Security
- Security Features in Autonomous Database on Dedicated Exadata Infrastructure
This article describes the key security features in Autonomous Database on Dedicated Exadata Infrastructure. - Configuration Management in Autonomous Database on Dedicated Exadata Infrastructure
Built on Oracle Cloud Infrastructure (OCI), Autonomous Database on Dedicated Exadata Infrastructure provides standard, hardened security configurations so you and your team don't need to spend huge amounts of time and money managing configurations across your Autonomous Database fleet. - Data Encryption in Autonomous Database on Dedicated Exadata Infrastructure
Autonomous Database on Dedicated Exadata Infrastructure uses always-on encryption that protects data at rest and in transit. All data stored in and network communication with Oracle Cloud is encrypted by default. Encryption cannot be turned off. - Auditing Capabilities in Autonomous Database
Oracle Autonomous Database on Dedicated Exadata Infrastructure provides robust auditing capabilities that enable you to track who did what on the service and on specific databases. Comprehensive log data allows you to audit and monitor actions on your resources, which helps you to meet your audit requirements while reducing security and operational risk. - Access Control Within Autonomous Database on Dedicated Exadata Infrastructure
When configuring Autonomous Database on Dedicated Exadata Infrastructure, you need to ensure that your cloud users have access to use and create only the appropriate kinds of cloud resources to perform their job duties. Additionally, you need to ensure that only authorized personnel and applications have access to the autonomous databases created on dedicated infrastructure. Otherwise, you run the risk of "runaway" consumption of your dedicated infrastructure resources or inappropriate access to mission-critical data. - IAM Policies for Autonomous Database on Dedicated Exadata Infrastructure
This article lists the IAM policies required for managing the infrastructure resources of Autonomous Database on dedicated Exadata infrastructure. - Master Encryption Keys in Autonomous Database on Dedicated Exadata Infrastructure
By default, Autonomous Database on Dedicated Exadata Infrastructure creates and manages all the master encryption keys used to protect your data, storing them in a secure PKCS 12 keystore on the same Exadata systems where the databases reside.
Parent topic: Features