Cloud Touts End-to-End Security for Customers
addition to the self-securing and self-patching capabilities of Oracle
Autonomous Database and with the integration of machine learning and
intelligent automation to remediate threats, these new cloud services
allow customers to improve the security of applications deployed on the
next generation of Oracle Cloud Infrastructure. The new cloud services
include a Web Application Firewall (WAF) to protect against attacks on
web traffic, Distributed Denial-of-Service (DDoS) protection to stop
outside parties from disrupting running applications, an integrated
Cloud Access Security Broker (CASB) which monitors and enforces secure
configurations, and a Key Management Service (KMS) that allows customers
to control the encryption of their data.
•Web Application Firewall (WAF). The native WAF is designed to protect next generation Oracle Cloud Infrastructure applications against botnets, application attacks and DDoS attacks. The platform can then automatically respond to threats by blocking them and alerting security operations teams for further investigation.
•Distributed Denial of Service (DDoS) Protection. As part of the next generation of Oracle Cloud Infrastructure, all Oracle data centers get automated DDoS attack detection and mitigation of high volume, Layer 3/4 DDoS attacks. This helps ensure the availability of Oracle network resources even when under sustained attack.
•Cloud Access Security Broker (CASB). Keeping a cloud environment secure requires constant monitoring and enforcement to ensure that no one has set up an insecure network or left data unprotected. Oracle Cloud Access Security Broker (CASB) constantly checks OCI environments to help make sure that corporate security practices are being followed. It comes with preconfigured policies and controls so that customers can deploy applications faster while reducing security and operational risk. CASB also leverages machine learning-based behavioral analytics to predict threats.
•Key Management Service. Oracle Key Management enables enterprises to encrypt data using keys that they control and offers centralized key management and key lifecycle monitoring capabilities. The solution delivers partitions in highly available and certified Hardware Security Modules that are isolated per customer. It is ideal for organizations that need to verify for regulatory compliance and security governance purposes that their data is encrypted where it is stored.