Oracle Cloud Guard Service Overview

by Ashish Malik, Manager, Professsional Services Delivery, Rackspace Technology

I have been working on Oracle Cloud technologies since 2018 and based on my experience, the goal of the cloud vendor is to educate customers about the potential benefits of the cloud and their IT teams of its implementation and migrations.

Post knowledge transfer from cloud vendors to customers in 20-21, we saw a sudden surge in vulnerabilities in 2022, and the software vendors came up with fixes for these new vulnerabilities. It would not be wrong to declare, “Security” as the theme for 2022, considering the number of vulnerabilities and their patches/fixes being announced. As many of these software are running on cloud, it becomes the duty of cloud vendor to provide the required security tools to their customers to safeguard their data. 
It might be possible that a user may miss out on the new security releases, or the customer has a small IT team or there is no dedicated cyber security specialist. In such scenarios, the customer stands to lose out. Keeping these gaps in the security arsenal and many more factors in mind, Oracle came up with their latest offering named called Cloud Guard.

Oracle Cloud 1

Image Source 

Oracle Cloud Guard has been created to protect the entire Infrastructure portfolio of the customer. With the help of Oracle Cloud Guard, customers can see the potential security problems in their whole tenancy in a summary to get a quick Security overview of their tenancy.

Oracle Cloud Guard also provides detailed navigation of problems categorized as Critical, High, Medium, Low, etc. It also provides the risk scores and actionable items as per the threat priority to resolve security issues in the tenancy.

Oracle has enriched Cloud Guard with security expertise through Inbuilt recipes (Detector & Responder recipes) that it can, not only detect Cloud Security Issues but can also automate their remediation.

There are two kinds of detector recipes available in Cloud Guard: 

  1. Configuration Detector: This can detect changes in Cloud Configuration.
  2. Activity Detector: This can detect changes in user activity.

With the help of these Detector Recipes, Cloud Guard detects & reports insecure configurations as problems such as a compute having a public IP address.

Cloud Guard scans the tenancy for potential security threats, which are detected with the help of Detector Recipes, by turning them into actionable items and then responding to them with the help of pre-defined Responder recipes. 

Oracle Picture 2
Oracle Picture 3

The entire Detector & Responder recipe structure has been designed to automate the response to security threats and minimize any kind of delay. With the help of these Detector and Responder recipes, we can clone them and further finetune them as per our requirements.

Oracle has recently Integrated Cloud guard with its two other security products i.e. OCI Vulnerability Scanning Service & Data Safe. With Oracle Cloud Guard’s tight integration with OCI Vulnerability Scanning Service, it’s now able to easily detect misconfigurations and identify possible vulnerabilities across various resources throughout the tenancy.

With its integration with Data Safe, Cloud Guard can monitor database’s and with its pre-tailored Detector Recipe’s it can easily identify potential security problems. DBA’s can then investigate those issues and resolve them at the earliest to further strengthen the Database security posture.

Conclusion

With Oracle Cloud Guard Security Administrators, one can automate the identification and remediation of the issues before it gets out of hand.

Learn More about Rackspace Oracle Services