Skip to content

Commit 13e4866

Browse files
puchy22MrCloudSec
andauthored
chore(oraclecloud): enhance metadata for analytics service (#9114)
Co-authored-by: Sergio Garcia <hello@mistercloudsec.com>
1 parent 7d5c4d3 commit 13e4866

File tree

2 files changed

+22
-16
lines changed

2 files changed

+22
-16
lines changed

prowler/CHANGELOG.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,8 @@ All notable changes to the **Prowler SDK** are documented in this file.
3737
- Update AWS FMS service metadata to new format [(#9005)](https://github.com/prowler-cloud/prowler/pull/9005)
3838
- Update AWS FSx service metadata to new format [(#9006)](https://github.com/prowler-cloud/prowler/pull/9006)
3939
- Update AWS Glacier service metadata to new format [(#9007)](https://github.com/prowler-cloud/prowler/pull/9007)
40+
- Update oraclecloud analytics service metadata to new format [(#9114)](https://github.com/prowler-cloud/prowler/pull/9114)
41+
4042
- Update AWS CodeArtifact service metadata to new format [(#8850)](https://github.com/prowler-cloud/prowler/pull/8850)
4143
- Rename OCI provider to oraclecloud with oci alias [(#9126)](https://github.com/prowler-cloud/prowler/pull/9126)
4244

@@ -49,7 +51,7 @@ All notable changes to the **Prowler SDK** are documented in this file.
4951

5052
---
5153

52-
## [v5.13.1] (Prowler UNRELEASED)
54+
## [v5.13.1] (Prowler v5.13.1)
5355

5456
### Fixed
5557
- Add `resource_name` for checks under `logging` for the GCP provider [(#9023)](https://github.com/prowler-cloud/prowler/pull/9023)

prowler/providers/oraclecloud/services/analytics/analytics_instance_access_restricted/analytics_instance_access_restricted.metadata.json

Lines changed: 19 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,34 +1,38 @@
11
{
22
"Provider": "oraclecloud",
33
"CheckID": "analytics_instance_access_restricted",
4-
"CheckTitle": "Ensure Oracle Analytics Cloud (OAC) access is restricted to allowed sources or deployed within a Virtual Cloud Network",
5-
"CheckType": [
6-
"Software and Configuration Checks",
7-
"Industry and Regulatory Standards",
8-
"CIS OCI Foundations Benchmark"
9-
],
4+
"CheckTitle": "Oracle Analytics Cloud instance is deployed within a Virtual Cloud Network or restricts public access to allowed sources",
5+
"CheckType": [],
106
"ServiceName": "analytics",
117
"SubServiceName": "",
12-
"ResourceIdTemplate": "oci:analytics:instance",
8+
"ResourceIdTemplate": "",
139
"Severity": "high",
1410
"ResourceType": "AnalyticsInstance",
15-
"Description": "Oracle Analytics Cloud access should be restricted or deployed in VCN.",
16-
"Risk": "Not meeting this network security requirement increases risk of unauthorized access.",
17-
"RelatedUrl": "https://docs.oracle.com/en-us/iaas/Content/Network/home.htm",
11+
"Description": "Oracle Analytics Cloud endpoints are evaluated for **network exposure**. Public endpoints must use **restricted allowlists** of specific IPs/CIDRs; presence of `0.0.0.0/0` or no allowed sources indicates unrestricted access. Instances using a **VCN/private endpoint** or public endpoints limited to specific sources align with the intended exposure model.",
12+
"Risk": "Unrestricted OAC endpoints allow Internet-wide access to the login surface, enabling **credential stuffing** and **brute force**. Account takeover can expose **reports and data sources** (**confidentiality**), permit **dashboard/model changes** (**integrity**), and support **lateral movement** into connected systems.",
13+
"RelatedUrl": "",
14+
"AdditionalURLs": [
15+
"https://docs.public.content.oci.oraclecloud.com/en-us/iaas/analytics-cloud/doc/public-endpoints-and-access-control-rules.html",
16+
"https://docs.oracle.com/en/cloud/paas/analytics-cloud/acsds/connect-databases-deployed-public-ip-address.html",
17+
"https://docs.oracle.com/en/cloud/paas/analytics-cloud/acoci/top-faqs-public-or-private-endpoint-security.html",
18+
"https://docs.oracle.com/en/cloud/paas/analytics-cloud/acoci/manage-ingress-access-rules-public-endpoint-using-console.html",
19+
"https://docs.oracle.com/en-us/iaas/analytics-cloud/doc/public-endpoints-and-access-control-rules.html"
20+
],
1821
"Remediation": {
1922
"Code": {
2023
"CLI": "",
2124
"NativeIaC": "",
22-
"Other": "",
23-
"Terraform": ""
25+
"Other": "1. In OCI Console, go to Analytics & AI > Analytics Cloud and select your instance\n2. On Instance Details, under Network Access, click Edit next to Access Control\n3. Remove any 0.0.0.0/0 entry (if present)\n4. Add an access rule with the specific allowed public IP or CIDR\n5. Click Save",
26+
"Terraform": "```hcl\nresource \"oci_analytics_analytics_instance\" \"example\" {\n compartment_id = \"<example_resource_id>\"\n name = \"<example_resource_name>\"\n feature_set = \"ENTERPRISE_ANALYTICS\"\n license_type = \"LICENSE_INCLUDED\"\n idcs_access_token = \"<example_resource_id>\"\n\n capacity {\n capacity_type = \"OLPU_COUNT\"\n capacity_value = 1\n }\n\n network_endpoint_details {\n network_endpoint_type = \"PUBLIC\"\n whitelisted_ips = [\"<example_resource_id>\"] # Critical: restrict to specific allowed CIDR; not 0.0.0.0/0\n }\n}\n```"
2427
},
2528
"Recommendation": {
26-
"Text": "Ensure Oracle Analytics Cloud (OAC) access is restricted to allowed sources or deployed within a Virtual Cloud Network",
27-
"Url": "https://hub.prowler.com/check/oci/analytics_instance_access_restricted"
29+
"Text": "Prefer **private deployment in a VCN** and apply **least privilege** network access. *If public is required*, enforce **allowlists** to specific IPs/CIDRs and never include `0.0.0.0/0`. Use **private access channels/service gateways**, require **MFA/SSO**, and apply **defense in depth** (WAF, audit monitoring) to reduce exposure.",
30+
"Url": "https://hub.prowler.com/check/analytics_instance_access_restricted"
2831
}
2932
},
3033
"Categories": [
31-
"network-security"
34+
"internet-exposed",
35+
"trust-boundaries"
3236
],
3337
"DependsOn": [],
3438
"RelatedTo": [],

0 commit comments

Comments
 (0)