Updates to the OCI CAF Security Pillar deliver enhanced documentation for multi-layered cloud security

August 4, 2022 | 3 minute read
Fabio Bonisoli
Sr. Principal Product Manager
Steven Chan
Senior Principal Product Manager, OCI Multicloud Enablement
Text Size 100%:

The two-sided challenge to cloud adoption

Regardless of the industry, sector, or size of your business, cloud technology is changing how we think about security. Enterprises increasingly look to cloud computing as a means to modernize, improve security and business continuity, and stay competitive.

According to the latest MIT study for Oracle Cloud Infrastructure (OCI), 80% of enterprises are considering significant technology overhauls and modernization motions post pandemic. 60% of global enterprises plan to move IT functions to the cloud. This points to a robust trend to modernize, enhance business operations and increase performance efficiencies. Thus, the scalability of cloud adoption is critical to innovation and growth, yet there are still two different mindsets when it comes to security in the cloud.

Some organizations may choose to delay or block cloud adoption altogether—claiming that their security concerns are not fully addressed or that critical data must remain on-premises. However, this decision may be undermining the security of their business, as modern security services rely increasingly on the performance and agility the cloud offers, which many on-premises solutions can’t match.

Other companies quickly adopt a cloud-first strategy, looking to benefit from the cost savings, performance, and scalability of cloud technology. Although they seem to be happy with the results, they may overlook security loopholes, leading to unresolved security threats that could leave them open to unforeseen risks.

How do you bridge the gap between meeting business needs and maintaining a strong security posture?

Collaborate with your Chief Information Security Officer and security teams from the beginning of the cloud adoption initiative. By working together, you can create a framework of strategic steps, such as those detailed in the OCI Cloud Adoption Framework (CAF), that will provide your business with a clear blueprint for fast, cost-efficient, and secure cloud adoption.

What’s new in the OCI CAF documentation

The OCI CAF offers scalable solutions for organizations that want to accelerate their use of cloud infrastructure and strengthen their security posture. The CAF consists of six Pillars of Success: Business strategy, People strategy, Security, Process design, Technology implementation, and Management and operations. These pillars provide organizations with a clear path to develop their cloud adoption strategy.

As part of OCI’s continuous commitment to strengthening the Security pillar, the following five articles were recently updated:

  • Design Guidance for IAM Security Structure: Building an Identity and Access Management (IAM) structure is a good place to start when it comes to securing your tenancy before deploying multiple resources on OCI. Separating duties and resources can help organizations mitigate management risk and establish a security approach for future growth. This CAF article offers guidance for securing OCI tenancies, including the architecture and key design considerations. 

  • Security Strategy: Start Your Security Operations in OCI: In this article, you’ll find information and guidance about implementing services like Cloud Guard and Security Zones that enable security operations teams to enhance their cloud security posture.

  • DevOps Security Challenges and Considerations: Applying DevSecOps in OCI: This article introduces the DevSecOps methodology and provides guidance for using the OCI DevOps service to simplify and automate the software development lifecycle. The goals of a DevOps strategy are to increase efficiency and speed up deployment production. And since the same holds true for DevSecOps, adding on the main objective of securing the components used in various deployment processes is equally an important part of the adoption strategy.

  • Design Guidance for SIEM Integration: Part of a defense in depth multi-layered security approach is an effective security information and event management (SIEM) platform. This article includes guidance on log consolidation with the OCI Logging service and a third-party reference architecture that demonstrates how you can use logs captured from OCI services with existing third-party SIEMs like Splunk.

  • Security Design: Quick Links: To round out the CAF Security pillar, the Quick Links article features key security services and cloud-native tools. Here, you can find more documentation like Best Practices Framework for OCI, which maps out a design-centric approach to cloud adoption, and OCI Security Guide, which lays out an implementation-centric path, providing quick navigation to our most popular security resources.

Find out more by reaching out to our CAF team

To support customers in their cloud adoption, the OCI CAF Security pillar delivers updates that enable customers to implement multiple layers of security in their cloud environment. Find this and more information on the OCI Cloud Adoption Framework.

In the meantime, don't hesitate to contact the Cloud Adoption Framework team for questions or feedback regarding the OCI CAF.

We look forward to being part of your cloud adoption journey!

Fabio Bonisoli

Sr. Principal Product Manager

Steven Chan

Senior Principal Product Manager, OCI Multicloud Enablement

He has over 20 years of diverse experience as an IT Architect (Enterprise Solutions/Integration/Middleware), DBA, and CRM Programme Lead in the financial, healthcare and sport industries.

Before joining Oracle, he was a Global Cloud Solution Architect at Microsoft, focusing on digital innovation.

Previous Post

OCI is the clear leader in cost-performance for high-performance file systems in the public cloud

Pinkesh Valdria | 2 min read

Next Post

Verifying GDPR requirements: OCI adheres to the EU Code of Conduct Level 2

Christy Thomas | 4 min read