You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: security/README.md
+16-9Lines changed: 16 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,28 +17,35 @@ The Technology Engineering Security Specialists team provides end-end Oracle sec
17
17
18
18
### Oracle Blogs
19
19
20
+
-[Native Cloud Security Services or Heterogeneous Tools?](https://blogs.oracle.com/cloudsecurity/post/native-cloud-security-services-or-heterogeneous-tools)
21
+
- Read this article to hear our experts view on “I’m deploying workloads in Oracle Cloud Infrastructure (OCI) but I already have several, existing security tools. Should I use those, which can monitor all my different cloud environments, not just OCI, or should I use OCI-native security services?”
22
+
-[Quick tip 8: Managing authentication through sign-on policies](https://blogs.oracle.com/cloudsecurity/post/quick-tip-8-managing-authentication-through-signon-policies)
23
+
- This article is on IAM but focusing on authentication. Sign-on policies control how users are challenged to authenticate and under what circumstances they’re allowed to access integrated applications.
20
24
-[A huge step forward for Security Zones in Oracle Cloud Infrastructure](https://blogs.oracle.com/cloudsecurity/post/a-huge-step-forward-for-security-zones-in-oci)
21
25
- Oracle announced custom Security Zones, which, as the name suggests, enables you to customise the security zone policies (referred to as recipes), disabling rules that are not appropriate for your deployments.
22
-
23
-
-[New Oracle Data Safe Reference Architectures to Quickly Secure Your Databases](https://blogs.oracle.com/cloudsecurity/post/oracle-data-safe-architectures-to-quickly-secure-your-databases)
24
-
- Are you concerned about data safety and security? Whether it’s your customers’ or employees’ data, Oracle Database customers can help reduce the risk of a data breach and simplify compliance by using Oracle Data Safe.
25
26
26
27
### OCI Architecture Center
27
28
28
-
-[Connect Oracle Data Safe to Exadata and Autonomous Databases](https://docs.oracle.com/en/solutions/data-safe-exadata-adb/index.html)
29
+
-[Enhance user experience by deploying your custom sign-in application on OKE](https://docs.oracle.com/en/solutions/enhance-ux-custom-signin-app-oke/index.html)
30
+
- You can display your organization's own URL during employee sign in instead of using the cloud service provider's standard URL by hosting your custom sign-in application in your own domain.
31
+
-[OCVS Security - Data Protection](https://docs.oracle.com/en/solutions/oci-security-ocvs/index.html#GUID-A59FC475-6C3B-4589-8151-4ED088E4AC91)
32
+
- This reference architecture describes the integration options for Oracle Cloud VMware Solution with OCI Data Protection layer and security services to address the requirements for running critical and sensitive workloads.
33
+
-[Connect Oracle Data Safe to Exadata and Autonomous Databases](https://docs.oracle.com/en/solutions/data-safe-exadata-adb/index.html)
29
34
- This reference architecture highlights the different ways you can connect Exadata and Autonomous databases to Oracle Data Safe. It also describes the security measurements you need take to provide a safe deployment of a connection to a specific target database.
-[Security-First approach for your OCI Tenancy](https://www.youtube.com/watch?v=ZB87VUcK6Tg)
39
+
- Join us and you will learn about the top security misconfigurations organizations should avoid when using cloud services and follow the Oracle Cloud Infrastructure Security Best practices!
- In this session, you will see how Oracle’s Identity and Access Management cloud services will enable you to accelerate the development and deployment of your applications to Oracle Cloud Infrastructure by taking advantage of an enterprise-class identity management service built on open standards.
35
-
36
-
42
+
-[OCI Monitoring with 3rd Party SIEM](https://www.youtube.com/watch?v=UPdPZPWOZIs)
43
+
- In this session, you will see how to integrate your existing SIEM with the OCI Monitoring Capabilities following a well-known pattern.
- Protect your most valuable data in the cloud and on-premises with Oracle’s security-first approach. Oracle has decades of experience securing data and applications; Oracle Cloud Infrastructure delivers a more secure cloud to our customers, building trust and protecting their most valuable data.
- Oracle is committed to helping customers operate globally in a fast-changing business environment and address the challenges of an ever more complex regulatory environment.
0 commit comments