Which two security capabilities are offered by Oracle Cloud Infrastructure?
Oracle Cloud Infrastructure's security approach is based on seven core pillars. Each pillar has multiple solutions designed to maximize the security and compliance of the platform and to help customers to improve their security posture.
High Availability:Offer fault-independent data centers that enable high-availability scale-out architectures and are resilient against network attacks, ensuring constant uptime in the face of disaster and security attack.
Customer Isolation:Allow customers to deploy their application and data assets in an environment that commits full isolation from other tenants and Oracle's staff.
Data Encryption:Protect customerdata at-restandin-transitin a way that allows customers to meet their security and compliance requirements with respect to cryptographic algorithms andkey management.
Security Controls:Offer customers effective and easy-to-use application, platform, and network security solutions that allow them to protect their workloads, have a secure application delivery using a global edge network, constrain access to their services, and segregate operational responsibilities to reduce the risk associated with malicious and accidental user actions.
Visibility:Offer customers comprehensive log data and security analytics that they can use to audit and monitor actions on their resources, allowing them to meet their audit requirements and reduce security and operational risk.
Secure Hybrid Cloud:Enable customers to use their existing security assets, such as user accounts and policies, as well as third-party security solutions, when accessing their cloud resources and securing their data and application assets in the cloud.
Verifiably Secure Infrastructure:Follow rigorous processes and use effective security controls in all phases of cloud service development and operation. Demonstrate adherence to Oracle's strict security standards through third-party audits, certifications, and attestations. Help customers demonstrate compliance readiness to internal security and compliance teams, their customers, auditors, and regulators.
https://docs.cloud.oracle.com/en-us/iaas/Content/Security/Concepts/security_overview.htm
Currently there are no comments in this discussion, be the first to comment!