Shared Security Reponsibility Model

Welcome to our exploration of the Shared Security Model, also known as the Shared Security Responsibility Model. Let’s delve into what this model entails and how it applies to Oracle Cloud Infrastructure (OCI).

Responsibilities in On-Premises vs. Cloud Environments

In a traditional on-premises setup, the onus of security falls entirely on you. This includes safeguarding your data center, physical network, hosts, virtualization, operating systems, employee devices, and applications. Essentially, every aspect of your IT infrastructure requires your attention and protection.

However, the landscape shifts when you migrate to the cloud. In OCI, Oracle assumes responsibility for securing the foundational cloud infrastructure, encompassing hardware and software systems. Meanwhile, you are tasked with securing your workloads and configuring services such as compute, network, and storage to ensure robust security measures are in place.

Shared Responsibility in Oracle Cloud Infrastructure

Within OCI, security is a shared endeavor. While Oracle takes care of certain aspects, you retain responsibilities for specific components of your stack. For instance, workload security becomes your domain.

Your responsibilities extend to safeguarding the operating system and application layers of your compute instances from potential threats and breaches. This involves tasks like application and OS patching, maintaining optimal OS configurations, and fortifying defenses against malware and network intrusions.

On the flip side, Oracle shoulders the responsibility of furnishing secure images, pre-hardened and equipped with the latest patches, especially if you opt for platform images. This delineates the shared nature of security responsibilities within OCI.

Key Areas of Responsibility

Consider facets like accounts and identity management. While you are accountable for creating user accounts, defining policies, and granting appropriate authorizations, Oracle provides essential underlying services such as Identity and Access Management (IAM) to facilitate authentication, authorization, and auditing processes.

Similarly, when it comes to data classification and compliance, you are entrusted with correctly categorizing and labeling data, as well as ensuring compliance adherence. Oracle furnishes the framework and tools necessary for these endeavors.

Furthermore, network controls demand your attention for configuring elements like virtual networks and load balancers securely. Oracle, meanwhile, ensures the provision of a secure network infrastructure to support your configurations.

Grasping the Shared Security Model

Understanding the shared security model is pivotal as you navigate cloud adoption. It delineates the demarcation between your responsibilities and those of the cloud provider. While Oracle Cloud shoulders certain burdens such as physical infrastructure management and secure software development lifecycles, you, as the customer, play a crucial role in securing your assets within the cloud environment.

Conclusion

In essence, the shared security model encapsulates the notion that while Oracle Cloud assumes responsibility for securing the cloud infrastructure, you are accountable for implementing and maintaining security measures within the cloud. This collaborative approach ensures a robust security posture conducive to safe and efficient cloud operations.

Next
Security Services Introduction