You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: security/README.md
+19-8Lines changed: 19 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,22 +18,33 @@ The Technology Engineering Security Specialists team provides end-end Oracle sec
18
18
### Oracle Blogs
19
19
20
20
-[A huge step forward for Security Zones in Oracle Cloud Infrastructure](https://blogs.oracle.com/cloudsecurity/post/a-huge-step-forward-for-security-zones-in-oci)
21
-
- Oracle announced custom Security Zones, which, as the name suggests, enables you to customise the security zone policies (referred to as recipes), disabling rules that are not appropriate for your deployments.
21
+
- Oracle announced custom Security Zones, which, as the name suggests, enables you to customise the security zone policies (referred to as recipes), disabling rules that are not appropriate for your deployments.
22
+
23
+
-[New Oracle Data Safe Reference Architectures to Quickly Secure Your Databases](https://blogs.oracle.com/cloudsecurity/post/oracle-data-safe-architectures-to-quickly-secure-your-databases)
24
+
- Are you concerned about data safety and security? Whether it’s your customers’ or employees’ data, Oracle Database customers can help reduce the risk of a data breach and simplify compliance by using Oracle Data Safe.
22
25
23
-
### <Category B (OPTIONAL)>
26
+
### OCI Architecture Center
27
+
28
+
-[Connect Oracle Data Safe to Exadata and Autonomous Databases](https://docs.oracle.com/en/solutions/data-safe-exadata-adb/index.html)
29
+
- This reference architecture highlights the different ways you can connect Exadata and Autonomous databases to Oracle Data Safe. It also describes the security measurements you need take to provide a safe deployment of a connection to a specific target database.
- In this session, you will see how Oracle’s Identity and Access Management cloud services will enable you to accelerate the development and deployment of your applications to Oracle Cloud Infrastructure by taking advantage of an enterprise-class identity management service built on open standards.
- Protect your most valuable data in the cloud and on-premises with Oracle’s security-first approach. Oracle has decades of experience securing data and applications; Oracle Cloud Infrastructure delivers a more secure cloud to our customers, building trust and protecting their most valuable data.
- Oracle is committed to helping customers operate globally in a fast-changing business environment and address the challenges of an ever more complex regulatory environment.
32
44
33
45
## Reusable Assets Overview
34
46
35
-
<OPTIONAL - remove if not needed>
36
-
<If you don't have a flat hierarchy for assets, please describe your structure>
0 commit comments