Category
Security, Identity, and Compliance
1. Introduction
Oracle Cloud’s Security Guide is not a billable, “enable/disable” cloud service in the same way that Compute, Object Storage, or Vault are. In Oracle Cloud Infrastructure (OCI), Security Guide is the official documentation guide that explains OCI’s security model and describes how to use OCI security capabilities (IAM, networking controls, encryption, logging/auditing, governance, and more) to design and operate secure workloads.
In simple terms: Security Guide is the playbook. It tells you what to secure, why it matters, and how to configure OCI services safely.
In technical terms: the Oracle Cloud Security Guide documents OCI’s shared responsibility model, identity and access control patterns, network security primitives, data protection mechanisms, logging/auditing, and operational security practices. Teams use it to build a repeatable security baseline and to align deployments with internal policies and external compliance expectations.
The problem it solves is common: OCI offers many security and governance controls, but without a clear, centralized reference, teams can end up with inconsistent IAM policies, overexposed networks, unmanaged secrets, and incomplete audit trails. Security Guide reduces that risk by providing a coherent, official reference for secure design and operations in Oracle Cloud.
2. What is Security Guide?
Official purpose (OCI):
Oracle Cloud’s Security Guide is Oracle’s official security documentation for OCI. It explains how to secure OCI environments and how to use OCI security-related services and features correctly. You’ll find it in the OCI documentation set on Oracle’s docs site. Start here and navigate to the Security Guide:
- OCI docs home: https://docs.oracle.com/en-us/iaas/Content/home.htm
- Security Guide entry point (verify the latest URL structure in docs): https://docs.oracle.com/en-us/iaas/Content/Security/Concepts/security.htm
Core capabilities (what it provides)
Because Security Guide is documentation, its “capabilities” are best understood as the topics and implementation guidance it covers:
- OCI security model and shared responsibility
- IAM concepts and policy patterns (users, groups, dynamic groups, compartments)
- Network security basics (VCNs, security lists, NSGs, gateways, routing)
- Data protection guidance (encryption, key management, secrets)
- Logging, auditing, and monitoring fundamentals
- Secure operations practices: least privilege, segmentation, change control, incident response
Major components (how it’s organized)
Security Guide typically includes (structure can change; verify in official docs):
- Conceptual sections: security principles, responsibility model
- Service-focused guidance: IAM, networking, encryption, auditing, etc.
- Best practices and recommended configurations
Service type
- Type: Documentation / reference guide (not a metered cloud resource)
- How it’s consumed: Browser-based docs, used by architects, engineers, and auditors
Scope (regional/global)
- The Security Guide content is global (documentation).
- The OCI services it describes may be regional (for example, Vault is regionally deployed), tenancy-scoped (IAM), or resource-scoped (VCNs, instances, buckets).
How it fits into the Oracle Cloud ecosystem
In the Security, Identity, and Compliance category, Security Guide is the authoritative entry point that ties together security-relevant OCI services such as:
- IAM (Identity and Access Management): https://docs.oracle.com/en-us/iaas/Content/Identity/home.htm
- Vault / Key Management / Secrets: https://docs.oracle.com/en-us/iaas/Content/KeyManagement/home.htm
- Audit: https://docs.oracle.com/en-us/iaas/Content/Audit/home.htm
- Logging: https://docs.oracle.com/en-us/iaas/Content/Logging/home.htm
- Cloud Guard (security posture management; verify current feature set and pricing): https://docs.oracle.com/en-us/iaas/cloud-guard/home.htm
- Security Zones (policy-based guardrails; verify availability and behavior): https://docs.oracle.com/en-us/iaas/security-zone/home.htm
Security Guide helps you understand when and how to use these services safely.
3. Why use Security Guide?
Business reasons
- Reduce breach risk by following Oracle-recommended patterns for segmentation, least privilege, and encryption.
- Speed up audits with consistent security controls and clearer evidence trails (audit logs, configuration standards).
- Lower operational cost of security by reducing rework (fixing open networks, rotating leaked secrets, refactoring IAM).
Technical reasons
- Reference for OCI-specific security primitives (compartments, policy language, dynamic groups, NSGs vs security lists).
- Helps teams avoid “lift-and-shift misconfigurations” where cloud-native security controls are misunderstood.
- Provides baseline guidance for foundational controls: identity boundaries, network isolation, and key/secret management.
Operational reasons
- Enables a repeatable security baseline across environments (dev/test/prod).
- Improves onboarding: new engineers can follow the same official playbook.
- Supports consistent incident response preparation: logging, auditability, and access review become standard.
Security/compliance reasons
- Helps implement common compliance expectations (least privilege, encryption, audit trails, separation of duties).
- Improves governance through compartment strategy and policy guardrails.
- Supports documenting security decisions using an official Oracle reference.
Scalability/performance reasons
Security Guide is not a runtime service, but it helps you scale safely by: – Encouraging compartment design that scales across teams and cost centers – Promoting network segmentation that scales with microservices and multi-tier architectures – Promoting centralized logging patterns that scale with traffic
When teams should choose it
Use Security Guide when you need: – A trusted baseline for securing OCI resources – A starting point for designing landing zones, guardrails, and access boundaries – A common reference for platform teams, app teams, and auditors
When teams should not choose it (or should supplement it)
- If you need automated enforcement, Security Guide alone won’t do that; you’ll need services like Cloud Guard/Security Zones (and/or Terraform, policy-as-code, CI/CD controls).
- If you need regulatory mapping to a specific framework (CIS, NIST, ISO), you may need additional framework-specific documentation and tooling. Security Guide can still be a core reference, but not the only one.
- If your environment spans multiple clouds, you’ll also want multi-cloud governance standards (e.g., internal security standards plus cloud-specific guidance).
4. Where is Security Guide used?
Industries
- Financial services and fintech (access control, auditability, encryption)
- Healthcare and life sciences (data protection, logging)
- Retail/e-commerce (web security, segmentation, DDoS/WAF patterns)
- SaaS and technology (least privilege and secure-by-default infrastructure)
- Public sector (governance, access separation, monitoring)
Team types
- Cloud platform teams (landing zones, guardrails)
- Security engineering (policies, encryption, logging)
- DevOps/SRE (secure pipelines, operational hardening)
- Application teams (secure service-to-service access, secrets management)
- Compliance/audit teams (evidence and control validation)
Workloads
- Internet-facing web apps (WAF/LB patterns, network segmentation)
- APIs and microservices (NSGs, private subnets, secrets)
- Data platforms (Object Storage, databases, encryption keys)
- Batch and analytics (secure instance principals, least privilege policies)
Architectures
- Single tenancy, multi-compartment org design
- Hub-and-spoke networking
- Multi-region DR (requires careful key/log replication planning; verify service capabilities)
- Hybrid connectivity to on-prem (VPN/FastConnect with security boundaries)
Real-world deployment contexts
- Establishing an OCI “landing zone” for multiple teams
- Hardening a new VCN and IAM model for a production environment
- Designing audit readiness: logs + access review processes
Production vs dev/test usage
- Dev/test: Use Security Guide to define minimal guardrails (least privilege, basic segmentation) so dev environments don’t become risk magnets.
- Production: Use it to define standardized controls, formal review points (IAM, network, keys/secrets, logs), and to support evidence for audits.
5. Top Use Cases and Scenarios
Below are realistic ways teams use Oracle Cloud Security Guide in practice. Since Security Guide is documentation, each scenario shows how the guide informs what you configure in OCI.
1) Building a secure OCI landing zone
- Problem: Teams create ad-hoc compartments, policies, and networks that become unmanageable and risky.
- Why Security Guide fits: It provides foundational guidance on identity, compartments, network isolation, encryption, and logging.
- Scenario: A platform team standardizes a tenancy structure (root + environment compartments), defines IAM guardrails, and creates secure VCN templates.
2) Designing least-privilege IAM policies for teams
- Problem: Overly broad “manage all-resources” policies are common and dangerous.
- Why it fits: Security Guide explains IAM concepts and best practices like least privilege and separation of duties.
- Scenario: Dev team gets permission to manage compute in a compartment, but not keys, networking, or IAM.
3) Implementing separation of duties (SoD)
- Problem: One admin account has too much power; mistakes or compromise become catastrophic.
- Why it fits: The guide emphasizes governance and access control patterns.
- Scenario: Separate groups for network admins, app deployers, and key admins; restrict cross-role access.
4) Securing a VCN and subnets for a 3-tier app
- Problem: Applications are deployed in public subnets with permissive security lists.
- Why it fits: Security Guide describes network security building blocks and secure connectivity patterns.
- Scenario: Only the load balancer sits in a public subnet; app and database remain private with tightly-scoped NSGs.
5) Establishing a secrets management approach
- Problem: Secrets are stored in source code, CI variables without lifecycle controls, or shared docs.
- Why it fits: The guide points to encryption and secret handling best practices.
- Scenario: Use OCI Vault Secrets for DB passwords and API keys; restrict secret read access to runtime identities.
6) Audit logging and investigation readiness
- Problem: After an incident, teams can’t answer “who changed what, when, and from where?”
- Why it fits: Security Guide highlights logging/auditing and accountability.
- Scenario: Use OCI Audit and Logging to centralize log access; define retention and review procedures.
7) Standardizing encryption and key ownership
- Problem: Teams don’t know when to use Oracle-managed keys vs customer-managed keys (CMKs).
- Why it fits: The guide explains encryption at rest, key management concepts, and where keys fit.
- Scenario: Production data uses customer-managed keys in Vault; access to keys is limited to a key admin group.
8) Enforcing guardrails with Security Zones (where applicable)
- Problem: Teams accidentally create public buckets or overly permissive network rules.
- Why it fits: Security Guide helps you understand guardrails and governance services.
- Scenario: A “prod” compartment is configured as a Security Zone to prevent disallowed configurations (verify exact guardrail behavior in docs).
9) Improving cloud posture with Cloud Guard (where applicable)
- Problem: Misconfigurations accumulate across compartments; manual review doesn’t scale.
- Why it fits: The guide provides context for posture management and detection.
- Scenario: Enable Cloud Guard targets for production compartments and configure detector/responder recipes (verify pricing and regional availability).
10) Creating a secure onboarding checklist for new projects
- Problem: Every new project repeats the same security questions and mistakes.
- Why it fits: Security Guide is a stable reference for “minimum required controls”.
- Scenario: New project checklist: compartments, IAM groups, VCN segmentation, Vault secrets, audit validation, tagging.
6. Core Features
Because Security Guide is documentation, its “features” are best described as the security topics and implementation guidance it provides for OCI. The value is in accuracy, completeness, and being Oracle-authored.
Feature 1: OCI shared responsibility model guidance
- What it does: Explains what Oracle secures vs what the customer must secure (identity, data, configuration).
- Why it matters: Prevents gaps such as assuming Oracle configures IAM least privilege for you.
- Practical benefit: Clear accountability boundaries for audits and internal security reviews.
- Limitations/caveats: Shared responsibility details can differ by service; always verify service-specific docs.
Feature 2: IAM concepts and policy language orientation
- What it does: Helps you understand compartments, groups, policies, and (where used) dynamic groups and instance principals.
- Why it matters: IAM is the control plane for everything else; mistakes here are systemic.
- Practical benefit: Faster creation of least-privilege policies and safer administrative workflows.
- Limitations/caveats: OCI IAM has evolved (including Identity Domains). Tenancy experience varies; verify your tenancy’s IAM model in official docs.
Feature 3: Network security fundamentals (VCN, subnets, NSGs/security lists)
- What it does: Documents network isolation approaches and traffic control primitives.
- Why it matters: Public exposure is one of the most common cloud risks.
- Practical benefit: Better subnet design, fewer “0.0.0.0/0 to everything” rules, safer connectivity.
- Limitations/caveats: Implementation details differ per architecture (hub/spoke, multi-region). Use reference architectures where possible.
Feature 4: Data protection and encryption guidance
- What it does: Explains encryption considerations and where OCI provides encryption at rest/in transit options.
- Why it matters: Encryption is often a compliance requirement and reduces breach impact.
- Practical benefit: Helps teams choose between default encryption vs customer-managed keys (CMKs) and implement key governance.
- Limitations/caveats: Key lifecycle, rotation, and availability requirements must be validated per service.
Feature 5: Logging and auditing guidance
- What it does: Directs teams to Audit and Logging capabilities for traceability and investigations.
- Why it matters: If you can’t prove what changed, you can’t reliably troubleshoot or investigate incidents.
- Practical benefit: Repeatable operational controls: log access policies, retention planning, review routines.
- Limitations/caveats: Log retention, export, and storage costs can vary. Verify default retention and export options in docs.
Feature 6: Governance practices (compartments, tagging, control boundaries)
- What it does: Encourages clean compartment design and consistent resource organization.
- Why it matters: Governance decisions determine whether security scales across teams.
- Practical benefit: Simplifies policy scope, cost tracking, and environment separation.
- Limitations/caveats: Refactoring compartment design later can be disruptive; plan early.
Feature 7: Secure operations mindset (hardening, change control, response)
- What it does: Promotes operational security practices: access reviews, incident preparedness, and secure configuration habits.
- Why it matters: Many breaches come from process failures, not missing features.
- Practical benefit: Builds a culture of least privilege, verification, and logging-first operations.
- Limitations/caveats: Documentation doesn’t enforce behavior—pair it with automation and governance.
7. Architecture and How It Works
High-level architecture (what “using Security Guide” means)
Security Guide itself doesn’t process requests or store your data. Instead:
- People and processes (architects, security, DevOps) consult the Security Guide.
- Teams translate guidance into OCI configuration: IAM policies, network segmentation, Vault keys/secrets, logging/auditing, and (optionally) posture management.
- Operations teams validate continuously with Audit logs, logging pipelines, and periodic reviews.
Request/data/control flow (practical)
- Control plane actions (creating a VCN, updating a policy, creating a secret) are performed via OCI Console/CLI/API.
- These actions are recorded in Audit.
- Workloads (compute, containers, functions, etc.) access secrets/keys via runtime identity (where applicable) and service endpoints inside a region.
- Network exposure is controlled via VCN routing + security lists/NSGs.
Integrations with related services (documented by Security Guide)
Security Guide commonly references or aligns with: – IAM for authorization – Vault for key/secret management – Audit + Logging for observability and accountability – Cloud Guard / Security Zones for posture/guardrails (verify applicability to your tenancy/region) – Networking components for segmentation and private access
Dependency services
Security Guide itself has no dependencies; it is documentation. The implementations it describes depend on: – IAM, compartments, identity domains – VCN and related network services – Vault and key management (for CMKs/secrets) – Logging/Audit services
Security/authentication model
- Access to OCI APIs uses IAM identities (users, groups, federation) or workload identities (dynamic groups/instance principals where applicable).
- Authorization is enforced by policy statements in OCI IAM.
Networking model
- Security Guide typically promotes private networking patterns where possible:
- Private subnets for workloads
- Minimal inbound access (prefer bastions or zero-trust access patterns; verify OCI’s current recommended approach)
- Tight NSG rules for service-to-service communication
Monitoring/logging/governance considerations
- Ensure Audit access is restricted and monitored.
- Centralize logs where practical.
- Use tagging and compartments to simplify governance.
Simple architecture diagram (conceptual)
flowchart LR
A[Architects / DevOps / Security Engineers] --> B[Oracle Cloud Security Guide (Docs)]
B --> C[IAM: Compartments, Groups, Policies]
B --> D[Network: VCN, Subnets, NSGs/Sec Lists]
B --> E[Data Protection: Vault Keys & Secrets]
B --> F[Observability: Audit + Logging]
C --> G[OCI Resources: Compute, DB, Storage]
D --> G
E --> G
F --> H[Investigation / Compliance Evidence]
Production-style architecture diagram (example)
flowchart TB
subgraph Tenancy[OCI Tenancy]
subgraph Root[Root Compartment]
IAM[IAM Policies + Identity Domains]
AUD[Audit (Control Plane Events)]
LOG[Logging / Log Groups]
CG[Cloud Guard / Security Zones (optional; verify)]
end
subgraph Net[Networking Compartment]
VCN[Hub VCN]
DRG[DRG / Connectivity (optional)]
WAF[Web Application Firewall (optional)]
end
subgraph Prod[Prod App Compartment]
LB[Load Balancer - Public Subnet]
APP[App Tier - Private Subnet]
DB[Database - Private Subnet]
NSG[NSGs (least privilege)]
VAULT[Vault: CMKs + Secrets]
OS[Object Storage Bucket (private)]
end
end
Users[Internet Users] --> WAF --> LB
LB --> APP
APP --> DB
APP --> OS
APP --> VAULT
IAM -.authz.-> LB
IAM -.authz.-> APP
IAM -.authz.-> VAULT
AUD --> LOG
LOG --> SIEM[External SIEM / SOC Tool (optional)]
CG --> SecOps[Security Ops Review & Response]
Notes: – WAF/Cloud Guard/Security Zones/SIEM are optional and depend on requirements and availability. – Validate each component’s availability and pricing in your region.
8. Prerequisites
Because Security Guide is documentation, the prerequisites apply to the hands-on implementation you’ll perform in OCI.
Tenancy/account requirements
- An Oracle Cloud (OCI) tenancy with permission to create IAM and basic resources.
- Access to the OCI Console.
Permissions / IAM roles
For the lab, you typically need one of: – Membership in the Administrators group in the tenancy, or – Equivalent permissions to manage: – Compartments – Users/groups/policies (or identity domain administration, depending on tenancy setup) – VCN resources – Vault (keys/secrets) – Audit event viewing
If your organization separates duties, coordinate with: – IAM administrators (for users/policies) – Network administrators (for VCN) – Key administrators (for Vault)
Billing requirements
- Security Guide itself: no billing.
- The lab can be run low-cost, but some resources (Vault, Logging storage/archival, optional compute) may generate charges depending on your tenancy and region. Always review the OCI cost estimator and your tenancy’s rate card.
Tools (recommended)
- OCI CLI (for verification and repeatability):
https://docs.oracle.com/en-us/iaas/Content/API/SDKDocs/cliinstall.htm - A terminal and a text editor.
Region availability
- Security Guide docs: global.
- Services used in the lab (Vault, Logging, etc.) are regional—confirm they are available in your chosen region in official docs.
Quotas/limits
- IAM objects (users/groups/policies), VCN limits, Vault limits, etc. vary by tenancy.
- If you hit a limit, request a quota increase through OCI support (process varies by account type).
Prerequisite services
- IAM (always present)
- Networking (VCN)
- Vault (if you do the secrets portion)
- Audit (for verification)
9. Pricing / Cost
What Security Guide costs
- Security Guide (documentation): $0
- There is no metering, no SKU, and nothing to “deploy.”
What you implement based on Security Guide may cost
Most teams use Security Guide to configure other OCI services. Those services can have usage-based pricing. Common cost areas:
Pricing dimensions to watch
- Vault / Key Management / Secrets
- Pricing often depends on the number of vaults, keys, secret versions, and cryptographic operations (exact dimensions vary—verify on the pricing page).
- Logging
- Potential costs for log ingestion, retention, storage, and export destinations.
- Object Storage
- Storage consumed, requests, and retrieval (depending on tier).
- Compute / Load Balancer / WAF
- If you deploy workloads as part of security validation, those resources can dominate cost.
- Networking
- Data egress to the internet, inter-region transfer, and some connectivity components can have charges.
Free tier considerations
Oracle has an OCI Free Tier/Always Free offering, but eligibility and included services vary and can change. – Verify current Free Tier details: https://www.oracle.com/cloud/free/
Cost drivers (direct + indirect)
Direct: – Vault usage (keys, secrets, operations) – Log volume and retention – Compute/LB/WAF resources if deployed
Indirect/hidden: – Data egress (especially exporting logs to external SIEMs) – Storage growth from retained logs, snapshots, backups – Operational overhead if you choose self-managed tools instead of managed services
Network/data transfer implications
- Centralizing logs across regions or exporting outside OCI can create measurable egress charges.
- Prefer in-region aggregation where possible and only export what’s required.
How to optimize cost (without weakening security)
- Start with least-privilege IAM and network segmentation—these are high impact, low cost.
- Use logging intentionally:
- Keep high-value logs longer; reduce retention for noisy logs where acceptable.
- Export logs selectively (security-relevant categories).
- Use Vault strategically:
- Use CMKs for regulated datasets; use default encryption where appropriate.
- Avoid unnecessary secret version churn.
Example low-cost starter estimate (qualitative)
A minimal security baseline can often be achieved with:
– Compartments + IAM policies + Audit verification
– A small VCN configuration
This may cost near $0, excluding any optional compute/testing resources.
If you add Vault and extended logging retention/export, costs can increase. Use the cost estimator to model your environment.
Example production cost considerations
In production, costs depend on: – Number of compartments/projects – Number of apps and environments – Log volume (apps + infrastructure + audit exports) – Vault usage patterns (keys/secrets/ops) – Security services enabled (e.g., WAF, posture management)
Official pricing resources
- Oracle Cloud pricing overview: https://www.oracle.com/cloud/pricing/
- OCI cost estimator: https://www.oracle.com/cloud/costestimator.html
- OCI price list (if applicable in your procurement model): https://www.oracle.com/cloud/price-list/
Always validate pricing for your region and contract.
10. Step-by-Step Hands-On Tutorial
This lab is designed to be beginner-friendly, low-risk, and practical. You will use the Security Guide as your reference mindset and implement a small security baseline in OCI: compartment isolation, least-privilege administration, Vault secret storage, and audit verification.
Objective
Create a secure “project compartment” with: – A dedicated compartment boundary – A least-privilege admin group for that compartment – A basic VCN with safe defaults – A Vault and a secret (for credential hygiene) – Verification using Audit events
Lab Overview
You will: 1. Create a compartment for the lab. 2. Create a group and user for scoped administration (or map to your identity domain). 3. Create an IAM policy granting scoped permissions in only that compartment. 4. Configure MFA for the lab user (recommended). 5. Create a VCN with private subnet-first thinking. 6. Create a Vault, a key, and a secret. 7. Validate actions by querying Audit events. 8. Clean up resources to avoid ongoing costs.
Notes on IAM experience: OCI tenancies can use IAM with Identity Domains (common in newer tenancies) or legacy/classic patterns. Follow your organization’s standard and verify in official docs if the screens differ.
Step 1: Choose a region and set up OCI CLI (optional but recommended)
Console action – Log in to the OCI Console and confirm your region in the top navigation.
CLI action Install and configure the OCI CLI: – Install guide: https://docs.oracle.com/en-us/iaas/Content/API/SDKDocs/cliinstall.htm
Then configure:
oci setup config
You’ll provide:
– Tenancy OCID
– User OCID
– Region (e.g., us-ashburn-1)
– Generate API keys (store your private key securely)
Expected outcome – You can run:
oci iam region list --all
…and get a JSON response.
Verification
oci os ns get
This should return your Object Storage namespace.
Step 2: Create a compartment for the lab
Compartment design is a core OCI governance control emphasized in Security Guide concepts.
Console action
1. Go to Identity & Security → Compartments
2. Click Create Compartment
3. Name: security-guide-lab
4. Description: Security Guide baseline lab
5. Parent compartment: choose a parent appropriate for labs (often root, but follow org policy)
CLI action (alternative)
oci iam compartment create \
--compartment-id <ROOT_COMPARTMENT_OCID> \
--name security-guide-lab \
--description "Security Guide baseline lab" \
--wait-for-state ACTIVE
Expected outcome – A compartment exists and is in ACTIVE state.
Verification
oci iam compartment list --compartment-id <ROOT_COMPARTMENT_OCID> --all \
--query "data[?name=='security-guide-lab'] | [0].{name:name, id:id, lifecycle:lifecycle-state}"
Step 3: Create a scoped admin group and user (or identity domain equivalent)
Security Guide principles strongly encourage separation of duties and avoiding daily work from tenancy-wide admin identities.
Option A (common pattern): OCI IAM user/group (if applicable in your tenancy)
Console action
1. Go to Identity & Security → Users → Create User
– Name: sglab-user
2. Go to Groups → Create Group
– Name: SecurityGuideLabAdmins
3. Add sglab-user to SecurityGuideLabAdmins
CLI action (alternative)
oci iam group create --name SecurityGuideLabAdmins --description "Scoped admins for Security Guide lab"
oci iam user create --name sglab-user --description "User for Security Guide lab"
oci iam group add-user --group-id <GROUP_OCID> --user-id <USER_OCID>
Option B: Identity Domains (if your tenancy uses them)
If your tenancy uses Identity Domains, user/group management may be done inside the domain (often a “Default” domain). The UI and APIs differ from classic IAM user management.
- Identity Domains documentation entry point (verify current docs path):
https://docs.oracle.com/en-us/iaas/Content/Identity/home.htm
Expected outcome – You have a user identity and a group to attach policies to.
Verification – Confirm group membership in the Console.
Step 4: Create a least-privilege policy scoped to the compartment
Instead of giving the lab user tenancy admin, create a policy that only grants admin rights inside the lab compartment.
Console action
1. Go to Identity & Security → Policies
2. Ensure you are creating the policy in the correct parent compartment (often root; OCI policies are frequently managed at higher scope—follow org standards).
3. Click Create Policy
4. Name: security-guide-lab-admin-policy
5. Policy statements (example):
Allow group SecurityGuideLabAdmins to manage all-resources in compartment security-guide-lab
This is intentionally broad within the lab compartment for learning. For production, you usually split duties (network admins, app deployers, key admins) and avoid
manage all-resourceswherever possible.
Expected outcome
– Members of SecurityGuideLabAdmins can create/manage resources in security-guide-lab but not elsewhere.
Verification
– Sign in as sglab-user (or use federation/identity domain login as configured).
– Try to view resources in other compartments: you should have limited/no access depending on defaults.
Common propagation note – IAM policy changes can take a short time to propagate. If you get authorization errors immediately, wait a few minutes and retry.
Step 5: Enable MFA for the lab user (recommended)
MFA is a foundational control frequently required for compliance.
Console action (Identity Domains) – Go to Identity & Security → Domains – Select your domain (e.g., “Default”) – Find Security / MFA settings – Enforce MFA for the user or relevant group (options vary; verify in official docs)
Expected outcome – User enrollment or enforcement of MFA for interactive console login.
Verification – Log out and log back in as the user; confirm MFA challenge occurs as configured.
Step 6: Create a VCN with safe defaults (private-first)
Networking misconfiguration is a common root cause of exposure. This step creates a basic VCN to demonstrate controlled connectivity.
Console action
1. Go to Networking → Virtual Cloud Networks
2. Select compartment: security-guide-lab
3. Click Create VCN
4. Choose VCN with Internet Connectivity only if you truly need public access for testing.
– For a stricter posture, choose a workflow that creates private subnets and add only required gateways later.
5. Name: sglab-vcn
6. Review subnet types and security rules:
– Prefer private subnets for workloads.
– Avoid broad inbound rules like 0.0.0.0/0 to SSH/RDP.
Expected outcome – A VCN exists with subnets and route tables appropriate to your selection.
Verification – Confirm subnet(s) and check default security list rules. – Tighten any overly permissive inbound rules if the wizard created them.
Practical hardening (quick win)
If you created a public subnet:
– Remove inbound SSH/RDP from 0.0.0.0/0 unless you have a strong reason.
– Prefer a controlled access pattern (bastion/zero-trust access). OCI has a Bastion service—verify current best practices in official docs.
Step 7: Create a Vault, a key, and a secret
Secrets handling is a major theme in secure cloud operations.
Console action
1. Go to Identity & Security → Vault
2. Ensure compartment: security-guide-lab
3. Click Create Vault
– Name: sglab-vault
4. After the vault is ACTIVE, create a Master Encryption Key (MEK):
– Name: sglab-key
5. Create a Secret:
– Name: sglab-db-password (example)
– Secret content: use a random value (do not use real production passwords)
Vault and secrets pricing varies. Verify pricing and consider cleanup to avoid recurring cost.
Expected outcome – Vault created – Key created – Secret stored and access controlled by IAM policies
Verification (CLI example) List vaults in the compartment:
oci kms vault list --compartment-id <SECURITY_GUIDE_LAB_COMPARTMENT_OCID>
List secrets in the compartment:
oci vault secret list --compartment-id <SECURITY_GUIDE_LAB_COMPARTMENT_OCID>
If CLI commands differ due to CLI version/service naming, verify in official Vault CLI docs.
Step 8: Verify accountability with Audit events
Audit verification is how you prove “this control is operating” and how you investigate changes.
CLI action Query Audit events for your tenancy over a short time window (example shows the idea; adjust timestamps):
oci audit event list \
--compartment-id <TENANCY_OCID> \
--start-time "2026-04-17T00:00:00Z" \
--end-time "2026-04-17T23:59:59Z"
To narrow results, filter client-side (example uses jq):
oci audit event list \
--compartment-id <TENANCY_OCID> \
--start-time "2026-04-17T00:00:00Z" \
--end-time "2026-04-17T23:59:59Z" \
| jq '.data[] | {time:.eventTime, user:.principalName, name:.eventName, resource:.resourceName}'
Expected outcome – You can see events corresponding to compartment creation, policy updates, VCN creation, and Vault actions.
Verification (Console) – Go to Identity & Security → Audit – Filter by compartment, time, or event type.
Validation
You should be able to confirm all of the following:
- Compartment isolation
– Resources created in
security-guide-labare logically separated from other projects. - Scoped administration
–
sglab-user(or your lab identity) can manage resources insecurity-guide-lab. – The same user does not have broad tenancy-wide admin unless explicitly granted. - Network posture awareness – VCN exists and you reviewed inbound rules to avoid accidental exposure.
- Secret storage – A secret exists in Vault and is not stored in code or plain text docs.
- Auditability – Audit events exist for the actions you performed.
Troubleshooting
Error: NotAuthorizedOrNotFound
Common causes: – Policy is attached to the wrong group or wrong compartment scope. – You created the policy in a compartment that doesn’t apply where you expect (policy scoping can be confusing at first). – IAM propagation delay.
Fixes: – Re-check policy statement spelling (group name, compartment name). – Wait a few minutes and retry. – Confirm the user is in the correct group.
Error: “I can’t find Users/Groups where expected”
Cause: – Your tenancy may be using Identity Domains where user/group management is domain-based.
Fix: – Use the Domains section for identities, or follow your org’s federation approach. – Verify identity model in official docs.
Error: Vault/key/secret operations fail
Common causes:
– Missing permissions for Vault (vaults, keys, secret-family permissions).
– Region mismatch (trying to access a vault in a different region).
– Resource still provisioning.
Fix: – Confirm you are in the same region as the vault. – Ensure IAM policies include required Vault permissions (verify exact policy statements in Vault docs). – Wait for ACTIVE lifecycle states.
Error: Audit events not showing
Common causes: – Wrong time window (UTC vs local time). – Searching in the wrong compartment context. – Insufficient permission to view audit events.
Fix: – Expand the time range. – Confirm you’re using the tenancy OCID for some queries. – Verify Audit access permissions in docs.
Cleanup
To avoid ongoing cost and reduce clutter, remove lab resources. Perform cleanup in this order:
- Delete secrets (if created)
– In Vault: delete the secret (and any secret versions, depending on UI/workflow). - Schedule deletion for keys and vault (if required)
– Some Vault resources use scheduled deletion and cannot be instantly removed. Follow the Vault docs for correct lifecycle steps. - Delete VCN resources – Delete instances (if any), load balancers, NAT gateways, etc. – Then delete subnets and the VCN.
- Remove IAM policy
– Delete
security-guide-lab-admin-policy - Remove IAM user/group – Remove user from group – Delete user and group (or remove identity domain objects if used)
- Delete compartment – Compartments must be empty before deletion.
If the Console prevents deletion due to dependencies, inspect the compartment for remaining resources and remove them.
11. Best Practices
Architecture best practices
- Design around compartments as security boundaries, not just cost buckets.
- Use a multi-compartment strategy (e.g.,
network,security,shared,dev,prod) rather than mixing everything in one place. - Prefer private subnets for compute and databases; expose only what must be public (typically a load balancer/WAF).
IAM/security best practices
- Enforce least privilege:
- Start with minimal
read/useand expand only when required. - Use separation of duties:
- Different groups for IAM admin, network admin, app deployer, key admin, audit reader.
- Protect break-glass accounts:
- Strong MFA
- Minimal use
- Monitored and documented
Cost best practices (security-driven)
- Don’t export or retain all logs indefinitely—retain what you need for risk and compliance.
- Use Vault strategically; avoid creating redundant keys and secret versions.
- Review egress costs for SIEM exports and cross-region log aggregation.
Performance best practices
- Network security should not require overly complex routing if a simpler segmentation meets the need.
- Keep security controls close to the workload (NSGs, private endpoints) rather than relying solely on perimeter rules.
Reliability best practices
- Treat key management and secrets as critical dependencies:
- Plan for key rotation and access continuity.
- Document vault/key ownership and recovery processes.
- Ensure logs and audit evidence are accessible during incidents.
Operations best practices
- Establish a periodic cadence:
- IAM access reviews
- Policy linting/peer review
- Network rule review
- Key/secret rotation review
- Use Infrastructure as Code (IaC) where possible (e.g., Terraform) to make security repeatable and reviewable.
Governance/tagging/naming best practices
- Use consistent naming:
env-app-componentpatterns (e.g.,prod-payments-vcn)- Apply tags for:
- Owner, cost center, data classification, environment
- Keep a simple but enforced tagging baseline to reduce unmanaged sprawl.
12. Security Considerations
Identity and access model
- OCI access is controlled through IAM policies.
- Prefer group-based permissions; avoid granting permissions directly to individual users.
- Where supported for workloads, consider workload identities (dynamic groups/instance principals) so you avoid long-lived user API keys for automation. Validate the correct approach in current IAM docs.
Encryption
- Understand where OCI provides encryption by default and where you need CMKs.
- For high-sensitivity data:
- Use Vault for customer-managed keys and secrets
- Restrict key admin privileges tightly
- Document key ownership and rotation processes.
Network exposure
- Default stance: deny by default, allow explicitly.
- Avoid inbound access from
0.0.0.0/0unless there is a clear business reason and compensating controls (WAF, strong auth, patching, monitoring). - Use NSGs to restrict east-west traffic between tiers.
Secrets handling
- Do not store secrets in:
- Source control
- Plaintext config files
- Shared chat tools or tickets
- Use Vault Secrets (or equivalent) and restrict read access.
- Prefer short-lived credentials and rotation where possible.
Audit/logging
- Ensure Audit is accessible to security/ops but protected from tampering.
- Use log retention aligned with compliance needs.
- Monitor high-risk activities:
- Policy changes
- Key/secret changes
- Network security rule changes
Compliance considerations
- Security Guide is a strong baseline reference but not a compliance certification by itself.
- Map your controls to your required framework (CIS/NIST/ISO/SOC2/etc.) using Security Guide as OCI-specific implementation guidance.
Common security mistakes
- Using tenancy-wide admin for daily operations
- Overly permissive ingress rules
- No MFA for privileged users
- Secrets in code or CI variables without lifecycle control
- No review of audit logs or no centralized logging strategy
Secure deployment recommendations
- Build a “secure-by-default” template:
- Compartment structure
- IAM groups + policies
- Standard VCN patterns
- Vault secrets pattern
- Audit verification checklist
13. Limitations and Gotchas
Because Security Guide is documentation, most limitations relate to how teams interpret and apply it.
- Not an enforcement tool: Security Guide doesn’t automatically detect or fix misconfigurations.
- Docs can lag features: OCI evolves; always cross-check service-specific docs and release notes.
- Tenancy differences: IAM experience can differ (Identity Domains vs older patterns). Screens and workflows may not match older tutorials.
- Policy language learning curve: OCI policy syntax is powerful but easy to mis-scope if you’re new.
- Propagation delays: IAM changes may take short time to apply.
- Regional behavior: Some services (Vault, Logging) are regional—plan for multi-region carefully.
- Cost surprises: Long log retention, exporting logs to external systems, and Vault operations can add cost.
- Deletion lifecycle: Vault keys/vaults may require scheduled deletion; cleanup may not be immediate.
- Shared responsibility misunderstanding: Teams may assume Oracle configures security controls; customers must configure IAM/network/logging properly.
14. Comparison with Alternatives
Security Guide is best compared to other cloud providers’ official security guidance and to industry benchmarks.
| Option | Best For | Strengths | Weaknesses | When to Choose |
|---|---|---|---|---|
| Oracle Cloud Security Guide (OCI) | OCI customers needing official security guidance | OCI-specific, aligned to Oracle services and terminology; good baseline reference | Not an enforcement tool; must be paired with automation and governance | You operate workloads in OCI and need authoritative guidance |
| OCI Cloud Guard (service) | Detecting misconfigurations and risky activity (verify features/pricing) | Posture visibility and detection/responder patterns | Requires enablement and operational ownership; may have costs depending on use | You need scalable detection beyond manual review |
| OCI Security Zones (service) | Preventing disallowed configurations via guardrails (verify behavior) | Guardrail approach to reduce accidental exposure | Can restrict flexibility; requires planning | You want enforced preventative controls for sensitive compartments |
| AWS Well-Architected Framework – Security Pillar | AWS environments | Strong guidance and review questions | AWS-specific; not OCI | You’re primarily on AWS |
| Azure Security Benchmark | Azure environments | Control mappings and recommended configurations | Azure-specific; not OCI | You’re primarily on Azure |
| Google Cloud security foundations / best practices | GCP environments | Clear prescriptive guidance | GCP-specific; not OCI | You’re primarily on GCP |
| CIS Benchmarks / CIS Controls | Cross-cloud baseline controls | Vendor-neutral control framework | Not OCI-implementation-specific; requires translation | You need an industry baseline across multiple platforms |
| Internal security standards + IaC policy-as-code | Enterprises needing consistent enforcement | Enforceable, auditable, standardized | Requires engineering effort and maintenance | You need repeatable guardrails at scale |
15. Real-World Example
Enterprise example: regulated workload with compartment guardrails and key governance
- Problem: A financial services company must deploy customer-facing APIs on OCI while meeting audit requirements for least privilege, encryption, and change traceability.
- Proposed architecture:
- Tenancy with compartments:
security,network,prod,nonprod - IAM groups:
NetworkAdmins,AppDeployers,KeyAdmins,AuditReaders - VCN hub/spoke; private subnets for app/data
- Vault with customer-managed keys for sensitive data
- Audit + Logging centralized; exports to SIEM (with careful egress planning)
- Optional guardrails via Security Zones for
prod(verify fit) - Why Security Guide was chosen:
- Provides Oracle-authored guidance aligned to OCI services and terminology.
- Acts as a baseline reference for audits and internal architecture reviews.
- Expected outcomes:
- Reduced over-privileged access
- Clear audit evidence for changes and key usage
- Consistent network segmentation and reduced public exposure risk
Startup/small-team example: secure defaults without heavy tooling
- Problem: A startup wants to deploy an app on OCI quickly but avoid common security mistakes (public SSH, shared admin accounts, secrets in code).
- Proposed architecture:
- One compartment per environment (
dev,prod) - Least-privilege group policies per environment
- Private subnet for app; only LB public
- Vault for app secrets
- Audit review checklist after each release
- Why Security Guide was chosen:
- Fast, free, official reference; reduces reliance on guesswork.
- Expected outcomes:
- Faster onboarding and fewer security regressions
- Better investor/customer confidence with basic security hygiene in place
16. FAQ
1) Is Oracle Cloud Security Guide a service I must enable?
No. Security Guide is documentation. You use it to configure actual OCI services (IAM, Vault, networking, logging) securely.
2) Does Security Guide scan my tenancy for problems?
No. For detection/scanning, look at services like Cloud Guard (verify current capabilities and pricing).
3) Where do I start if I’m new to OCI security?
Start with Security Guide concepts, then learn IAM (compartments and policies), then VCN security basics, then Vault and Audit/Logging.
4) Is Security Guide specific to OCI or all Oracle Cloud products?
The Security Guide referenced here is for Oracle Cloud Infrastructure (OCI). Oracle also has security documentation for SaaS applications, but don’t assume they are the same.
5) Do I need customer-managed keys (CMKs) for everything?
Not always. Many services encrypt by default. Use CMKs when you have regulatory requirements, need stronger key control, or require separation of duties. Verify per-service encryption support.
6) What’s the biggest IAM mistake beginners make in OCI?
Granting overly broad privileges (like tenancy-wide admin) for convenience and never reducing them later.
7) How should I structure compartments?
A common approach is environment + shared compartments (e.g., network, security, dev, prod). The right structure depends on org and audit needs.
8) What’s the difference between security lists and NSGs?
Both control traffic. NSGs are commonly used for more granular, workload-oriented security grouping. Exact behavior and best practice can vary—verify in networking docs.
9) Is Audit always enabled?
OCI Audit is generally available for tracking control plane events. Verify defaults, retention, and access controls in the Audit documentation for your tenancy.
10) How do I prove to auditors that controls are working?
Use a combination of: IAM policy reviews, network rule reviews, Vault configuration evidence, and Audit/Logging evidence of changes and access.
11) Should I export logs to an external SIEM?
If you have a SOC or compliance requirement, yes—but plan for cost and data governance. Not all environments need external SIEM for every log.
12) Can I use Security Guide for multi-cloud architectures?
Yes as OCI-specific guidance, but you’ll also need equivalent guidance for other clouds and a common internal control framework.
13) How do I implement “least privilege” without slowing teams down?
Start with role-based groups, use compartment scoping, and iterate policies based on real needs. Review permissions regularly.
14) Does Security Guide replace security training?
No. It complements training by providing OCI-specific reference material and official implementation guidance.
15) Where can I find the most current Security Guide content?
Use the OCI documentation site and navigate to Security Guide from the latest docs index. Bookmark the official entry point and verify URLs as Oracle updates doc structure.
17. Top Online Resources to Learn Security Guide
| Resource Type | Name | Why It Is Useful |
|---|---|---|
| Official documentation | OCI Security Guide | Primary official reference for OCI security concepts and practices. https://docs.oracle.com/en-us/iaas/Content/Security/Concepts/security.htm |
| Official documentation | OCI IAM Documentation | Core for identities, compartments, and policies. https://docs.oracle.com/en-us/iaas/Content/Identity/home.htm |
| Official documentation | OCI Vault / Key Management | Keys and secrets guidance and APIs. https://docs.oracle.com/en-us/iaas/Content/KeyManagement/home.htm |
| Official documentation | OCI Audit | Control plane audit events for accountability. https://docs.oracle.com/en-us/iaas/Content/Audit/home.htm |
| Official documentation | OCI Logging | Centralized logging concepts and configuration. https://docs.oracle.com/en-us/iaas/Content/Logging/home.htm |
| Official documentation | OCI Cloud Guard | Posture management and detection (verify pricing/availability). https://docs.oracle.com/en-us/iaas/cloud-guard/home.htm |
| Official documentation | OCI Security Zones | Guardrails for compartments (verify current behavior). https://docs.oracle.com/en-us/iaas/security-zone/home.htm |
| Pricing | Oracle Cloud Pricing | Understand service pricing models and regional variation. https://www.oracle.com/cloud/pricing/ |
| Pricing tool | OCI Cost Estimator | Estimate monthly costs for planned architecture. https://www.oracle.com/cloud/costestimator.html |
| Free tier | Oracle Cloud Free Tier | Learn what you can run at low/no cost (verify current terms). https://www.oracle.com/cloud/free/ |
| Architecture guidance | Oracle Architecture Center | Reference architectures and patterns (search security/landing zone). https://docs.oracle.com/en/solutions/ |
| CLI documentation | OCI CLI Installation and Setup | Enables repeatable security verification and automation. https://docs.oracle.com/en-us/iaas/Content/API/SDKDocs/cliinstall.htm |
| Community (use carefully) | OCI GitHub organization | Samples and tooling; validate against official docs. https://github.com/oracle/oci-cli and https://github.com/oracle/ |
18. Training and Certification Providers
| Institute | Suitable Audience | Likely Learning Focus | Mode | Website URL |
|---|---|---|---|---|
| DevOpsSchool.com | DevOps engineers, SREs, platform teams | Cloud/DevOps practices; may include OCI security fundamentals depending on curriculum | Check website | https://www.devopsschool.com/ |
| ScmGalaxy.com | Beginners to intermediate engineers | DevOps/SCM foundations; may support cloud governance learning paths | Check website | https://www.scmgalaxy.com/ |
| CLoudOpsNow.in | Cloud operations teams | Cloud operations, monitoring, governance topics | Check website | https://www.cloudopsnow.in/ |
| SreSchool.com | SREs, operations engineers | Reliability + operational controls, incident readiness, observability | Check website | https://www.sreschool.com/ |
| AiOpsSchool.com | Ops engineers exploring AIOps | Monitoring/automation concepts; may complement logging/audit workflows | Check website | https://www.aiopsschool.com/ |
Notes: – For official Oracle certifications, consult Oracle’s certification catalog and OCI-specific tracks (verify the current list and exam codes): https://education.oracle.com/
19. Top Trainers
| Platform/Site | Likely Specialization | Suitable Audience | Website URL |
|---|---|---|---|
| RajeshKumar.xyz | DevOps/cloud coaching and engineering guidance (verify current offerings) | Engineers wanting mentorship-style learning | https://rajeshkumar.xyz/ |
| devopstrainer.in | DevOps training content and coaching (verify OCI coverage) | Beginners to intermediate DevOps learners | https://www.devopstrainer.in/ |
| devopsfreelancer.com | Freelance DevOps support/training resources (verify scope) | Teams needing practical implementation help | https://www.devopsfreelancer.com/ |
| devopssupport.in | DevOps support and training resources (verify scope) | Ops/DevOps teams needing hands-on assistance | https://www.devopssupport.in/ |
20. Top Consulting Companies
| Company Name | Likely Service Area | Where They May Help | Consulting Use Case Examples | Website URL |
|---|---|---|---|---|
| cotocus.com | Cloud/DevOps consulting (verify OCI focus) | Cloud architecture, automation, governance | Compartment/IAM redesign, Terraform baselines, logging strategy | https://www.cotocus.com/ |
| DevOpsSchool.com | DevOps consulting and training (verify service catalog) | DevOps processes, platform engineering, enablement | Secure CI/CD guidance, operational readiness reviews | https://www.devopsschool.com/ |
| DEVOPSCONSULTING.IN | DevOps consulting (verify offerings) | Delivery pipelines, cloud ops, reliability practices | Baseline hardening checklist implementation, monitoring/logging setup | https://www.devopsconsulting.in/ |
21. Career and Learning Roadmap
What to learn before Security Guide (recommended foundations)
- OCI basics: regions, compartments, core services
- Networking fundamentals: CIDR, routing, firewall concepts
- Identity fundamentals: RBAC, least privilege, MFA, federation
- Basic cryptography concepts: encryption at rest/in transit, key rotation, secrets
What to learn after Security Guide (to operationalize it)
- OCI IAM advanced patterns (dynamic groups/instance principals where applicable)
- Vault advanced topics (rotation strategies, access boundaries)
- Logging pipelines and SIEM integrations
- Cloud Guard and Security Zones (if used in your environment)
- Infrastructure as Code (Terraform) for repeatable secure deployments
- Threat modeling and incident response playbooks for cloud workloads
Job roles that use it
- Cloud Security Engineer
- Cloud Platform Engineer
- DevOps Engineer / SRE
- Solutions Architect
- Governance, Risk, and Compliance (GRC) analyst (for evidence mapping)
- Cloud Operations Engineer
Certification path (if available)
Oracle’s certification catalog changes over time. Check the official Oracle Education site for: – OCI Architect certifications – OCI security-focused certifications (if listed; verify current availability and exam codes)
Start here: – https://education.oracle.com/
Project ideas for practice
- Build a two-environment compartment model (
devandprod) with distinct IAM groups and policies. - Create a private VCN architecture and document inbound/outbound rules as if for an audit.
- Implement Vault secrets for an app and restrict access to runtime identities only.
- Create an audit review script using OCI CLI that flags policy changes in the last 24 hours.
- Create a “secure baseline” Terraform module (compartment + VCN + minimal policies) and run peer reviews on changes.
22. Glossary
- OCI (Oracle Cloud Infrastructure): Oracle’s IaaS cloud platform providing compute, storage, networking, and security services.
- Security Guide: Oracle’s official OCI security documentation guide; a reference, not a deployable service.
- Tenancy: Your top-level OCI account boundary.
- Compartment: A logical isolation boundary used for organizing and controlling access to resources.
- IAM (Identity and Access Management): The OCI system for identities, groups, policies, and authorization.
- Policy (OCI): A set of statements defining who can do what, where (scope), and on which resources.
- Least privilege: Granting only the minimal permissions required to perform a task.
- Separation of duties (SoD): Splitting privileged responsibilities across roles/groups to reduce fraud and error risk.
- VCN (Virtual Cloud Network): Your private network in OCI.
- Subnet: A segment of a VCN where resources are placed (public or private depending on routing).
- NSG (Network Security Group): Security rules applied to a set of VNICs/resources to control traffic.
- Security list: Subnet-level virtual firewall rules in OCI.
- Vault: OCI service for key management and secrets storage.
- CMK (Customer-Managed Key): A key you control (lifecycle and access) used for encryption.
- Secret: Sensitive value stored securely (password, API key) and accessed via controlled permissions.
- Audit: OCI service that records control plane API events for accountability.
- Logging: OCI service for collecting and managing logs (service logs, custom logs, etc.).
- Cloud Guard: OCI service for security posture monitoring and detection (verify current features/pricing).
- Security Zones: OCI guardrails to prevent certain insecure configurations (verify current behavior).
23. Summary
Oracle Cloud’s Security Guide is the official OCI security reference in the Security, Identity, and Compliance category. It isn’t a metered service—you don’t deploy it—but it matters because it helps teams design and operate OCI environments with consistent least privilege, network segmentation, encryption and secrets hygiene, and auditability.
Cost-wise, the guide itself is free, but the OCI services you implement (Vault, logging pipelines, WAF, posture management, and any workloads you deploy) can drive cost—especially log volume/retention, Vault usage, and data egress.
Use Security Guide when you want an authoritative baseline and a common language for architects, engineers, and auditors. Pair it with automation (IaC), governance processes (reviews, access recertification), and—where needed—detective/preventative services (Cloud Guard, Security Zones) to operationalize secure-by-default OCI.
Next step: read the Security Guide, then implement a small baseline like the lab in this tutorial, and expand it into a repeatable landing zone pattern for your organization.