Effective and manageable cloud security for your most important workloads
We've built our cloud security approach based on seven core pillars to ensure you have the level of isolation, data protection, control and visibility you need for your cloud infrastructure. We deliver a fault-tolerant, resilient and verifiably secure cloud infrastructure that enables integration with your existing security assets.
Core Security Pillars
Read the Oracle Security White Paper to learn more about Oracle's security strategy and our seven core security pillars.
Customer Isolation
Deploy your application and data assets, isolated from other tenants and Oracle.
Data Encryption
Leverage controls to protect your data so that you can meet security and compliance requirements.
Security Controls
Manage access to your services and segregate operational responsibilities to help reduce risk associated with malicious and accidental user actions.
Visibility
Audit and monitor actions on your resources through comprehensive log data and security monitoring solutions to help reduce security and operational risk.
Hybrid Cloud
Use your existing security assets, such as user accounts, policies and third-party security solutions, when accessing cloud resources and securing data and application assets.
High Availability
Take advantage of consistent uptime through fault-tolerant data centers that are resilient against network attacks.
Verifiably Secure Infrastructure
Run business critical workloads on a verifiably secure infrastructure that follows rigorous processes and security controls in all phases of development and operation.
Oracle Cloud Infrastructure Identity and Access Management
Oracle Identity and Access Management (IAM) service lets you control who has access to your cloud resources, what type of access they have, and to which specific resources. Manage complex organizations and rules with logical groups of users and resources, and simple to define policies.
Leverage a single model for authentication and authorization to securely control access and easily manage your IT resources across all Oracle Cloud Infrastructure services.
Oracle Cloud Infrastructure Audit
Oracle Audit provides comprehensive visibility into your Oracle Cloud Infrastructure services. Access all public API activities in your tenancy over the past 365 days at no additional cost.
Automatically log events that can be retrieved, stored, and analyzed for security, compliance, and resource optimization across your Oracle Cloud Infrastructure entitlements and compartments.
Oracle Cloud Infrastructure Key Management
Oracle Cloud Infrastructure Key Management is a managed service that enables you to encrypt your data using keys that you control.
Oracle CASB for Oracle Cloud Infrastructure
Oracle CASB Cloud Service is the only Cloud Access Security Broker that offers full visibility over your Oracle Cloud Infrastructure resources and uses machine learning to help predict threats.
Oracle Cloud Infrastructure Web Application Firewall
The Oracle Cloud Infrastructure Web Application Firewall (WAF) is an enterprise-grade, cloud-based edge security solution that's designed to protect internet-facing applications from cyberattacks. The WAF provides several security services—including bot management and DDoS protection—and uses a layered approach to safeguard websites and web applications against malicious incoming traffic.
The Oracle Cloud Infrastructure Web Application Firewall (WAF) provides web application security for Oracle cloud workloads. But it doesn’t stop there. The WAF can simultaneously protect web applications located within Oracle Cloud Infrastructure, in your data center, and across hybrid and multicloud environments.
The WAF is tightly integrated into the Oracle cloud console along with the many other applications and services, providing ease of use and tight control for Oracle Cloud Infrastructure deployments.

