|
1 | 1 | { |
2 | 2 | "Provider": "oraclecloud", |
3 | 3 | "CheckID": "analytics_instance_access_restricted", |
4 | | - "CheckTitle": "Ensure Oracle Analytics Cloud (OAC) access is restricted to allowed sources or deployed within a Virtual Cloud Network", |
5 | | - "CheckType": [ |
6 | | - "Software and Configuration Checks", |
7 | | - "Industry and Regulatory Standards", |
8 | | - "CIS OCI Foundations Benchmark" |
9 | | - ], |
| 4 | + "CheckTitle": "Oracle Analytics Cloud instance is deployed within a Virtual Cloud Network or restricts public access to allowed sources", |
| 5 | + "CheckType": [], |
10 | 6 | "ServiceName": "analytics", |
11 | 7 | "SubServiceName": "", |
12 | | - "ResourceIdTemplate": "oci:analytics:instance", |
| 8 | + "ResourceIdTemplate": "", |
13 | 9 | "Severity": "high", |
14 | 10 | "ResourceType": "AnalyticsInstance", |
15 | | - "Description": "Oracle Analytics Cloud access should be restricted or deployed in VCN.", |
16 | | - "Risk": "Not meeting this network security requirement increases risk of unauthorized access.", |
17 | | - "RelatedUrl": "https://docs.oracle.com/en-us/iaas/Content/Network/home.htm", |
| 11 | + "Description": "Oracle Analytics Cloud endpoints are evaluated for **network exposure**. Public endpoints must use **restricted allowlists** of specific IPs/CIDRs; presence of `0.0.0.0/0` or no allowed sources indicates unrestricted access. Instances using a **VCN/private endpoint** or public endpoints limited to specific sources align with the intended exposure model.", |
| 12 | + "Risk": "Unrestricted OAC endpoints allow Internet-wide access to the login surface, enabling **credential stuffing** and **brute force**. Account takeover can expose **reports and data sources** (**confidentiality**), permit **dashboard/model changes** (**integrity**), and support **lateral movement** into connected systems.", |
| 13 | + "RelatedUrl": "", |
| 14 | + "AdditionalURLs": [ |
| 15 | + "https://docs.public.content.oci.oraclecloud.com/en-us/iaas/analytics-cloud/doc/public-endpoints-and-access-control-rules.html", |
| 16 | + "https://docs.oracle.com/en/cloud/paas/analytics-cloud/acsds/connect-databases-deployed-public-ip-address.html", |
| 17 | + "https://docs.oracle.com/en/cloud/paas/analytics-cloud/acoci/top-faqs-public-or-private-endpoint-security.html", |
| 18 | + "https://docs.oracle.com/en/cloud/paas/analytics-cloud/acoci/manage-ingress-access-rules-public-endpoint-using-console.html", |
| 19 | + "https://docs.oracle.com/en-us/iaas/analytics-cloud/doc/public-endpoints-and-access-control-rules.html" |
| 20 | + ], |
18 | 21 | "Remediation": { |
19 | 22 | "Code": { |
20 | 23 | "CLI": "", |
21 | 24 | "NativeIaC": "", |
22 | | - "Other": "", |
23 | | - "Terraform": "" |
| 25 | + "Other": "1. In OCI Console, go to Analytics & AI > Analytics Cloud and select your instance\n2. On Instance Details, under Network Access, click Edit next to Access Control\n3. Remove any 0.0.0.0/0 entry (if present)\n4. Add an access rule with the specific allowed public IP or CIDR\n5. Click Save", |
| 26 | + "Terraform": "```hcl\nresource \"oci_analytics_analytics_instance\" \"example\" {\n compartment_id = \"<example_resource_id>\"\n name = \"<example_resource_name>\"\n feature_set = \"ENTERPRISE_ANALYTICS\"\n license_type = \"LICENSE_INCLUDED\"\n idcs_access_token = \"<example_resource_id>\"\n\n capacity {\n capacity_type = \"OLPU_COUNT\"\n capacity_value = 1\n }\n\n network_endpoint_details {\n network_endpoint_type = \"PUBLIC\"\n whitelisted_ips = [\"<example_resource_id>\"] # Critical: restrict to specific allowed CIDR; not 0.0.0.0/0\n }\n}\n```" |
24 | 27 | }, |
25 | 28 | "Recommendation": { |
26 | | - "Text": "Ensure Oracle Analytics Cloud (OAC) access is restricted to allowed sources or deployed within a Virtual Cloud Network", |
27 | | - "Url": "https://hub.prowler.com/check/oci/analytics_instance_access_restricted" |
| 29 | + "Text": "Prefer **private deployment in a VCN** and apply **least privilege** network access. *If public is required*, enforce **allowlists** to specific IPs/CIDRs and never include `0.0.0.0/0`. Use **private access channels/service gateways**, require **MFA/SSO**, and apply **defense in depth** (WAF, audit monitoring) to reduce exposure.", |
| 30 | + "Url": "https://hub.prowler.com/check/analytics_instance_access_restricted" |
28 | 31 | } |
29 | 32 | }, |
30 | 33 | "Categories": [ |
31 | | - "network-security" |
| 34 | + "internet-exposed", |
| 35 | + "trust-boundaries" |
32 | 36 | ], |
33 | 37 | "DependsOn": [], |
34 | 38 | "RelatedTo": [], |
|
0 commit comments