Oracle Cloud Infrastructure Developer 2020 Certified Associate
1 Oracle Cloud Infrastructure (OCI) Overview
1-1 Introduction to OCI
1-2 OCI Architecture
1-3 OCI Regions and Availability Domains
1-4 OCI Services Overview
2 Identity and Access Management (IAM)
2-1 Introduction to IAM
2-2 Users, Groups, and Policies
2-3 Compartments
2-4 Authentication and Authorization
2-5 Federation and Single Sign-On (SSO)
3 Compute Services
3-1 Introduction to Compute Services
3-2 Virtual Machines (VMs)
3-3 Bare Metal Instances
3-4 Instance Configurations and Launch Options
3-5 Autoscaling and Instance Pools
3-6 Management and Monitoring of Compute Instances
4 Networking Services
4-1 Introduction to Networking Services
4-2 Virtual Cloud Networks (VCNs)
4-3 Subnets and Security Lists
4-4 Route Tables and Internet Gateways
4-5 NAT Gateway and Service Gateway
4-6 Load Balancing and DNS Services
5 Storage Services
5-1 Introduction to Storage Services
5-2 Block Volume Storage
5-3 Object Storage
5-4 File Storage Service
5-5 Backup and Disaster Recovery
6 Database Services
6-1 Introduction to Database Services
6-2 Autonomous Database
6-3 Oracle Database Cloud Service
6-4 Exadata Cloud Service
6-5 Backup and Recovery
7 Resource Management
7-1 Introduction to Resource Management
7-2 Terraform and OCI Resource Manager
7-3 Resource Tags and Cost Management
7-4 Monitoring and Logging
8 Security and Compliance
8-1 Introduction to Security and Compliance
8-2 Key Management Service (KMS)
8-3 Vault Service
8-4 Security Zones
8-5 Compliance and Auditing
9 Application Development
9-1 Introduction to Application Development
9-2 Oracle Cloud Infrastructure Registry (OCIR)
9-3 Functions and API Gateway
9-4 Integration and Event Services
9-5 DevOps and CICD Pipelines
10 Monitoring and Management
10-1 Introduction to Monitoring and Management
10-2 Monitoring Services
10-3 Notifications and Alarms
10-4 Logging and Auditing
10-5 Service Limits and Quotas
11 Cost Management
11-1 Introduction to Cost Management
11-2 Cost Analysis and Reports
11-3 Budget Alerts and Notifications
11-4 Reserved Instances and Savings Plans
12 Advanced Topics
12-1 Introduction to Advanced Topics
12-2 Hybrid Cloud and Interconnect
12-3 Data Transfer and Migration
12-4 Edge Services and Content Delivery Network (CDN)
12-5 Machine Learning and AI Services
8 Security and Compliance Explained

8 Security and Compliance Explained

Key Concepts

Understanding Security and Compliance in Oracle Cloud Infrastructure (OCI) involves grasping the following key concepts:

Identity and Access Management (IAM)

IAM in OCI is a comprehensive system for managing user identities and controlling access to resources. It includes features like user authentication, role-based access control (RBAC), and federation with external identity providers.

Example: Think of IAM as a sophisticated keycard system for a high-security building. Each person (user) has a unique keycard (identity), and the system controls which doors (resources) they can access based on their role (RBAC).

Network Security

Network Security in OCI involves protecting the network infrastructure from unauthorized access and attacks. It includes features like Virtual Cloud Networks (VCNs), Network Security Groups (NSGs), and Internet Gateways.

Example: Consider network security as a fortress with multiple layers of defense. The VCN is the outer wall, NSGs are the guards at the gates, and Internet Gateways are the controlled entry points.

Data Encryption

Data Encryption in OCI ensures that data is securely encrypted both at rest and in transit. It uses advanced encryption algorithms and key management services to protect sensitive information.

Example: Think of data encryption as a secure vault for your valuables. Just as a vault locks your valuables to prevent theft, encryption locks your data to prevent unauthorized access.

Security Zones

Security Zones in OCI are isolated environments designed to enforce strict security policies. They are used to segregate highly sensitive workloads and ensure compliance with regulatory requirements.

Example: Consider security zones as separate rooms within a secure facility. Each room (zone) has its own security protocols, ensuring that sensitive operations (workloads) are protected from external threats.

Compliance and Auditing

Compliance and Auditing in OCI involve ensuring that the infrastructure meets regulatory standards and can be audited for compliance. It includes features like audit logs, compliance reports, and integration with compliance tools.

Example: Think of compliance and auditing as a compliance officer checking the records of a company. The audit logs are the records, compliance reports are the summaries, and the compliance tools are the checklists.

Security Policies

Security Policies in OCI define the rules and permissions for accessing and managing resources. They are used to enforce security best practices and ensure that only authorized users can perform specific actions.

Example: Consider security policies as the rules of a game. Just as the rules define how the game is played, security policies define how resources are accessed and managed.

Threat Intelligence

Threat Intelligence in OCI provides insights into potential security threats and vulnerabilities. It uses advanced analytics and machine learning to detect and mitigate threats before they can cause harm.

Example: Think of threat intelligence as a security analyst monitoring the news for potential threats. The analyst uses the latest information (intelligence) to prepare for and respond to threats.

Incident Response

Incident Response in OCI involves the processes and tools used to detect, respond to, and recover from security incidents. It includes automated alerts, incident management workflows, and post-incident analysis.

Example: Consider incident response as a fire department responding to a fire. The fire department detects the fire (incident), responds quickly to extinguish it, and conducts an analysis to prevent future fires.

By understanding and implementing these security and compliance concepts, you can ensure the protection and resilience of your Oracle Cloud Infrastructure environment.