Skip to content

Commit c87e666

Browse files
committed
updated security readme
1 parent 8a6cf71 commit c87e666

File tree

1 file changed

+16
-31
lines changed

1 file changed

+16
-31
lines changed

security/README.md

Lines changed: 16 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -2,52 +2,37 @@
22

33
The Technology Engineering Security Specialists team provides end-end Oracle security specialists coverage through Field CISO,Security Design and IAM sub-areas. Our specialists work closely with Infra Security and Data Security specialists with a mission to transform the IT landscape of strategic customers into a secure, compliant, resilient, and successful workload deployment by evangelizing and applying Oracle’s leading security best practices and services.
44

5+
Reviewed: 01.02.2024
6+
57
# Table of Contents
68

79
1. [Team Publications](#team-publications)
810
2. [Useful Links](#useful-links)
9-
3. [Reusable Assets Overview](#reusable-assets-overview)
1011

11-
## Team Publications
12+
# Team Publications
1213

13-
### Oracle Whitepaper
14+
## Oracle Whitepaper
1415

1516
- [Approaching Zero Trust Security with Oracle Cloud Infrastructure](https://www.oracle.com/a/ocom/docs/whitepaper-zero-trust-security-oci.pdf)
1617
- How Oracle Cloud Infrastructure can help organizations adopt a Zero Trust Security model as recommended by the UK National Cyber Security Centre’s 8 principles
1718

18-
### Oracle Blogs
19-
20-
- [Native Cloud Security Services or Heterogeneous Tools?](https://blogs.oracle.com/cloudsecurity/post/native-cloud-security-services-or-heterogeneous-tools)
21-
- Read this article to hear our expert's view on “I’m deploying workloads in Oracle Cloud Infrastructure (OCI) but I already have several, existing security tools. Should I use those, which can monitor all my different cloud environments, not just OCI, or should I use OCI-native security services?”
22-
- [Quick tip 8: Managing authentication through sign-on policies](https://blogs.oracle.com/cloudsecurity/post/quick-tip-8-managing-authentication-through-signon-policies)
23-
- This article is on IAM but focuses on authentication. Sign-on policies control how users are challenged to authenticate and under what circumstances they’re allowed to access integrated applications.
24-
- [A huge step forward for Security Zones in Oracle Cloud Infrastructure](https://blogs.oracle.com/cloudsecurity/post/a-huge-step-forward-for-security-zones-in-oci)
25-
- Oracle announced custom Security Zones, which, as the name suggests, enables you to customize the security zone policies (referred to as recipes), disabling rules that are not appropriate for your deployments.
19+
## Oracle Blogs
20+
21+
- [Zero Trust Security - Not a buzz word; but elixir of Cyber Security?](https://blogs.oracle.com/cloudsecurity/post/zero-trust-security-elixir-of-cyber-security)
22+
- We hear very frequently of our customers’ plans to adopt zero trust model to improve their overall approach to cyber security. Read this blog to understand how Oracle Cloud Infrastructure (OCI) can help accelerate your Zero Trust Security journey.
23+
2624
27-
### OCI Architecture Center
28-
29-
- [Enhance the user experience by deploying your custom sign-in application on OKE](https://docs.oracle.com/en/solutions/enhance-ux-custom-signin-app-oke/index.html)
30-
- You can display your organization's own URL during employee sign-in instead of using the cloud service provider's standard URL by hosting your custom sign-in application in your own domain.
31-
- [OCVS Security - Data Protection](https://docs.oracle.com/en/solutions/oci-security-ocvs/index.html#GUID-A59FC475-6C3B-4589-8151-4ED088E4AC91)
32-
- This reference architecture describes the integration options for Oracle Cloud VMware Solution with OCI Data Protection layer and security services to address the requirements for running critical and sensitive workloads.
33-
- [Connect Oracle Data Safe to Exadata and Autonomous Databases](https://docs.oracle.com/en/solutions/data-safe-exadata-adb/index.html)
34-
- This reference architecture highlights the different ways you can connect Exadata and Autonomous databases to Oracle Data Safe. It also describes the security measures you need to take to provide a safe deployment of a connection to a specific target database.
35-
36-
### Cloud Coaching Webinars - [Oracle Learning Library YouTube](https://www.youtube.com/@OracleLearning)
37-
38-
- [Security-First approach for your OCI Tenancy](https://www.youtube.com/watch?v=ZB87VUcK6Tg)
39-
- Join us and you will learn about the top security misconfigurations organizations should avoid when using cloud services and follow the Oracle Cloud Infrastructure Security Best practices!
40-
- [Offloading Identity Management](https://www.youtube.com/watch?v=MdA_M2JnoxM)
41-
- In this session, you will see how Oracle’s Identity and Access Management cloud services will enable you to accelerate the development and deployment of your applications to Oracle Cloud Infrastructure by taking advantage of an enterprise-class identity management service built on open standards.
42-
- [OCI Monitoring with 3rd Party SIEM](https://www.youtube.com/watch?v=UPdPZPWOZIs)
43-
- In this session, you will see how to integrate your existing SIEM with the OCI Monitoring Capabilities following a well-known pattern.
25+
## Cloud Coaching Webinars
26+
27+
- [Oracle's Approach To Cloud Security](https://community.oracle.com/customerconnect/events/604931-oci-oracles-approach-to-cloud-security)
28+
- Refer to this webinar from our Field CISO Speciailsts to understand about what is Oracle's approach to Cloud Security and how the security pillar focuses on protecting users, safeguarding data, and meeting regulatory and compliance requirements.
4429

45-
## Useful Links
30+
# Useful Links
4631

4732
- [Oracle Security](https://www.oracle.com/security/)
4833
- Protect your most valuable data in the cloud and on-premises with Oracle’s security-first approach. Oracle has decades of experience securing data and applications; Oracle Cloud Infrastructure delivers a more secure cloud to our customers, building trust and protecting their most valuable data.
49-
- [Oracle Cloud Compliance](https://www.oracle.com/corporate/cloud-compliance/)
50-
- Oracle is committed to helping customers operate globally in a fast-changing business environment and address the challenges of an ever more complex regulatory environment.
34+
- [Oracle Cloud Adoption Framework](https://docs.oracle.com/en-us/iaas/Content/cloud-adoption-framework/home.htm)
35+
- The Oracle Cloud Infrastructure Cloud Adoption Framework provides best practices and a structured approach to help your organization successfully adopt the cloud.
5136

5237
# License
5338

0 commit comments

Comments
 (0)