com/watch?v=h4wkXh7dWe4)
3535
- The disaster Recovery solution for the Autonomous Database Serverless (RTO/RPO, local and remote cross-region, etc).
36+
37+
- [How to create Autonomous Database Notifications in Slack](https://blogs.oracle.com/datawarehousing/post/how-to-create-autonomous-database-notifications-in-slack)
38+
- Step-by-step blog article explaining how to send an alert message, triggered by an Autonomous Database event, into a slack channel using a webhook link.
3639

3740
# Useful Links
3841

security/README.md

Lines changed: 17 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -1,53 +1,38 @@
11
# Security
22

3-
The Technology Engineering Security Specialists team provides end-end Oracle security coverage through CISO Office and Security Design. Our specialists work closely with Infra Security and Data Security specialists with a mission to transform the IT landscape of strategic customers into a secure, compliant, resilient, and successful workload deployment by evangelizing and applying Oracle’s leading security best practices and services.
3+
The Technology Engineering Security Specialists team provides end-end Oracle security specialists coverage through Field CISO, Security Design, and IAM sub-areas. Our specialists work closely with Infra Security and Data Security specialists with a mission to transform the IT landscape of strategic customers into a secure, compliant, resilient, and successful workload deployment by evangelizing and applying Oracle’s leading security best practices and services.
4+
5+
Reviewed: 01.02.2024
46

57
# Table of Contents
68

79
1. [Team Publications](#team-publications)
810
2. [Useful Links](#useful-links)
9-
3. [Reusable Assets Overview](#reusable-assets-overview)
1011

11-
## Team Publications
12+
# Team Publications
1213

13-
### Oracle Whitepaper
14+
## Oracle Whitepaper
1415

1516
- [Approaching Zero Trust Security with Oracle Cloud Infrastructure](https://www.oracle.com/a/ocom/docs/whitepaper-zero-trust-security-oci.pdf)
1617
- How Oracle Cloud Infrastructure can help organizations adopt a Zero Trust Security model as recommended by the UK National Cyber Security Centre’s 8 principles
1718

18-
### Oracle Blogs
19-
20-
- [Native Cloud Security Services or Heterogeneous Tools?](https://blogs.oracle.com/cloudsecurity/post/native-cloud-security-services-or-heterogeneous-tools)
21-
- Read this article to hear our expert's view on “I’m deploying workloads in Oracle Cloud Infrastructure (OCI) but I already have several, existing security tools. Should I use those, which can monitor all my different cloud environments, not just OCI, or should I use OCI-native security services?”
22-
- [Quick tip 8: Managing authentication through sign-on policies](https://blogs.oracle.com/cloudsecurity/post/quick-tip-8-managing-authentication-through-signon-policies)
23-
- This article is on IAM but focuses on authentication. Sign-on policies control how users are challenged to authenticate and under what circumstances they’re allowed to access integrated applications.
24-
- [A huge step forward for Security Zones in Oracle Cloud Infrastructure](https://blogs.oracle.com/cloudsecurity/post/a-huge-step-forward-for-security-zones-in-oci)
25-
- Oracle announced custom Security Zones, which, as the name suggests, enables you to customize the security zone policies (referred to as recipes), disabling rules that are not appropriate for your deployments.
19+
## Oracle Blogs
20+
21+
- [Zero Trust Security - Not a buzz word; but elixir of Cyber Security?](https://blogs.oracle.com/cloudsecurity/post/zero-trust-security-elixir-of-cyber-security)
22+
- We hear very frequently of our customers’ plans to adopt a zero-trust model to improve their overall approach to cyber security. Read this blog to understand how Oracle Cloud Infrastructure (OCI) can help accelerate your Zero Trust Security journey.
23+
2624
27-
### OCI Architecture Center
28-
29-
- [Enhance the user experience by deploying your custom sign-in application on OKE](https://docs.oracle.com/en/solutions/enhance-ux-custom-signin-app-oke/index.html)
30-
- You can display your organization's own URL during employee sign-in instead of using the cloud service provider's standard URL by hosting your custom sign-in application in your own domain.
31-
- [OCVS Security - Data Protection](https://docs.oracle.com/en/solutions/oci-security-ocvs/index.html#GUID-A59FC475-6C3B-4589-8151-4ED088E4AC91)
32-
- This reference architecture describes the integration options for Oracle Cloud VMware Solution with OCI Data Protection layer and security services to address the requirements for running critical and sensitive workloads.
33-
- [Connect Oracle Data Safe to Exadata and Autonomous Databases](https://docs.oracle.com/en/solutions/data-safe-exadata-adb/index.html)
34-
- This reference architecture highlights the different ways you can connect Exadata and Autonomous databases to Oracle Data Safe. It also describes the security measures you need to take to provide a safe deployment of a connection to a specific target database.
35-
36-
### Cloud Coaching Webinars - [Oracle Learning Library YouTube](https://www.youtube.com/@OracleLearning)
37-
38-
- [Security-First approach for your OCI Tenancy](https://www.youtube.com/watch?v=ZB87VUcK6Tg)
39-
- Join us and you will learn about the top security misconfigurations organizations should avoid when using cloud services and follow the Oracle Cloud Infrastructure Security Best practices!
40-
- [Offloading Identity Management](https://www.youtube.com/watch?v=MdA_M2JnoxM)
41-
- In this session, you will see how Oracle’s Identity and Access Management cloud services will enable you to accelerate the development and deployment of your applications to Oracle Cloud Infrastructure by taking advantage of an enterprise-class identity management service built on open standards.
42-
- [OCI Monitoring with 3rd Party SIEM](https://www.youtube.com/watch?v=UPdPZPWOZIs)
43-
- In this session, you will see how to integrate your existing SIEM with the OCI Monitoring Capabilities following a well-known pattern.
25+
## Cloud Coaching Webinars
26+
27+
- [Oracle's Approach To Cloud Security](https://community.oracle.com/customerconnect/events/604931-oci-oracles-approach-to-cloud-security)
28+
- Refer to this webinar from our Field CISO Specialists to understand about what is Oracle's approach to Cloud Security and how the security pillar focuses on protecting users, safeguarding data, and meeting regulatory and compliance requirements.
4429

45-
## Useful Links
30+
# Useful Links
4631

4732
- [Oracle Security](https://www.oracle.com/security/)
4833
- Protect your most valuable data in the cloud and on-premises with Oracle’s security-first approach. Oracle has decades of experience securing data and applications; Oracle Cloud Infrastructure delivers a more secure cloud to our customers, building trust and protecting their most valuable data.
49-
- [Oracle Cloud Compliance](https://www.oracle.com/corporate/cloud-compliance/)
50-
- Oracle is committed to helping customers operate globally in a fast-changing business environment and address the challenges of an ever more complex regulatory environment.
34+
- [Oracle Cloud Adoption Framework](https://docs.oracle.com/en-us/iaas/Content/cloud-adoption-framework/home.htm)
35+
- The Oracle Cloud Infrastructure Cloud Adoption Framework provides best practices and a structured approach to help your organization successfully adopt the cloud.
5136

5237
# License
5338

security/ciso-office/README.md

Lines changed: 47 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,49 +1,79 @@
1-
# CISO Office
1+
# Field CISO Specialists
22

3-
The CISO office group under Technology Engineering Security Specialists team is repsonsible to build trusted relationships with customer CISO team to help build and define their cybersecurity strategy, help how Oracle can assist in their cybersecurity priorities. In addition, the team also advises on OCI Security first design principles and how shared security management model can help them achieve security posture management to improve security resilience.
3+
The Field CISO Specialists team is responsible for building trusted relationships with customer CISO and IT Security team to help build, define, and review their cybersecurity strategy to align with their business objectives. In addition, the team also advises on OCI Security's first design principles and how the shared security management model can help them achieve security posture management to improve security resilience. Key responsibilities not limited to the below
44

55
- Executive Influence - Build Trusted Relationship
66
- Avoid Business risk with Cybersecurity management
77
- Embrace Zero Trust
88
- Reduce risk, Incident response, Resiliency and Optimize costs
9-
- Adopt OCI to meet their compliance needs with securely build and operated workloads
9+
- Adopt OCI to meet their compliance needs with securely built and operated workloads
1010

11+
Reviewed: 02.02.2024
1112

1213
# Table of Contents
1314

1415
1. [Team Publications](#team-publications)
1516
2. [Useful Links](#useful-links)
16-
3. [Reusable Assets Overview](#reusable-assets-overview)
17+
1718

18-
## Team Publications
19+
# Team Publications
1920

20-
### Oracle Whitepaper
21+
## Oracle Blogs
2122

22-
- [Approaching Zero Trust Security with Oracle Cloud Infrastructure](https://www.oracle.com/a/ocom/docs/whitepaper-zero-trust-security-oci.pdf)
23-
- How Oracle Cloud Infrastructure can help organizations adopt a Zero Trust Security model as recommended by the UK National Cyber Security Centre’s 8 principles
23+
- [Quick tip 10: MFA user enrollment status within OCI IAM](https://blogs.oracle.com/cloudsecurity/post/quick-tip-10-mfa-user-enrollment-status-within-oci-iam)
24+
- In this quick tip, we look at various options for how you can report on which users have enrolled for MFA within your tenancy.
25+
26+
- [Quick tip 9: My sign-on policy denies access. Help!](https://blogs.oracle.com/cloudsecurity/post/quick-tip-9-my-signon-policy-denies-access-help)
27+
- This blog post looks at what you can do if you make changes to your sign-on policies and lock yourself out of your OCI IAM identity domain.
28+
29+
- [Quick tip 8: Managing authentication through sign-on policies](https://blogs.oracle.com/cloudsecurity/post/quick-tip-8-managing-authentication-through-signon-policies)
30+
- This blog post looks at Sign-on policies and how users are challenged to authenticate.
31+
32+
- [A huge step forward for Security Zones in Oracle Cloud Infrastructure](https://blogs.oracle.com/cloudsecurity/post/a-huge-step-forward-for-security-zones-in-oci)
33+
- This blog post will examine changes to customize a security recipe for a security zone and help you understand the benefits that the new approach has.
34+
35+
- [Native Cloud Security Services or Heterogeneous Tools?](https://blogs.oracle.com/cloudsecurity/post/native-cloud-security-services-or-heterogeneous-tools)
36+
- This blog post examines the common question of whether should you use existing security tools, which can monitor all your different cloud environments, not just OCI, or should you use OCI-native security services.
2437

25-
### Oracle Webinars
38+
## Cloud Coaching Webinars
2639

40+
- [Security-First approach for your OCI Tenancy](https://www.youtube.com/watch?v=ZB87VUcK6Tg)
41+
- Watch this webinar to learn about the top security misconfigurations organizations should avoid when using cloud services and follow the Oracle Cloud Infrastructure Security Best practices!
42+
43+
- [Securely Run and Optimize Oracle Workloads](https://community.oracle.com/customerconnect/events/604745-oci-securely-run-and-optimize-oracle-workloads)
44+
- Watch this webinar to learn Oracle-recommended best practices as a secure foundation for every OCI implementation. The best practices apply to both new and existing OCI tenancies and should be implemented in addition to workload-related security requirements
45+
46+
- [Offloading Oracle Identity Management](https://www.youtube.com/watch?v=MdA_M2JnoxM)
47+
- In this session, you will see how Oracle’s Identity and Access Management cloud services will enable you to accelerate the development and deployment of your applications to Oracle Cloud Infrastructure by taking advantage of an enterprise-class identity management service built on open standards.
48+
49+
- [OCI Monitoring Integration with 3rd party SIEM](https://www.youtube.com/watch?v=UPdPZPWOZIs)
50+
- In this session, you will see how to integrate your existing SIEM with the OCI Monitoring Capabilities following a well-known pattern.
51+
52+
- [Myth #3 My workload is too sensitive to put into the Public Cloud](https://go.oracle.com/LP=133641?elqCampaignId=372556)
53+
- In this third episode, we will cover: Oracle’s approach to security within OCI and Adopting a zero-trust security model as recommended by industry compliance standards
54+
2755
- [Oracle Espresso - Be More Resilient Against Ransomware Attacks](https://go.oracle.com/LP=114881?elqCampaignId=312068#On-Demand-Webinars)
28-
- The webinar adresses a number of design architectures, best practices, automation tooling, and services for your inspiration and consideration. Let us show you how to become more resilient in a systematic and consistent way.
56+
- The webinar addresses a number of design architectures, best practices, automation tooling, and services for your inspiration and consideration. Let us show you how to become more resilient in a systematic and consistent way.
2957
- [Cybersecurity First: why Security is better in the cloud](https://go.oracle.com/LP=122806?)
3058
- Join us to hear from Oracle Security expert, how your solutions could benefit from OCI built-in security.
3159
- [OCI Tech Talk - OCI Strategy Update and Security Deep Dive](https://videohub.oracle.com/media/t/1_s6juw6by)
32-
- Watch this webinar as the Oracle experts will briefly go through some of the latest updates of OCI, before going in depth into the security topic. Oracle believes security should be foundational and built-in, and customers shouldn’t be forced to make tradeoffs between security and cost.
60+
- Watch this webinar as the Oracle experts will briefly go through some of the latest updates of OCI, before going in-depth into the security topic. Oracle believes security should be foundational and built-in, and customers shouldn’t be forced to make tradeoffs between security and cost.
3361

34-
35-
## Useful Links
62+
## Oracle Live Labs
63+
64+
- [Security workshop for ORDS Deployment](https://apexapps.oracle.com/pls/apex/r/dbpm/livelabs/run-workshop?p210_wid=3338&p210_wec=&session=107996902425576)
65+
- This hands-on workshop lab will help you understand how to set up a standalone ORDS (Oracle REST Data Services) server on OCI in a secure way, protecting all the resources involved through bastion services, private end-point ADB-S database, API Gateway, and monitoring with Oracle Data Safe.
66+
67+
# Useful Links
3668

3769
- [Business Report: The mission of the Cloud-Centric CISO](https://www.oracle.com/a/ocom/docs/cloud/mission-of-the-cloud-centric-ciso-report.pdf)
3870
- Uncovering the Cyberleader Priorities and Challenges from the Oracle and KPMG Cloud Threat Report
39-
- [Cloud security trends to safeguard your enterprise](https://www.oracle.com/security/cloud-security/what-is-cloud-security/security-trends/)
40-
- This ebook explores trends in how some organizations are using cloud services to address security challenges and provides ideas for how IT and security leaders can simplify and strengthen their security posture
4171
- [Oracle Trust Center](https://www.oracle.com/trust/)
4272
- Contains a range of useful documents and links to various security, privacy, and compliance resources. Includes links to monitor the availability of Oracle Cloud.
43-
- [Oracle Security](https://www.oracle.com/security/)
44-
- Protect your most valuable data in the cloud and on-premises with Oracle’s security-first approach. Oracle has decades of experience securing data and applications; Oracle Cloud Infrastructure delivers a more secure cloud to our customers, building trust and protecting their most valuable data.
4573
- [Oracle Cloud Compliance](https://www.oracle.com/corporate/cloud-compliance/)
4674
- Oracle is committed to helping customers operate globally in a fast-changing business environment and address the challenges of an ever more complex regulatory environment.
75+
- [Incorporate Cyber-Resilience Capabilities Into Your OCI Tenancy](https://docs.oracle.com/en/solutions/oci-tenancy-cyber-resilience-architecture/plan1.html#GUID-EA9C17F4-BBB0-4D16-A2B8-D55EF7741BC2)
76+
- Refer to this article to learn about Cyber-Resilience capabilities in OCI
4777

4878
# License
4979

0 commit comments

Comments
 (0)