CIS Oracle Cloud Infrastructure Foundations Benchmark v3.0.0
CIS Oracle Cloud Infrastructure Foundations Benchmark v3.0.0
Infrastructure Foundations
Benchmark
v3.0.0 - 02-28-2025
Terms of Use
Please see the below link for our current terms of use:
https://www.cisecurity.org/cis-securesuite/cis-securesuite-membership-terms-of-use/
NOTE: It is NEVER acceptable to host a CIS Benchmark in ANY format (PDF, etc.)
on a 3rd party (non-CIS owned) site.
Page 1
Table of Contents
Terms of Use ................................................................................................................. 1
Table of Contents .......................................................................................................... 2
Overview ........................................................................................................................ 5
Important Usage Information ................................................................................................ 5
Key Stakeholders ................................................................................................................................... 5
Apply the Correct Version of a Benchmark ........................................................................................ 6
Exceptions .............................................................................................................................................. 6
Remediation ........................................................................................................................................... 7
Summary ................................................................................................................................................. 7
Target Technology Details .................................................................................................... 8
Intended Audience................................................................................................................. 8
Consensus Guidance ............................................................................................................ 9
Typographical Conventions .................................................................................................10
Recommendation Definitions ..................................................................................... 11
Title ........................................................................................................................................11
Assessment Status...............................................................................................................11
Automated ............................................................................................................................................ 11
Manual ................................................................................................................................................... 11
Profile ....................................................................................................................................11
Description ............................................................................................................................11
Rationale Statement .............................................................................................................11
Impact Statement ..................................................................................................................12
Audit Procedure ....................................................................................................................12
Remediation Procedure........................................................................................................12
Default Value .........................................................................................................................12
References ............................................................................................................................12
CIS Critical Security Controls® (CIS Controls®) ..................................................................12
Additional Information..........................................................................................................12
Profile Definitions .................................................................................................................13
Acknowledgements ..............................................................................................................14
Recommendations ...................................................................................................... 15
1 Identity and Access Management.....................................................................................15
1.1 Ensure service level admins are created to manage resources of particular service
(Manual) .................................................................................................................................... 16
1.2 Ensure permissions on all resources are given only to the tenancy administrator group
(Automated) .............................................................................................................................. 20
Page 2
1.3 Ensure IAM administrators cannot update tenancy Administrators group (Automated) .... 22
1.4 Ensure IAM password policy requires minimum length of 14 or greater (Automated) ....... 24
1.5 Ensure IAM password policy expires passwords within 365 days (Manual) ...................... 27
1.6 Ensure IAM password policy prevents password reuse (Manual) ...................................... 29
1.7 Ensure MFA is enabled for all users with a console password (Automated) ..................... 31
1.8 Ensure user API keys rotate within 90 days (Automated) .................................................. 34
1.9 Ensure user customer secret keys rotate every 90 days (Automated)............................... 36
1.10 Ensure user auth tokens rotate within 90 days or less (Automated) ................................ 38
1.11 Ensure user IAM Database Passwords rotate within 90 days (Manual) .......................... 40
1.12 Ensure API keys are not created for tenancy administrator users (Automated) .............. 42
1.13 Ensure all OCI IAM user accounts have a valid and current email address (Manual) ..... 44
1.14 Ensure Instance Principal authentication is used for OCI instances, OCI Cloud
Databases and OCI Functions to access OCI resources. (Manual) ......................................... 46
1.15 Ensure storage service-level admins cannot delete resources they manage. (Manual) .. 49
1.16 Ensure OCI IAM credentials unused for 45 days or more are disabled (Automated) ...... 52
1.17 Ensure there is only one active API Key for any single OCI IAM user (Automated) ........ 56
2 Networking .........................................................................................................................58
2.1 Ensure no security lists allow ingress from 0.0.0.0/0 to port 22 (Automated) .................... 59
2.2 Ensure no security lists allow ingress from 0.0.0.0/0 to port 3389 (Automated) ................ 62
2.3 Ensure no network security groups allow ingress from 0.0.0.0/0 to port 22 (Automated) .. 65
2.4 Ensure no network security groups allow ingress from 0.0.0.0/0 to port 3389 (Automated)
.................................................................................................................................................. 69
2.5 Ensure the default security list of every VCN restricts all traffic except ICMP within VCN
(Automated) .............................................................................................................................. 72
2.6 Ensure Oracle Integration Cloud (OIC) access is restricted to allowed sources. (Manual) 74
2.7 Ensure Oracle Analytics Cloud (OAC) access is restricted to allowed sources or deployed
within a Virtual Cloud Network. (Manual).................................................................................. 77
2.8 Ensure Oracle Autonomous Shared Databases (ADB) access is restricted to allowed
sources or deployed within a Virtual Cloud Network (Manual) ................................................. 80
3 Compute .............................................................................................................................83
3.1 Ensure Compute Instance Legacy Metadata service endpoint is disabled (Automated) ... 84
3.2 Ensure Secure Boot is enabled on Compute Instance (Automated) .................................. 87
3.3 Ensure In-transit Encryption is enabled on Compute Instance (Automated) ..................... 90
4 Logging and Monitoring ....................................................................................................93
4.1 Ensure default tags are used on resources (Automated) ................................................... 94
4.2 Create at least one notification topic and subscription to receive monitoring alerts
(Automated) .............................................................................................................................. 97
4.3 Ensure a notification is configured for Identity Provider changes (Automated) ................ 100
4.4 Ensure a notification is configured for IdP group mapping changes (Automated) ........... 104
4.5 Ensure a notification is configured for IAM group changes (Automated) ......................... 107
4.6 Ensure a notification is configured for IAM policy changes (Automated) ......................... 110
4.7 Ensure a notification is configured for user changes (Automated) ................................... 113
4.8 Ensure a notification is configured for VCN changes (Automated) .................................. 117
4.9 Ensure a notification is configured for changes to route tables (Automated) ................... 120
4.10 Ensure a notification is configured for security list changes (Automated) ...................... 124
4.11 Ensure a notification is configured for network security group changes (Automated) ... 128
4.12 Ensure a notification is configured for changes to network gateways (Automated) ....... 132
4.13 Ensure VCN flow logging is enabled for all subnets (Automated) .................................. 138
4.14 Ensure Cloud Guard is enabled in the root compartment of the tenancy (Automated).. 141
4.15 Ensure a notification is configured for Oracle Cloud Guard problems detected
(Automated) ............................................................................................................................ 144
4.16 Ensure customer created Customer Managed Key (CMK) is rotated at least annually
(Automated) ............................................................................................................................ 148
4.17 Ensure write level Object Storage logging is enabled for all buckets (Automated) ........ 150
Page 3
4.18 Ensure a notification is configured for Local OCI User Authentication (Automated) ...... 154
5 Storage .............................................................................................................................157
5.1 Object Storage ............................................................................................................................. 158
5.1.1 Ensure no Object Storage buckets are publicly visible. (Automated)............................ 159
5.1.2 Ensure Object Storage Buckets are encrypted with a Customer Managed Key (CMK).
(Automated) ............................................................................................................................ 162
5.1.3 Ensure Versioning is Enabled for Object Storage Buckets (Automated) ...................... 165
5.2 Block Volumes ............................................................................................................................. 167
5.2.1 Ensure Block Volumes are encrypted with Customer Managed Keys (CMK).
(Automated) ............................................................................................................................ 168
5.2.2 Ensure boot volumes are encrypted with Customer Managed Key (CMK). (Automated)
................................................................................................................................................ 171
5.3 File Storage Service..................................................................................................................... 174
5.3.1 Ensure File Storage Systems are encrypted with Customer Managed Keys (CMK)
(Automated) ............................................................................................................................ 175
6 Asset Management ..........................................................................................................178
6.1 Create at least one compartment in your tenancy to store cloud resources (Automated) 179
6.2 Ensure no resources are created in the root compartment (Automated) ......................... 181
Appendix: Summary Table ....................................................................................... 184
Appendix: CIS Controls v7 IG 1 Mapped Recommendations ................................ 189
Appendix: CIS Controls v7 IG 2 Mapped Recommendations ................................ 191
Appendix: CIS Controls v7 IG 3 Mapped Recommendations ................................ 194
Appendix: CIS Controls v7 Unmapped Recommendations................................... 197
Appendix: CIS Controls v8 IG 1 Mapped Recommendations ................................ 198
Appendix: CIS Controls v8 IG 2 Mapped Recommendations ................................ 201
Appendix: CIS Controls v8 IG 3 Mapped Recommendations ................................ 204
Appendix: CIS Controls v8 Unmapped Recommendations................................... 207
Appendix: Change History ....................................................................................... 208
Page 4
Overview
All CIS Benchmarks™ (Benchmarks) focus on technical configuration settings used to
maintain and/or increase the security of the addressed technology, and they should be
used in conjunction with other essential cyber hygiene tasks like:
Monitoring the base operating system and applications for vulnerabilities and
quickly updating with the latest security patches.
End-point protection (Antivirus software, Endpoint Detection and Response
(EDR), etc.).
Logging and monitoring user and system activity.
These tools make the hardening process much more scalable for large numbers of
systems and applications.
NOTE: Some tooling focuses only on the Benchmark Recommendations that can
be fully automated (skipping ones marked Manual). It is important that ALL
Recommendations (Automated and Manual) be addressed since all are
important for properly securing systems and are typically in scope for
audits.
Key Stakeholders
Cybersecurity is a collaborative effort, and cross functional cooperation is imperative
within an organization to discuss, test, and deploy Benchmarks in an effective and
efficient way. The Benchmarks are developed to be best practice configuration
guidelines applicable to a wide range of use cases. In some organizations, exceptions
to specific Recommendations will be needed, and this team should work to prioritize the
problematic Recommendations based on several factors like risk, time, cost, and labor.
These exceptions should be properly categorized and documented for auditing
purposes.
Page 5
Apply the Correct Version of a Benchmark
Benchmarks are developed and tested for a specific set of products and versions and
applying an incorrect Benchmark to a system can cause the resulting pass/fail score to
be incorrect. This is due to the assessment of settings that do not apply to the target
systems. To assure the correct Benchmark is being assessed:
Deploy the Benchmark applicable to the way settings are managed in the
environment: An example of this is the Microsoft Windows family of
Benchmarks, which have separate Benchmarks for Group Policy, Intune, and
Stand-alone systems based upon how system management is deployed.
Applying the wrong Benchmark in this case will give invalid results.
Use the most recent version of a Benchmark: This is true for all Benchmarks,
but especially true for cloud technologies. Cloud technologies change frequently
and using an older version of a Benchmark may have invalid methods for
auditing and remediation.
Exceptions
The guidance items in the Benchmarks are called recommendations and not
requirements, and exceptions to some of them are expected and acceptable. The
Benchmarks strive to be a secure baseline, or starting point, for a specific technology,
with known issues identified during Benchmark development are documented in the
Impact section of each Recommendation. In addition, organizational, system specific
requirements, or local site policy may require changes as well, or an exception to a
Recommendation or group of Recommendations (e.g. A Benchmark could Recommend
that a Web server not be installed on the system, but if a system's primary purpose is to
function as a Webserver, there should be a documented exception to this
Recommendation for that specific server).
It is the responsibility of the organization to determine their overall security policy, and
which settings are applicable to their unique needs based on the overall risk profile for
the organization.
Page 6
Remediation
CIS has developed Build Kits for many technologies to assist in the automation of
hardening systems. Build Kits are designed to correspond to Benchmark's
“Remediation” section, which provides the manual remediation steps necessary to make
that Recommendation compliant to the Benchmark.
NOTE: As previously stated, the PDF versions of the CIS Benchmarks™ are
available for free, non-commercial use on the CIS Website. All other formats
of the CIS Benchmarks™ (MS Word, Excel, and Build Kits) are available for
CIS SecureSuite® members.
Page 7
Target Technology Details
This document, CIS Oracle Cloud Infrastructure Foundations Benchmark, provides
prescriptive guidance for establishing a secure baseline configuration for the Oracle
Cloud Infrastructure environment. The scope of this benchmark is to establish a base
level of security for anyone utilizing the included Oracle Cloud Infrastructure services.
The benchmark is, however, not an exhaustive list of all possible security configurations
and architecture. You should take the benchmark as a starting point and do the required
site-specific tailoring wherever needed and when it is prudent to do so.
The Compliance Checking script available in the CIS OCI Landing Zone Quick Start
(https://github.com/oracle-quickstart/oci-cis-landingzone-quickstart) repository checks a
tenancy's configuration against the CIS OCI Foundations Benchmark. To learn more,
please visit https://github.com/oracle-quickstart/oci-cis-landingzone-
quickstart/blob/main/compliance-script.md.
Recommendation compliance can, in many cases, also be audited using REST API.
More information about using REST API can be found here:
https://docs.oracle.com/en/cloud/saas/enterprise-data-management-
cloud/edmra/edmcs_accessing_rest_apis.html
To obtain the latest version of this guide, please visit https://www.cisecurity.org/cis-
benchmarks/. If you have questions, comments, or have identified ways to improve this
guide, please write us at [email protected].
Intended Audience
This document is intended for system and application administrators, security
specialists, auditors, help desk, platform deployment, and/or DevOps personnel who
plan to develop, deploy, assess, or secure solutions in the Oracle Cloud Infrastructure.
Page 8
Consensus Guidance
This CIS Benchmark™ was created using a consensus review process comprised of a
global community of subject matter experts. The process combines real world
experience with data-based information to create technology specific guidance to assist
users to secure their environments. Consensus participants provide perspective from a
diverse set of backgrounds including consulting, software development, audit and
compliance, security research, operations, government, and legal.
Each CIS Benchmark undergoes two phases of consensus review. The first phase
occurs during initial Benchmark development. During this phase, subject matter experts
convene to discuss, create, and test working drafts of the Benchmark. This discussion
occurs until consensus has been reached on Benchmark recommendations. The
second phase begins after the Benchmark has been published. During this phase, all
feedback provided by the Internet community is reviewed by the consensus team for
incorporation in the Benchmark. If you are interested in participating in the consensus
process, please visit https://workbench.cisecurity.org/.
Page 9
Typographical Conventions
The following typographical conventions are used throughout this guide:
Convention Meaning
Page 10
Recommendation Definitions
The following defines the various components included in a CIS recommendation as
applicable. If any of the components are not applicable it will be noted, or the
component will not be included in the recommendation.
Title
Concise description for the recommendation's intended configuration.
Assessment Status
An assessment status is included for every recommendation. The assessment status
indicates whether the given recommendation can be automated or requires manual
steps to implement. Both statuses are equally important and are determined and
supported as defined below:
Automated
Represents recommendations for which assessment of a technical control can be fully
automated and validated to a pass/fail state. Recommendations will include the
necessary information to implement automation.
Manual
Represents recommendations for which assessment of a technical control cannot be
fully automated and requires all or some manual steps to validate that the configured
state is set as expected. The expected state can vary depending on the environment.
Profile
A collection of recommendations for securing a technology or a supporting platform.
Most benchmarks include at least a Level 1 and Level 2 Profile. Level 2 extends Level 1
recommendations and is not a standalone profile. The Profile Definitions section in the
benchmark provides the definitions as they pertain to the recommendations included for
the technology.
Description
Detailed information pertaining to the setting with which the recommendation is
concerned. In some cases, the description will include the recommended value.
Rationale Statement
Detailed reasoning for the recommendation to provide the user a clear and concise
understanding on the importance of the recommendation.
Page 11
Impact Statement
Any security, functionality, or operational consequences that can result from following
the recommendation.
Audit Procedure
Systematic instructions for determining if the target system complies with the
recommendation.
Remediation Procedure
Systematic instructions for applying recommendations to the target system to bring it
into compliance according to the recommendation.
Default Value
Default value for the given setting in this recommendation, if known. If not known, either
not configured or not defined will be applied.
References
Additional documentation relative to the recommendation.
Additional Information
Supplementary information that does not correspond to any other field but may be
useful to the user.
Page 12
Profile Definitions
The following configuration profiles are defined by this Benchmark:
Level 1
Level 2
This profile extends the "Level 1" profile. Items in this profile exhibit one or more
of the following characteristics:
o are intended for environments or use cases where security is more critical
than manageability and usability
o acts as defense in depth measure
o may impact the utility or performance of the technology
o may include additional licensing, cost, or addition of third party software
Page 13
Acknowledgements
This Benchmark exemplifies the great things a community of users, vendors, and
subject matter experts can accomplish through consensus collaboration. The CIS
community thanks the entire consensus team with special recognition to the following
individuals who contributed greatly to the creation of this guide:
Contributor
Mike Wicks
Rachel Rice
Bhushan Bhat
Harshal Khachane
Daniel Thorpe
Olaf Heimburger
Deepak N
Editor
Josh Hammer
Page 14
Recommendations
1 Identity and Access Management
This section contains recommendations for configuring identity and access
management related options.
Page 15
1.1 Ensure service level admins are created to manage resources
of particular service (Manual)
Profile Applicability:
Level 1
Description:
To apply least-privilege security principle, one can create service-level administrators in
corresponding groups and assigning specific users to each service-level administrative
group in a tenancy. This limits administrative access in a tenancy.
It means service-level administrators can only manage resources of a specific service.
Example policies for global/tenant level service-administrators
Allow group VolumeAdmins to manage volume-family in tenancy
Allow group ComputeAdmins to manage instance-family in tenancy
Allow group NetworkAdmins to manage virtual-network-family in tenancy
A tenancy with identity domains : An Identity Domain is a container of users,
groups, Apps and other security configurations. A tenancy that has Identity
Domains available comes seeded with a 'Default' identity domain.
Page 16
Allow group NonProdComputeAdmins to manage instance-family in compartment dev
Allow group ProdComputeAdmins to manage instance-family in compartment
production
Allow group A-Admins to manage instance-family in compartment Project-A
Allow group A-Admins to manage volume-family in compartment Project-A
A tenancy with identity domains : An Identity Domain is a container of users,
groups, Apps and other security configurations. A tenancy that has Identity
Domains available comes seeded with a 'Default' identity domain.
Rationale:
Creating service-level administrators helps in tightly controlling access to Oracle Cloud
Infrastructure (OCI) services to implement the least-privileged security principle.
Audit:
From CLI:
1. Set up OCI CLI with an IAM administrator user who has read access to IAM
resources such as groups and policies.
2. Run OCI CLI command providing the root_compartment_OCID
Get the list of groups in a tenancy
Page 17
The --compartment-id parameter can be changed to a child compartment to get policies
associated with child compartments.
oci iam policy list --compartment-id <child_compartment_OCID> | grep "in
compartment"
Verify the results to ensure the right policies are created for service-administrators to
have the necessary access.
Remediation:
Refer to the policy syntax document and create new policies if the audit results indicate
that the required policies are missing.
This can be done via OCI console or OCI CLI/SDK or API.
Creating a new policy:
From CLI:
oci iam policy create [OPTIONS]
Creates a new policy in the specified compartment (either the tenancy or another of
your compartments). If you're new to policies, see
Getting Started with Policies
You must specify a name for the policy, which must be unique across all policies in your
tenancy and cannot be changed.
You must also specify a description for the policy (although it can be an empty string). It
does not have to be unique, and you can change it anytime with UpdatePolicy.
You must specify one or more policy statements in the statements array.
For information about writing policies, see How Policies Work and Common Policies.
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 18
Controls
Control IG 1 IG 2 IG 3
Version
Page 19
1.2 Ensure permissions on all resources are given only to the
tenancy administrator group (Automated)
Profile Applicability:
Level 1
Description:
There is a built-in OCI IAM policy enabling the Administrators group to perform any
action within a tenancy. In the OCI IAM console, this policy reads:
Allow group Administrators to manage all-resources in tenancy
Administrators create more users, groups, and policies to provide appropriate access to
other groups.
Administrators should not allow any-other-group full access to the tenancy by writing a
policy like this -
Allow group any-other-group to manage all-resources in tenancy
The access should be narrowed down to ensure the least-privileged principle is applied.
Rationale:
Permission to manage all resources in a tenancy should be limited to a small number of
users in the Administrators group for break-glass situations and to set up
users/groups/policies when a tenancy is created.
No group other than Administrators in a tenancy should need access to all resources
in a tenancy, as this violates the enforcement of the least privilege principle.
Audit:
From CLI:
1. Run OCI CLI command providing the root compartment OCID to get the list of
groups having access to manage all resources in your tenancy.
2. Verify the results to ensure only the Administrators group has access to
manage all resources in tenancy.
Page 20
Remediation:
From Console:
From CLI:
The policies can also be updated via OCI CLI, SDK and API, with an example of the CLI
commands below:
Note: You should generally not delete the policy that allows the Administrators group
the ability to manage all resources in the tenancy.
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 21
1.3 Ensure IAM administrators cannot update tenancy
Administrators group (Automated)
Profile Applicability:
Level 1
Description:
Tenancy administrators can create more users, groups, and policies to provide other
service administrators access to OCI resources.
For example, an IAM administrator will need to have access to manage resources like
compartments, users, groups, dynamic-groups, policies, identity-providers, tenancy tag-
namespaces, tag-definitions in the tenancy.
The policy that gives IAM-Administrators or any other group full access to 'groups'
resources should not allow access to the tenancy 'Administrators' group.
The policy statements would look like -
Allow group IAMAdmins to inspect users in tenancy
Allow group IAMAdmins to use users in tenancy where target.group.name !=
'Administrators'
Allow group IAMAdmins to inspect groups in tenancy
Allow group IAMAdmins to use groups in tenancy where target.group.name !=
'Administrators'
Note: You must include separate statements for 'inspect' access, because the
target.group.name variable is not used by the ListUsers and ListGroups operations
Rationale:
These policy statements ensure that no other group can manage tenancy administrator
users or the membership to the 'Administrators' group thereby gain or remove tenancy
administrator access.
Audit:
From CLI:
Page 22
2. Verify the results to ensure that the policy statements that grant access to use or
manage users or groups in the tenancy have a condition that excludes access to
Administrators group or to users in the Administrators group.
Remediation:
From Console:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 23
1.4 Ensure IAM password policy requires minimum length of 14 or
greater (Automated)
Profile Applicability:
Level 1
Description:
Password policies are used to enforce password complexity requirements. IAM
password policies can be used to ensure passwords are at least a certain length and
are composed of certain characters.
It is recommended the password policy require a minimum password length 14
characters and contain 1 non-alphabetic character (Number or “Special Character”).
Rationale:
In keeping with the overall goal of having users create a password that is not overly
weak, an eight-character minimum password length is recommended for an MFA
account, and 14 characters for a password only account. In addition, maximum
password length should be made as long as possible based on system/software
capabilities and not restricted by policy.
In general, it is true that longer passwords are better (harder to crack), but it is also true
that forced password length requirements can cause user behavior that is predictable
and undesirable. For example, requiring users to have a minimum 16-character
password may cause them to choose repeating patterns like fourfourfourfour or
passwordpassword that meet the requirement but aren’t hard to guess. Additionally,
length requirements increase the chances that users will adopt other insecure practices,
like writing them down, re-using them or storing them unencrypted in their documents.
Password composition requirements are a poor defense against guessing attacks.
Forcing users to choose some combination of upper-case, lower-case, numbers, and
special characters has a negative impact. It places an extra burden on users and many
will use predictable patterns (for example, a capital letter in the first position, followed by
lowercase letters, then one or two numbers, and a “special character” at the end).
Attackers know this, so dictionary attacks will often contain these common patterns and
use the most common substitutions like, $ for s, @ for a, 1 for l, 0 for o.
Passwords that are too complex in nature make it harder for users to remember, leading
to bad practices. In addition, composition requirements provide no defense against
common attack types such as social engineering or insecure storage of passwords.
Audit:
Page 24
4. Click on Settings
5. Click on Password policy
6. Click each Password policy in the domain
7. Ensure Password length (minimum) is greater than or equal to 14
8. Under The The following criteria apply to passwords section, ensure
that the number given in Numeric (minimum) setting is 1, or the Special
(minimum) setting is 1.
1. Type Cloud Guard into the Search box at the top of the Console.
2. Click Cloud Guard from the “Services” submenu.
3. Click Detector Recipes in the Cloud Guard menu.
4. Click OCI Configuration Detector Recipe (Oracle Managed) under the
Recipe Name column.
5. Find Password policy does not meet complexity requirements in the Detector
Rules column.
6. Select the vertical ellipsis icon and chose Edit on the Password policy does not
meet complexity requirements row.
7. In the Edit Detector Rule window, find the Input Setting box and verify/change the
Required password length setting to 14.
8. Click the Save button.
From CLI:
1. Update the Password policy does not meet complexity requirements Detector
Rule in Cloud Guard to generate Problems if IAM password policy isn’t
configured to enforce a password length of at least 14 characters with the
following command:
Remediation:
Page 25
2. Select the Compartment the Domain to remediate is in
3. Click on the Domain to remediate
4. Click on Settings
5. Click on Password policy to remediate
6. Click Edit password rules
7. Update the Password length (minimum) setting to 14 or greater
8. Under The Passwords must meet the following character requirements
section, update the number given in Special (minimum) setting to 1 or greater
or
Under The Passwords must meet the following character requirements
section, update the number given in Numeric (minimum) setting to 1 or greater
7. Click Save changes
References:
1. https://www.cisecurity.org/white-papers/cis-password-policy-guide/
Additional Information:
The Audit Procedure and Remediation Procedure for OCI IAM without Identity Domains
can be found in the CIS OCI Foundation Benchmark 2.0.0 under the respective
recommendations.
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 26
1.5 Ensure IAM password policy expires passwords within 365
days (Manual)
Profile Applicability:
Level 1
Description:
IAM password policies can require passwords to be rotated or expired after a given
number of days. It is recommended that the password policy expire passwords after 365
and are changed immediately based on events.
Rationale:
Excessive password expiration requirements do more harm than good, because these
requirements make users select predictable passwords, composed of sequential words
and numbers that are closely related to each other.10 In these cases, the next
password can be predicted based on the previous one (incrementing a number used in
the password for example). Also, password expiration requirements offer no
containment benefits because attackers will often use credentials as soon as they
compromise them. Instead, immediate password changes should be based on key
events including, but not limited to:
1. Indication of compromise
2. Change of user roles
3. When a user leaves the organization.
Not only does changing passwords every few weeks or months frustrate the user, it’s
been suggested that it does more harm than good, because it could lead to bad
practices by the user such as adding a character to the end of their existing password.
In addition, we also recommend a yearly password change. This is primarily because
for all their good intentions users will share credentials across accounts. Therefore,
even if a breach is publicly identified, the user may not see this notification, or forget
they have an account on that site. This could leave a shared credential vulnerable
indefinitely. Having an organizational policy of a 1-year (annual) password expiration is
a reasonable compromise to mitigate this with minimal user burden.
Audit:
Page 27
7. Ensure Expires after (days) is less than or equal to 365 days
Remediation:
References:
1. https://www.cisecurity.org/white-papers/cis-password-policy-guide/
Additional Information:
The Audit Procedure and Remediation Procedure for OCI IAM without Identity Domains
can be found in the CIS OCI Foundation Benchmark 2.0.0 under the respective
recommendations.
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 28
1.6 Ensure IAM password policy prevents password reuse
(Manual)
Profile Applicability:
Level 1
Description:
IAM password policies can prevent the reuse of a given password by the same user. It
is recommended the password policy prevent the reuse of passwords.
Rationale:
Enforcing password history ensures that passwords are not reused in for a certain
period of time by the same user. If a user is not allowed to use last 24 passwords, that
window of time is greater. This helps maintain the effectiveness of password security.
Audit:
Remediation:
Additional Information:
The Audit Procedure and Remediation Procedure for OCI IAM without Identity Domains
can be found in the CIS OCI Foundation Benchmark 2.0.0 under the respective
recommendations.
Page 29
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 30
1.7 Ensure MFA is enabled for all users with a console password
(Automated)
Profile Applicability:
Level 1
Description:
Multi-factor authentication is a method of authentication that requires the use of more
than one factor to verify a user’s identity.
With MFA enabled in the IAM service, when a user signs in to Oracle Cloud
Infrastructure, they are prompted for their user name and password, which is the first
factor (something that they know). The user is then prompted to provide a verification
code from a registered MFA device, which is the second factor (something that they
have). The two factors work together, requiring an extra layer of security to verify the
user’s identity and complete the sign-in process.
OCI IAM supports two-factor authentication using a password (first factor) and a device
that can generate a time-based one-time password (TOTP) (second factor).
See OCI documentation for more details.
Rationale:
Multi factor authentication adds an extra layer of security during the login process and
makes it harder for unauthorized users to gain access to OCI resources.
Audit:
From Console:
This requires users to enable MFA when they next login next however, to
determine users have enabled MFA use the below CLI.
Page 31
From the CLI:
This CLI command checks which users have enabled MFA for their accounts
done
for region in `oci iam region-subscription list | jq -r '.data[] | ."region-
name"'`;
do
for compid in `oci iam compartment list --compartment-id-in-subtree
TRUE --all 2>/dev/null | jq -r '.data[] | .id'`
do
for id_domain_url in `oci iam domain list --compartment-id
$compid --region $region --all 2>/dev/null | jq -r '.data[] | .url'`
do
oci identity-domains users list --endpoint $id_domain_url
2>/dev/null | jq -r '.data.resources[] | select(."urn-ietf-params-scim-
schemas-oracle-idcs-extension-mfa-user"."mfa-status"!="ENROLLED")'
2>/dev/null | jq -r '.ocid'
done
done
done
Remediation:
Each user must enable MFA for themselves using a device they will have access to
every time they sign in. An administrator cannot enable MFA for another user but can
enforce MFA by identifying the list of non-complaint users, notifying them or disabling
access by resetting the password for non-complaint accounts.
Disabling access from Console:
1. Go to https://cloud.oracle.com/identity/.
2. Select Domains from Identity menu.
3. Select the domain
4. Click Security
5. Click Sign-on polices then the "Default Sign-on Policy"
6. Under the sign-on rules header, click the three dots on the rule with the highest
priority.
7. Select Edit sign-on rule
Page 32
8. Make a change to ensure that allow access is selected and prompt for an
additional factor is enabled
References:
1. https://docs.cloud.oracle.com/en-us/iaas/Content/Identity/Tasks/usingmfa.htm
2. https://docs.oracle.com/en-
us/iaas/Content/Security/Reference/iam_security_topic-IAM_MFA.htm
Additional Information:
The Audit Procedure and Remediation Procedure for OCI IAM without Identity Domains
can be found in the CIS OCI Foundation Benchmark 2.0.0 under the respective
recommendations.
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 33
1.8 Ensure user API keys rotate within 90 days (Automated)
Profile Applicability:
Level 1
Description:
API keys are used by administrators, developers, services and scripts for accessing
OCI APIs directly or via SDKs/OCI CLI to search, create, update or delete OCI
resources.
The API key is an RSA key pair. The private key is used for signing the API requests
and the public key is associated with a local or synchronized user's profile.
Rationale:
It is important to secure and rotate an API key every 90 days or less as it provides the
same level of access that a user it is associated with has.
In addition to a security engineering best practice, this is also a compliance
requirement. For example, PCI-DSS Section 3.6.4 states, "Verify that key-management
procedures include a defined cryptoperiod for each key type in use and define a
process for key changes at the end of the defined crypto period(s)."
Audit:
From Console:
Remediation:
From Console:
Page 34
7. Delete any API Keys that are older than 90 days under the Created column of
the API Key table.
From CLI:
oci iam user api-key delete --user-id _<user_ocid>_ --fingerprint
<fingerprint_of_the_key_to_be_deleted>
Additional Information:
The Audit Procedure and Remediation Procedure for OCI IAM without Identity Domains
can be found in the CIS OCI Foundation Benchmark 2.0.0 under the respective
recommendations.
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 35
1.9 Ensure user customer secret keys rotate every 90 days
(Automated)
Profile Applicability:
Level 1
Description:
Object Storage provides an API to enable interoperability with Amazon S3. To use this
Amazon S3 Compatibility API, you need to generate the signing key required to
authenticate with Amazon S3.
This special signing key is an Access Key/Secret Key pair. Oracle generates the
Customer Secret key to pair with the Access Key.
Rationale:
It is important to rotate customer secret keys at least every 90 days, as they provide the
same level of object storage access that the user they are associated with has.
Audit:
From Console:
Remediation:
From Console:
Page 36
Additional Information:
The Audit Procedure and Remediation Procedure for OCI IAM without Identity Domains
can be found in the CIS OCI Foundation Benchmark 2.0.0 under the respective
recommendations.
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 37
1.10 Ensure user auth tokens rotate within 90 days or less
(Automated)
Profile Applicability:
Level 1
Description:
Auth tokens are authentication tokens generated by Oracle. You use auth tokens to
authenticate with APIs that do not support the Oracle Cloud Infrastructure signature-
based authentication. If the service requires an auth token, the service-specific
documentation instructs you to generate one and how to use it.
Rationale:
It is important to secure and rotate an auth token every 90 days or less as it provides
the same level of access to APIs that do not support the OCI signature-based
authentication as the user associated to it.
Audit:
From Console:
Remediation:
From Console:
Page 38
Additional Information:
The Audit Procedure and Remediation Procedure for OCI IAM without Identity Domains
can be found in the CIS OCI Foundation Benchmark 2.0.0 under the respective
recommendations.
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 39
1.11 Ensure user IAM Database Passwords rotate within 90 days
(Manual)
Profile Applicability:
Level 1
Description:
Users can create and manage their database password in their IAM user profile and use
that password to authenticate to databases in their tenancy. An IAM database password
is a different password than an OCI Console password. Setting an IAM database
password allows an authorized IAM user to sign in to one or more Autonomous
Databases in their tenancy.
An IAM database password is a different password than an OCI Console password.
Setting an IAM database password allows an authorized IAM user to sign in to one or
more Autonomous Databases in their tenancy.
Rationale:
It is important to secure and rotate an IAM Database password 90 days or less as it
provides the same access the user would have a using a local database user.
Audit:
From Console:
Page 40
Remediation:
From Console:
References:
1. https://docs.oracle.com/en-
us/iaas/Content/Identity/Concepts/usercredentials.htm#usercredentials_iam_db_
pwd
Additional Information:
The Audit Procedure and Remediation Procedure for OCI IAM without Identity Domains
can be found in the CIS OCI Foundation Benchmark 2.0.0 under the respective
recommendations.
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 41
1.12 Ensure API keys are not created for tenancy administrator
users (Automated)
Profile Applicability:
Level 1
Description:
Tenancy administrator users have full access to the organization's OCI tenancy. API
keys associated with user accounts are used for invoking the OCI APIs via custom
programs or clients like CLI/SDKs. The clients are typically used for performing day-to-
day operations and should never require full tenancy access. Service-level
administrative users with API keys should be used instead.
Rationale:
For performing day-to-day operations tenancy administrator access is not needed.
Service-level administrative users with API keys should be used to apply privileged
security principle.
Audit:
From Console:
Remediation:
From Console:
Page 42
From CLI:
1. For each tenancy administrator user with an API key, execute the following
command to retrieve API key details:
2. For each API key, execute the following command to delete the key:
Additional Information:
The Audit Procedure and Remediation Procedure for OCI IAM without Identity Domains
can be found in the CIS OCI Foundation Benchmark 2.0.0 under the respective
recommendations.
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 43
1.13 Ensure all OCI IAM user accounts have a valid and current
email address (Manual)
Profile Applicability:
Level 1
Description:
All OCI IAM local user accounts have an email address field associated with the
account. It is recommended to specify an email address that is valid and current.
If you have an email address in your user profile, you can use the Forgot Password link
on the sign on page to have a temporary password sent to you.
Rationale:
Having a valid and current email address associated with an OCI IAM local user
account allows you to tie the account to identity in your organization. It also allows that
user to reset their password if it is forgotten or lost.
Audit:
From Console:
Remediation:
From Console:
Page 44
Additional Information:
The Audit Procedure and Remediation Procedure for OCI IAM without Identity Domains
can be found in the CIS OCI Foundation Benchmark 2.0.0 under the respective
recommendations.
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 45
1.14 Ensure Instance Principal authentication is used for OCI
instances, OCI Cloud Databases and OCI Functions to access
OCI resources. (Manual)
Profile Applicability:
Level 1
Description:
OCI instances, OCI database and OCI functions can access other OCI resources either
via an OCI API key associated to a user or via Instance Principal. Instance Principal
authentication can be achieved by inclusion in a Dynamic Group that has an IAM policy
granting it the required access or using an OCI IAM policy that has
request.principal added to the where clause. Access to OCI Resources refers to
making API calls to another OCI resource like Object Storage, OCI Vaults, etc.
Rationale:
Instance Principal reduces the risks related to hard-coded credentials. Hard-coded API
keys can be shared and require rotation, which can open them up to being
compromised. Compromised credentials could allow access to OCI services outside of
the expected radius.
Impact:
For an OCI instance that contains embedded credential audit the scripts and
environment variables to ensure that none of them contain OCI API Keys or credentials.
Audit:
From Console (Dynamic Groups):
1. Go to https://cloud.oracle.com/identity/domains/
2. Select a Compartment
3. Click on a Domain
4. Click on Dynamic groups
5. Click on the Dynamic Group
6. Check if the Matching Rules includes the instances accessing your OCI
resources.
1. Go to https://cloud.oracle.com/identity/policies
2. Select a Compartment
3. Click on an individual policy under the Name heading.
4. Ensure Policy statements look like this :
Page 46
allow any-user to <verb> <resource> in compartment <compartment-name> where
ALL {request.principal.type='<resource_type>',
request.principal.id='<resource_ocid>'}
or
allow any-user to <verb> <resource> in compartment <compartment-name> where
ALL {request.principal.type='<resource_type>',
request.principal.compartment.id='<compartment_OCID>'}
From CLI (request.principal):
1. Ensure that the condition includes the instances accessing your OCI resources
Remediation:
From Console (Dynamic Groups):
1. Go to https://cloud.oracle.com/identity/domains/
2. Select a Compartment
3. Click on the Domain
4. Click on Dynamic groups
5. Click Create Dynamic Group.
6. Enter a Name
7. Enter a Description
8. Enter Matching Rules to that includes the instances accessing your OCI
resources.
9. Click Create.
References:
1. https://docs.oracle.com/en-
us/iaas/Content/Identity/Tasks/managingdynamicgroups.htm
Additional Information:
The Audit Procedure and Remediation Procedure for OCI IAM without Identity Domains
can be found in the CIS OCI Foundation Benchmark 2.0.0 under the respective
recommendations.
Page 47
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 48
1.15 Ensure storage service-level admins cannot delete
resources they manage. (Manual)
Profile Applicability:
Level 2
Description:
To apply the separation of duties security principle, one can restrict service-level
administrators from being able to delete resources they are managing. It means service-
level administrators can only manage resources of a specific service but not delete
resources for that specific service.
Example policies for global/tenant level for block volume service-administrators:
Allow group VolumeUsers to manage volumes in tenancy where
request.permission!='VOLUME_DELETE'
Allow group VolumeUsers to manage volume-backups in tenancy where
request.permission!='VOLUME_BACKUP_DELETE'
Example policies for global/tenant level for file storage system service-administrators:
Allow group FileUsers to manage file-systems in tenancy where
request.permission!='FILE_SYSTEM_DELETE'
Allow group FileUsers to manage mount-targets in tenancy where
request.permission!='MOUNT_TARGET_DELETE'
Allow group FileUsers to manage export-sets in tenancy where
request.permission!='EXPORT_SET_DELETE'
Example policies for global/tenant level for object storage system service-
administrators:
Allow group BucketUsers to manage objects in tenancy where
request.permission!='OBJECT_DELETE'
Allow group BucketUsers to manage buckets in tenancy where
request.permission!='BUCKET_DELETE'
Rationale:
Creating service-level administrators without the ability to delete the resource they are
managing helps in tightly controlling access to Oracle Cloud Infrastructure (OCI)
services by implementing the separation of duties security principle.
Audit:
From Console:
Page 49
4. Verify the policies to ensure that the policy statements that grant access to
storage service-level administrators have a condition that excludes access to
delete the service they are the administrator for.
From CLI:
2. Verify the policies to ensure that the policy statements that grant access to
storage service-level administrators have a condition that excludes access to
delete the service they are the administrator for.
Remediation:
From Console:
References:
1. https://docs.oracle.com/en/solutions/oci-best-practices/protect-data-
rest1.html#GUID-939A5EA1-3057-48E0-9E02-ADAFCB82BA3E
2. https://docs.oracle.com/en-
us/iaas/Content/Identity/policyreference/policyreference.htm
3. https://docs.oracle.com/en-us/iaas/Content/Block/home.htm
4. https://docs.oracle.com/en-us/iaas/Content/File/home.htm
5. https://docs.oracle.com/en-us/iaas/Content/Object/home.htm
Page 50
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 51
1.16 Ensure OCI IAM credentials unused for 45 days or more are
disabled (Automated)
Profile Applicability:
Level 1
Description:
OCI IAM Local users can access OCI resources using different credentials, such as
passwords or API keys. It is recommended that credentials that have been unused for
45 days or more be deactivated or removed.
Rationale:
Disabling or removing unnecessary OCI IAM local users will reduce the window of
opportunity for credentials associated with a compromised or abandoned account to be
used.
Audit:
Perform the following to determine if unused credentials exist:
From Console:
For Passwords:
Page 52
search "<tenancy-ocid>/_Audit_Include_Subcompartment" |
data.identity.credentials='<tenancy-ocid>/<user-ocid>/<key-fingerprint>' |
summarize count() by data.identity.principalId
Note each query can only be 14 days multiple queries will be required to go 45
days
9. Click Search
10. Expand the results
11. If results the count is not zero the user has used their API key during that period
12. Repeat steps 8 – 11 for the 45-day period
From CLI:
For Passwords:
2. Review the output the that the date is under 45 days, or no date means they
have not logged in
Note each query can only be 14 days multiple queries will be required to go 45
days
Page 53
oci logging-search search-logs --search-query $query --time-start <start-
date> --time-end <end-date> --query 'data.results[0].data.count'
export query="search \"<tenancy-ocid>/_Audit_Include_Subcompartment\" |
data.identity.credentials='*<key-finger-print>' | summarize count() by
data.identity.principalId"
4. If results the count is not zero, the user has used their API key during that period
5. Repeat steps 2 – 4 for the 45-day period
Remediation:
From Console:
From CLI:
1. Create a input.json:
{
"operations": [
{ "op": "replace", "path": "active","value": false}
],
"schemas": ["urn:ietf:params:scim:api:messages:2.0:PatchOp"],
"userId": "<user-ocid>"
}
Additional Information:
This audit should exclude the OCI Administrator, break-glass accounts, and service
accounts as these accounts should only be used for day-to-day business and would
likely be unused for up to 45 days.
Page 54
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 55
1.17 Ensure there is only one active API Key for any single OCI
IAM user (Automated)
Profile Applicability:
Level 1
Description:
API Keys are long-term credentials for an OCI IAM user. They can be used to make
programmatic requests to the OCI APIs directly or via, OCI SDKs or the OCI CLI.
Rationale:
Having a single API Key for an OCI IAM reduces attack surface area and makes it
easier to manage.
Impact:
Deletion of an OCI API Key will remove programmatic access to OCI APIs
Audit:
From Console:
From CLI:
Remediation:
From Console:
Page 56
3. Select Domains from the Identity menu.
4. For each domain listed, click on the name and select Users.
5. Click on an individual user under the Name heading.
6. Click on API Keys in the lower left-hand corner of the page.
7. Delete one of the API Keys
From CLI:
Default Value:
No API Keys
References:
1. https://docs.public.oneportal.content.oci.oraclecloud.com/en-
us/iaas/Content/Security/Reference/iam_security_topic-
IAM_Credentials.htm#IAM_Credentials
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
5 Account Management
v8 Use processes and tools to assign and manage authorization to credentials for
user accounts, including administrator accounts, as well as service accounts, to
enterprise assets and software.
Page 57
2 Networking
This section contains recommendations for configuring network security related options.
Page 58
2.1 Ensure no security lists allow ingress from 0.0.0.0/0 to port 22
(Automated)
Profile Applicability:
Level 1
Description:
Security lists provide stateful and stateless filtering of ingress and egress network traffic
to OCI resources on a subnet level. It is recommended that no security list allows
unrestricted ingress access to port 22.
Rationale:
Removing unfettered connectivity to remote console services, such as Secure Shell
(SSH), reduces a server's exposure to risk.
Impact:
For updating an existing environment, care should be taken to ensure that
administrators currently relying on an existing ingress from 0.0.0.0/0 have access to
ports 22 and/or 3389 through another network security group or security list.
Audit:
From Console:
From CLI:
Page 59
oci search resource structured-search --query-text "query SecurityList
resources where
(IngressSecurityRules.source = '0.0.0.0/0' &&
IngressSecurityRules.protocol = 6 &&
IngressSecurityRules.tcpOptions.destinationPortRange.max >= 22 &&
IngressSecurityRules.tcpOptions.destinationPortRange.min <= 22)
"
Cloud Guard
Ensure Cloud Guard is enabled in the root compartment of the tenancy. For more
information about enabling Cloud Guard, please look at the instructions included in
Recommendation 3.15.
From Console:
1. Type Cloud Guard into the Search box at the top of the Console.
2. Click Cloud Guard from the “Services” submenu.
3. Click Detector Recipes in the Cloud Guard menu.
4. Click OCI Configuration Detector Recipe (Oracle Managed) under the
Recipe Name column.
5. Find VCN Security list allows traffic to non-public port from all sources (0.0.0.0/0)
in the Detector Rules column.
6. Select the vertical ellipsis icon and chose Edit on the VCN Security list allows
traffic to non-public port from all sources (0.0.0.0/0) row.
7. In the Edit Detector Rule window find the Input Setting box and verify/add to the
Restricted Protocol: Ports List setting to TCP:[22], UDP:[22].
8. Click the Save button.
From CLI:
1. Update the VCN Security list allows traffic to non-public port from all sources
(0.0.0.0/0) Detector Rule in Cloud Guard to generate Problems if a VCN security
list allows public access via port 22 with the following command:
Remediation:
From Console:
Page 60
3. Either edit the ingress rule to be more restrictive, delete the ingress rule or
click on the VCN and terminate the security list as appropriate.
From CLI:
3. Then either:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 61
2.2 Ensure no security lists allow ingress from 0.0.0.0/0 to port
3389 (Automated)
Profile Applicability:
Level 1
Description:
Security lists provide stateful and stateless filtering of ingress and egress network traffic
to OCI resources on a subnet level. It is recommended that no security group allows
unrestricted ingress access to port 3389.
Rationale:
Removing unfettered connectivity to remote console services, such as Remote Desktop
Protocol (RDP), reduces a server's exposure to risk.
Impact:
For updating an existing environment, care should be taken to ensure that
administrators currently relying on an existing ingress from 0.0.0.0/0 have access to
ports 22 and/or 3389 through another network security group or security list.
Audit:
From Console:
From CLI:
Page 62
oci search resource structured-search --query-text "query SecurityList
resources where
(IngressSecurityRules.source = '0.0.0.0/0' &&
IngressSecurityRules.protocol = 6 &&
IngressSecurityRules.tcpOptions.destinationPortRange.max >= 3389 &&
IngressSecurityRules.tcpOptions.destinationPortRange.min <= 3389)
"
Cloud Guard
To Enable Cloud Guard Auditing:
Ensure Cloud Guard is enabled in the root compartment of the tenancy. For more
information about enabling Cloud Guard, please look at the instructions included in
Recommendation 3.15.
From Console:
1. Type Cloud Guard into the Search box at the top of the Console .
2. Click Cloud Guard from the “Services” submenu.
3. Click Detector Recipes in the Cloud Guard menu.
4. Click OCI Configuration Detector Recipe (Oracle Managed) under the
Recipe Name column.
5. Find VCN Security list allows traffic to non-public port from all sources (0.0.0.0/0)
in the Detector Rules column.
6. Select the vertical ellipsis icon and choose Edit on the VCN Security list allows
traffic to non-public port from all sources (0.0.0.0/0) row.
7. In the Edit Detector Rule window find the Input Setting box and verify/add to the
Restricted Protocol: Ports List setting to TCP:[3389], UDP:[3389].
8. Click the Save button.
From CLI:
1. Update the VCN Security list allows traffic to non-public port from all sources
(0.0.0.0/0) Detector Rule in Cloud Guard to generate Problems if a VCN security
list allows public access via port 3389 with the following command:
Remediation:
From Console:
Page 63
3. Either edit the ingress rule to be more restrictive, delete the ingress rule or
click on the VCN and terminate the security list as appropriate.
From CLI:
3. Then either:
Additional Information:
This recommendation can also be audited programmatically using REST API
https://docs.oracle.com/en-us/iaas/api/#/en/iaas/20160918/SecurityList/ListSecurityLists
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 64
2.3 Ensure no network security groups allow ingress from
0.0.0.0/0 to port 22 (Automated)
Profile Applicability:
Level 1
Description:
Network security groups provide stateful filtering of ingress/egress network traffic to OCI
resources. It is recommended that no security group allows unrestricted ingress to port
22.
Rationale:
Removing unfettered connectivity to remote console services, such as Secure Shell
(SSH), reduces a server's exposure to risk.
Impact:
For updating an existing environment, care should be taken to ensure that
administrators currently relying on an existing ingress from 0.0.0.0/0 have access to
ports 22 and/or 3389 through another network security group or security list.
Audit:
From Console:
6. For each of the network security groups in the returned results, click the name
and inspect each of the security rules.
7. Ensure that there are no security rules with direction: Ingress, Source: 0.0.0.0/0,
and Destination Port Range: 22.
From CLI:
Issue the following command, it should return no values.
Page 65
for region in $(oci iam region-subscription list | jq -r '.data[] | ."region-
name"')
do
echo "Enumerating region $region"
for compid in $(oci iam compartment list --include-root --compartment-
id-in-subtree TRUE 2>/dev/null | jq -r '.data[] | .id')
do
echo "Enumerating compartment $compid"
for nsgid in $(oci network nsg list --compartment-id $compid --region
$region --all 2>/dev/null | jq -r '.data[] | .id')
do
output=$(oci network nsg rules list --nsg-id=$nsgid --all
2>/dev/null | jq -r '.data[] | select(.source == "0.0.0.0/0" and .direction
== "INGRESS" and ((."tcp-options"."destination-port-range".max >= 22 and
."tcp-options"."destination-port-range".min <= 22) or ."tcp-
options"."destination-port-range" == null))')
if [ ! -z "$output" ]; then echo "NSGID: ", $nsgid, "Security
Rules: ", $output; fi
done
done
done
Cloud Guard:
To Enable Cloud Guard Auditing:
Ensure Cloud Guard is enabled in the root compartment of the tenancy. For more
information about enabling Cloud Guard, please look at the instructions included in
Recommendation 3.15.
From Console:
1. Type Cloud Guard into the Search box at the top of the Console .
2. Click Cloud Guard from the “Services” submenu.
3. Click Detector Recipes in the Cloud Guard menu.
4. Click OCI Configuration Detector Recipe (Oracle Managed) under the
Recipe Name column.
5. Find NSG ingress rule contains disallowed IP/port in the Detector Rules column.
6. Select the vertical ellipsis icon and chose Edit on the NSG ingress rule contains
disallowed IP/port row.
7. In the Edit Detector Rule window find the Input Setting box and verify/add to the
Restricted Protocol: Ports List setting to TCP:[22], UDP:[22].
8. Click the Save button.
From CLI:
1. Update the NSG ingress rule contains disallowed IP/port Detector Rule in Cloud
Guard to generate Problems if a network security group allows ingress network
traffic to port 22 with the following command:
Page 66
oci cloud-guard detector-recipe-detector-rule update --detector-recipe-id
<insert detector recipe ocid> --detector-rule-id
VCN_NSG_INGRESS_RULE_PORTS_CHECK --details '{"configurations":[ {"configKey"
: "nsgIngressRuleDisallowedPortsConfig", "name" : "Default disallowed ports",
"value" : "TCP:[22], UDP:[22]", "dataType" : null, "values" : null }]}'
Remediation:
From Console:
6. For each of the network security groups in the returned results, click the name
and inspect each of the security rules.
7. Remove all security rules with direction: Ingress, Source: 0.0.0.0/0, and
Destination Port Range: 22.
From CLI:
Issue the following command and identify the security rule to remove.
for region in `oci iam region list | jq -r '.data[] | .name'`;
do
for compid in `oci iam compartment list 2>/dev/null | jq -r '.data[] |
.id'`;
do
for nsgid in `oci network nsg list --compartment-id $compid --
region $region --all 2>/dev/null | jq -r '.data[] | .id'`
do
output=`oci network nsg rules list --nsg-id=$nsgid --all
2>/dev/null | jq -r '.data[] | select(.source == "0.0.0.0/0" and .direction
== "INGRESS" and ((."tcp-options"."destination-port-range".max >= 22 and
."tcp-options"."destination-port-range".min <= 22) or ."tcp-
options"."destination-port-range" == null))'`
if [ ! -z "$output" ]; then echo "NSGID=", $nsgid,
"Security Rules=", $output; fi
done
done
done
Page 67
Update the security rules
oci network nsg rules update --nsg-id=<NSGID from audit output> --security-
rules='[<updated security-rules JSON (without isValid and TimrCreated
fields)>]'
eg:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 68
2.4 Ensure no network security groups allow ingress from
0.0.0.0/0 to port 3389 (Automated)
Profile Applicability:
Level 1
Description:
Network security groups provide stateful filtering of ingress/egress network traffic to OCI
resources. It is recommended that no security group allows unrestricted ingress access
to port 3389.
Rationale:
Removing unfettered connectivity to remote console services, such as Remote Desktop
Protocol (RDP), reduces a server's exposure to risk.
Impact:
For updating an existing environment, care should be taken to ensure that
administrators currently relying on an existing ingress from 0.0.0.0/0 have access to
ports 22 and/or 3389 through another network security group or security list.
Audit:
From CLI:
Issue the following command, it should not return anything.
for region in $(oci iam region-subscription list | jq -r '.data[] |
."region-name"')
do
echo "Enumerating region $region"
for compid in $(oci iam compartment list --include-root --compartment-
id-in-subtree TRUE 2>/dev/null | jq -r '.data[] | .id')
do
echo "Enumerating compartment $compid"
for nsgid in $(oci network nsg list --compartment-id $compid --region
$region --all 2>/dev/null | jq -r '.data[] | .id')
do
output=$(oci network nsg rules list --nsg-id=$nsgid --all
2>/dev/null | jq -r '.data[] | select(.source == "0.0.0.0/0" and .direction
== "INGRESS" and ((."tcp-options"."destination-port-range".max >= 3389 and
."tcp-options"."destination-port-range".min <= 3389) or ."tcp-
options"."destination-port-range" == null))')
if [ ! -z "$output" ]; then echo "NSGID: ", $nsgid, "Security
Rules: ", $output; fi
done
done
done
Page 69
From Cloud Guard:
To Enable Cloud Guard Auditing:
Ensure Cloud Guard is enabled in the root compartment of the tenancy. For more
information about enabling Cloud Guard, please look at the instructions included in
Recommendation 3.15.
From Console:
1. Type Cloud Guard into the Search box at the top of the Console.
2. Click Cloud Guard from the “Services” submenu.
3. Click Detector Recipes in the Cloud Guard menu.
4. Click OCI Configuration Detector Recipe (Oracle Managed) under the
Recipe Name column.
5. Find NSG ingress rule contains disallowed IP/port in the Detector Rules column.
6. Select the vertical ellipsis icon and chose Edit on the NSG ingress rule contains
disallowed IP/port row.
7. In the Edit Detector Rule window find the Input Setting box and verify/add to the
Restricted Protocol: Ports List setting to TCP:[3389], UDP:[3389].
8. Click the Save button.
From CLI:
1. Update the NSG ingress rule contains disallowed IP/port Detector Rule in Cloud
Guard to generate Problems if a network security group allows ingress network
traffic to port 3389 with the following command:
Remediation:
From CLI:
Using the details returned from the audit procedure either:
Page 70
oci network nsg rules update --nsg-id=<NSGID from audit output> --security-
rules=<updated security-rules JSON (without the isValid or TimeCreated
fields)>
eg:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 71
2.5 Ensure the default security list of every VCN restricts all traffic
except ICMP within VCN (Automated)
Profile Applicability:
Level 1
Description:
A default security list is created when a Virtual Cloud Network (VCN) is created and
attached to the public subnets in the VCN. Security lists provide stateful or stateless
filtering of ingress and egress network traffic to OCI resources in the VCN. It is
recommended that the default security list does not allow unrestricted ingress and
egress access to resources in the VCN.
Rationale:
Removing unfettered connectivity to OCI resource, reduces a server's exposure to
unauthorized access or data exfiltration.
Impact:
For updating an existing environment, care should be taken to ensure that
administrators currently relying on an existing ingress from 0.0.0.0/0 have access to port
22 through another network security group and servers have egress to specified ports
and protocols through another network security group.
Audit:
From Console:
Remediation:
From Console:
Page 72
6. Either Edit the Security rule to restrict the source and/or port range or delete the
rule.
7. Identify the Egress Rule with 'Destination 0.0.0.0/0, All Protocols'
8. Either Edit the Security rule to restrict the source and/or port range or delete the
rule.
References:
1. https://docs.oracle.com/en-
us/iaas/Content/Security/Reference/networking_security.htm#Securing_Networki
ng_VCN_Load_Balancers_and_DNS
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 73
2.6 Ensure Oracle Integration Cloud (OIC) access is restricted to
allowed sources. (Manual)
Profile Applicability:
Level 1
Description:
Oracle Integration (OIC) is a complete, secure, but lightweight integration solution that
enables you to connect your applications in the cloud. It simplifies connectivity between
your applications and connects both your applications that live in the cloud and your
applications that still live on premises. Oracle Integration provides secure, enterprise-
grade connectivity regardless of the applications you are connecting or where they
reside. OIC instances are created within an Oracle managed secure private network
with each having a public endpoint. The capability to configure ingress filtering of
network traffic to protect your OIC instances from unauthorized network access is
included. It is recommended that network access to your OIC instances be restricted to
your approved corporate IP Addresses or Virtual Cloud Networks (VCN)s.
Rationale:
Restricting connectivity to OIC Instances reduces an OIC instance’s exposure to risk.
Impact:
When updating ingress filters for an existing environment, care should be taken to
ensure that IP addresses and VCNs currently used by administrators, users, and
services to access your OIC instances are included in the updated filters.
Audit:
From Console:
6. For each OIC Instance returned click on the link under Display name
7. Click on Network Access
8 .Ensure Restrict Network Access is selected and the IP Address/CIDR
Block as well as Virtual Cloud Networks are correct
8. Repeat for other subscribed regions
Page 74
From CLI:
Remediation:
From Console:
From CLI
References:
1. https://docs.oracle.com/en/cloud/paas/integration-cloud/integrations-user/get-
started-integration-cloud-service.html
Page 75
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 76
2.7 Ensure Oracle Analytics Cloud (OAC) access is restricted to
allowed sources or deployed within a Virtual Cloud Network.
(Manual)
Profile Applicability:
Level 1
Description:
Oracle Analytics Cloud (OAC) is a scalable and secure public cloud service that
provides a full set of capabilities to explore and perform collaborative analytics for you,
your workgroup, and your enterprise. OAC instances provide ingress filtering of network
traffic or can be deployed with in an existing Virtual Cloud Network VCN. It is
recommended that all new OAC instances be deployed within a VCN and that the
Access Control Rules are restricted to your corporate IP Addresses or VCNs for existing
OAC instances.
Rationale:
Restricting connectivity to Oracle Analytics Cloud instances reduces an OAC instance’s
exposure to risk.
Impact:
When updating ingress filters for an existing environment, care should be taken to
ensure that IP addresses and VCNs currently used by administrators, users, and
services to access your OAC instances are included in the updated filters. Also, these
changes will temporarily bring the OAC instance offline.
Audit:
From Console:
1 Login into the OCI Console
2. Click in the search bar, top of the screen.
3. Type Advanced Resource Query and hit enter.
4. Click the Advanced Resource Query button in the upper right of the screen.
5. Enter the following query in the query box:
query analyticsinstance resources
6. For each OAC Instance returned click on the link under Display name.
7. Ensure Access Control Rules IP Address/CIDR Block as well as Virtual Cloud
Networks are correct.
8. Repeat for other subscribed regions.
From CLI:
Page 77
1. Execute the following command:
Remediation:
From Console:
From CLI:
Additional Information:
https://docs.oracle.com/en/cloud/paas/analytics-cloud/acoci/manage-service-access-
and-security.html#GUID-3DB25824-4417-4981-9EEC-29C0C6FD3883
Page 78
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 79
2.8 Ensure Oracle Autonomous Shared Databases (ADB) access
is restricted to allowed sources or deployed within a Virtual Cloud
Network (Manual)
Profile Applicability:
Level 1
Description:
Oracle Autonomous Database Shared (ADB-S) automates database tuning, security,
backups, updates, and other routine management tasks traditionally performed by
DBAs. ADB-S provide ingress filtering of network traffic or can be deployed within an
existing Virtual Cloud Network (VCN). It is recommended that all new ADB-S databases
be deployed within a VCN and that the Access Control Rules are restricted to your
corporate IP Addresses or VCNs for existing ADB-S databases.
Rationale:
Restricting connectivity to ADB-S Databases reduces an ADB-S database’s exposure to
risk.
Impact:
When updating ingress filters for an existing environment, care should be taken to
ensure that IP addresses and VCNs currently used by administrators, users, and
services to access your ADB-S instances are included in the updated filters.
Audit:
From Console:
6. For each ABD-S database returned click on the link under Display name
7. Click Edit next to Access Control List
8. Ensure `Access Control Rules’ IP Address/CIDR Block as well as VCNs are
correct
9. Repeat for other subscribed regions
Page 80
From CLI:
Remediation:
From Console:
From CLI:
Page 81
oci db autonomous-database update –-autonomous-database-id <ABD-S OCID> --
from-json '<network endpoints JSON>'
References:
1. https://docs.oracle.com/en/cloud/paas/autonomous-database/adbsa/network-
access-options.html#GUID-29D62917-0F18-4F3E-8081-B3BD5C0C79F5
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 82
3 Compute
This section contains recommendations for configuring compute related options
Page 83
3.1 Ensure Compute Instance Legacy Metadata service endpoint
is disabled (Automated)
Profile Applicability:
Level 2
Description:
Compute Instances that utilize Legacy MetaData service endpoints (IMDSv1) are
susceptible to potential SSRF attacks. To bolster security measures, it is strongly
advised to reconfigure Compute Instances to adopt Instance Metadata Service v2,
aligning with the industry's best security practices.
Rationale:
Enabling Instance Metadata Service v2 enhances security and grants precise control
over metadata access. Transitioning from IMDSv1 reduces the risk of SSRF attacks,
bolstering system protection.
IMDv1 poses security risks due to its inferior security measures and limited auditing
capabilities. Transitioning to IMDv2 ensures a more secure environment with robust
security features and improved monitoring capabilities.
Impact:
If you disable IMDSv1 on an instance that does not support IMDSv2, you might not be
able to connect to the instance when you launch it.
IMDSv2 is supported on the following platform images:
Other platform images, most custom images, and most Marketplace images do not
support IMDSv2. Custom Linux images might support IMDSv2 if cloud-init is updated to
version 20.3 or later and Oracle Cloud Agent is updated to version 0.0.19 or later.
Custom Windows images might support IMDSv2 if Oracle Cloud Agent is updated to
version 1.0.0.0 or later; cloudbase-init does not support IMDSv2.
Audit:
From Console:
Page 84
4. In the Instance Details section, next to Instance metadata service make
sure Version 2 only is selected.
From CLI:
1. Run command:
Remediation:
From Console:
1. On the Instance Details page in the Console, click Edit next to Instance
Metadata Service.
2. Choose the Version 1 and version 2 option, and save your changes.
From CLI:
Run Below Command,
oci compute instance update --instance-id [instance-ocid] --instance-options
'{"areLegacyImdsEndpointsDisabled" :"true"}'
This will set Instance Metadata Service to use Version 2 Only.
Page 85
Default Value:
Versions 1 and 2
References:
1. https://docs.oracle.com/en-us/iaas/Content/Compute/Tasks/gettingmetadata.htm
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 86
3.2 Ensure Secure Boot is enabled on Compute Instance
(Automated)
Profile Applicability:
Level 2
Description:
Shielded Instances with Secure Boot enabled prevents unauthorized boot loaders and
operating systems from booting. This prevent rootkits, bootkits, and unauthorized
software from running before the operating system loads. Secure Boot verifies the
digital signature of the system's boot software to check its authenticity. The digital
signature ensures the operating system has not been tampered with and is from a
trusted source. When the system boots and attempts to execute the software, it will first
check the digital signature to ensure validity. If the digital signature is not valid, the
system will not allow the software to run. Secure Boot is a feature of UEFI(Unified
Extensible Firmware Interface) that only allows approved operating systems to boot up.
Rationale:
A Threat Actor with access to the operating system may seek to alter boot components
to persist malware or rootkits during system initialization. Secure Boot helps ensure that
the system only runs authentic software by verifying the digital signature of all boot
components.
Impact:
An existing instance cannot be changed to a Shielded instance with Secure boot
enabled. Shielded Secure Boot not available on all instance shapes and Operating
systems. Additionally the following limitations exist:
Thus to enable you have to terminate the instance and create a new one. Also,
Shielded instances do not support live migration. During an infrastructure maintenance
event, Oracle Cloud Infrastructure live migrates supported VM instances from the
physical VM host that needs maintenance to a healthy VM host with minimal disruption
to running instances. If you enable Secure Boot on an instance, the instance cannot be
migrated, because the hardware TPM is not migratable. This may result in an outage
because the TPM can't be migrate from a unhealthy host to healthy host.
Audit:
From Console:
Page 87
5. Check if Secure Boot is Enabled.
From CLI:
Run command:
for region in `oci iam region-subscription list | jq -r '.data[] | ."region-
name"'`;
do
for compid in `oci iam compartment list --compartment-id-in-subtree
TRUE 2>/dev/null | jq -r '.data[] | .id'`
do
output=`oci compute instance list --compartment-id $compid --
region $region --all 2>/dev/null | jq -r '.data[] | select(."platform-config"
== null or "platform-config"."is-secure-boot-enabled" == false )'`
if [ ! -z "$output" ]; then echo $output; fi
done
done
Remediation:
Note: Secure Boot facility is available on selected VM images and Shapes in OCI. User
have to configure Secured Boot at time of instance creation only.
From Console:
1. Navigate to https://cloud.oracle.com/compute/instances
2. Select the instance from the Audit Procedure
3. Click Terminate.
4. Determine whether or not to permanently delete instance's attached boot volume.
5. Click Terminate instance.
6. Click on Create Instance.
7. Select Image and Shape which supports Shielded Instance configuration. Icon
for Shield in front of Image/Shape row indicates support of Shielded Instance.
8. Click on edit of Security Blade.
9. Turn On Shielded Instance, then Turn on the Secure Boot Toggle.
10. Fill in the rest of the details as per requirements.
11. Click Create.
Default Value:
Secure Boot is not Enabled
References:
1. https://docs.oracle.com/en-us/iaas/Content/Compute/References/shielded-
instances.htm
2. https://uefi.org/sites/default/files/resources/UEFI_Secure_Boot_in_Modern_Com
puter_Security_Solutions_2013.pdf
Page 88
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 89
3.3 Ensure In-transit Encryption is enabled on Compute Instance
(Automated)
Profile Applicability:
Level 1
Description:
The Block Volume service provides the option to enable in-transit encryption for
paravirtualized volume attachments on virtual machine (VM) instances.
Rationale:
All the data moving between the instance and the block volume is transferred over an
internal and highly secure network. If you have specific compliance requirements
related to the encryption of the data while it is moving between the instance and the
block volume, you should enable the in-transit encryption option.
Impact:
In-transit encryption for boot and block volumes is only available for virtual machine
(VM) instances launched from platform images, along with bare metal instances that
use the following shapes: BM.Standard.E3.128, BM.Standard.E4.128,
BM.DenseIO.E4.128. It is not supported on other bare metal instances.
Audit:
From Console:
1. Go to https://cloud.oracle.com/compute/instances
2. Select compute instance in your compartment.
3. Click on each instance name.
4. Click on Boot volume on the bottom left.
5. Under the In-transit encryption column make sure it is Enabled
From CLI:
Page 90
for region in `oci iam region-subscription list | jq -r '.data[] | ."region-
name"'`;
do
for compid in `oci iam compartment list --compartment-id-in-subtree
TRUE 2>/dev/null | jq -r '.data[] | .id'`
do
output=`oci compute instance list --compartment-id $compid --
region $region --all 2>/dev/null | jq -r '.data[] | select(."launch-
options"."is-pv-encryption-in-transit-enabled" == false )'`
if [ ! -z "$output" ]; then echo $output; fi
done
done
Remediation:
From Console:
1. Navigate to https://cloud.oracle.com/compute/instances
2. Select the instance from the Audit Procedure
3. Click Terminate.
4. Determine whether or not to permanently delete instance's attached boot volume.
5. Click Terminate instance.
6. Click on Create Instance.
7. Fill in the details as per requirements.
8. In the Boot volume section ensure Use in-transit encryption is checked.
9. Fill in the rest of the details as per requirements.
10. Click Create.
Default Value:
Enabled
References:
1. https://docs.oracle.com/en-
us/iaas/Content/Block/Concepts/overview.htm#BlockVolumeEncryption__intransi
t
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 91
Controls
Control IG 1 IG 2 IG 3
Version
Page 92
4 Logging and Monitoring
This section contains recommendations for configuring logging and monitoring related
options.
Page 93
4.1 Ensure default tags are used on resources (Automated)
Profile Applicability:
Level 1
Description:
Using default tags is a way to ensure all resources that support tags are tagged during
creation. Tags can be based on static or computed values. It is recommended to set up
default tags early after root compartment creation to ensure all created resources will
get tagged. Tags are scoped to Compartments and are inherited by Child
Compartments. The recommendation is to create default tags like “CreatedBy” at the
Root Compartment level to ensure all resources get tagged. When using Tags it is
important to ensure that Tag Namespaces are protected by IAM Policies otherwise this
will allow users to change tags or tag values. Depending on the age of the OCI Tenancy
there may already be Tag defaults setup at the Root Level and no need for further
action to implement this action.
Rationale:
In the case of an incident having default tags like “CreatedBy” applied will provide info
on who created the resource without having to search the Audit logs.
Impact:
There is no performance impact when enabling the above described features.
Audit:
From Console:
Note:
The name of the tag may be different then “CreatedBy” if the Tenancy Administrator has
decided to use another tag.
From CLI:
1. List the active tag defaults defined at the Root compartment level by using the
Tenancy OCID as compartment id.
Page 94
Note: The Tenancy OCID can be found in the ~/.oci/config file used by the
OCI Command Line Tool
2. Verify in the table returned that there is at least one row that contains the value of
${iam.principal.name}.
Remediation:
From Console:
From CLI:
2. Note the Tag Namespace OCID and use it when creating the Tag Key Definition
Page 95
3. Note the Tag Key Definition OCID and use it when creating the Tag Default in the
Root compartment
Default Value:
New OCI Tenancies will have Tag Defaults setup for CreatedBy and CreatedOn as
default. If this is the case then there is no remediate action required in the Tenancy in
order to meet this specific control.
Additional Information:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 96
4.2 Create at least one notification topic and subscription to
receive monitoring alerts (Automated)
Profile Applicability:
Level 1
Description:
Notifications provide a multi-channel messaging service that allow users and
applications to be notified of events of interest occurring within OCI. Messages can be
sent via eMail, HTTPs, PagerDuty, Slack or the OCI Function service. Some channels,
such as eMail require confirmation of the subscription before it becomes active.
Rationale:
Creating one or more notification topics allow administrators to be notified of relevant
changes made to OCI infrastructure.
Impact:
There is no performance impact when enabling the above described features but
depending on the amount of notifications sent per month there may be a cost
associated.
Audit:
From Console:
From CLI:
2. Note the OCID of the monitoring topic(s) using the topic-id field of the returned
JSON and use it to list the subscriptions
Page 97
3. Ensure at least one active subscription is returned
Remediation:
From Console:
From CLI:
oci ons topic create --name <topic name> --description <topic description> --
compartment-id <compartment OCID>
2. Note the OCID of the topic using the topic-id field of the returned JSON and
use it to create a new subscription
Additional Information:
The console URL shown is for the Ashburn region. Your tenancy might have a
different home region and thus console URL.
The same Notification topic can be reused by many Events. A single topic can
have multiple subscriptions allowing the same topic to be published to multiple
locations.
The generated notification will include an eventID that can be used when
querying the Audit Logs in case further investigation is required.
Page 98
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 99
4.3 Ensure a notification is configured for Identity Provider
changes (Automated)
Profile Applicability:
Level 1
Description:
It is recommended to setup an Event Rule and Notification that gets triggered when
Identity Providers are created, updated or deleted. Event Rules are compartment
scoped and will detect events in child compartments. It is recommended to create the
Event rule at the root compartment level.
Rationale:
OCI Identity Providers allow management of User ID / passwords in external systems
and use of those credentials to access OCI resources. Identity Providers allow users to
single sign-on to OCI console and have other OCI credentials like API Keys. Monitoring
and alerting on changes to Identity Providers will help in identifying changes to the
security posture.
Impact:
There is no performance impact when enabling the above described features but
depending on the amount of notifications sent per month there may be a cost
associated.
Audit:
From Console:
From CLI:
1. Find the OCID of the specific Event Rule based on Display Name and
Compartment OCID
Page 100
oci events rule list --compartment-id <compartment-ocid> --query "data
[?\"display-name\"=='<display-name>']".{"id:id"} --output table
2. List the details of a specific Event Rule based on the OCID of the rule.
3. In the JSON output locate the Conditions key value pair and verify that the
following Conditions are present:
com.oraclecloud.identitycontrolplane.createidentityprovider
com.oraclecloud.identitycontrolplane.deleteidentityprovider
com.oraclecloud.identitycontrolplane.updateidentityprovider
Remediation:
From Console:
From CLI:
1. Find the topic-id of the topic the Event Rule should use for sending
notifications by using the topic name and Compartment OCID
Page 101
2. Create a JSON file to be used when creating the Event Rule. Replace topic id,
display name, description and compartment OCID.
{
"actions":
{
"actions": [
{
"actionType": "ONS",
"isEnabled": true,
"topicId": "<topic-id>"
}]
},
"condition":
"{\"eventType\":[\"com.oraclecloud.identitycontrolplane.createidentityprovide
r\",\" com.oraclecloud.identitycontrolplane.deleteidentityprovider\",\"
com.oraclecloud.identitycontrolplane.updateidentityprovider\"],\"data\":{}}",
"displayName": "<display-name>",
"description": "<description>",
"isEnabled": true,
"compartmentId": "<compartment-ocid>"
}
4. Note in the JSON returned that it lists the parameters specified in the JSON file
provided and that there is an OCID provided for the Event Rule
Additional Information:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 102
Controls
Control IG 1 IG 2 IG 3
Version
Page 103
4.4 Ensure a notification is configured for IdP group mapping
changes (Automated)
Profile Applicability:
Level 1
Description:
It is recommended to setup an Event Rule and Notification that gets triggered when
Identity Provider Group Mappings are created, updated or deleted. Event Rules are
compartment scoped and will detect events in child compartments. It is recommended
to create the Event rule at the root compartment level.
Rationale:
IAM Policies govern access to all resources within an OCI Tenancy. IAM Policies use
OCI Groups for assigning the privileges. Identity Provider Groups could be mapped to
OCI Groups to assign privileges to federated users in OCI. Monitoring and alerting on
changes to Identity Provider Group mappings will help in identifying changes to the
security posture.
Impact:
There is no performance impact when enabling the above described features but
depending on the amount of notifications sent per month there may be a cost
associated.
Audit:
From Console:
From CLI:
1. Find the OCID of the specific Event Rule based on Display Name and
Compartment OCID
Page 104
oci events rule list --compartment-id <compartment-ocid> --query "data
[?\"display-name\"=='<displa-name>']".{"id:id"} --output table
2. List the details of a specific Event Rule based on the OCID of the rule.
3. In the JSON output locate the Conditions key value pair and verify that the
following Conditions are present:
com.oraclecloud.identitycontrolplane.createidpgroupmapping
com.oraclecloud.identitycontrolplane.deleteidpgroupmapping
com.oraclecloud.identitycontrolplane.updateidpgroupmapping
Remediation:
From Console:
From CLI:
1. Find the topic-id of the topic the Event Rule should use for sending
notifications by using the topic name and Compartment OCID
Page 105
2. Create a JSON file to be used when creating the Event Rule. Replace topic id,
display name, description and compartment OCID.
{
"actions":
{
"actions": [
{
"actionType": "ONS",
"isEnabled": true,
"topicId": "<topic-id>"
}]
},
"condition":
"{\"eventType\":[\"com.oraclecloud.identitycontrolplane.createidpgroupmapping
\",\"com.oraclecloud.identitycontrolplane.deleteidpgroupmapping\",\"com.oracl
ecloud.identitycontrolplane.updateidpgroupmapping\"],\"data\":{}}",
"displayName": "<display-name>",
"description": "<description>",
"isEnabled": true,
"compartmentId": "<compartment-ocid>"
}
4. Note in the JSON returned that it lists the parameters specified in the JSON file
provided and that there is an OCID provided for the Event Rule
Additional Information:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 106
4.5 Ensure a notification is configured for IAM group changes
(Automated)
Profile Applicability:
Level 1
Description:
It is recommended to setup an Event Rule and Notification that gets triggered when IAM
Groups are created, updated or deleted. Event Rules are compartment scoped and will
detect events in child compartments, it is recommended to create the Event rule at the
root compartment level.
Rationale:
IAM Groups control access to all resources within an OCI Tenancy. Monitoring and
alerting on changes to IAM Groups will help in identifying changes to satisfy least
privilege principle.
Impact:
There is no performance impact when enabling the above described features but
depending on the amount of notifications sent per month there may be a cost
associated.
Audit:
From Console:
From CLI:
1. Find the OCID of the specific Event Rule based on Display Name and
Compartment OCID
Page 107
2. List the details of a specific Event Rule based on the OCID of the rule.
3. In the JSON output locate the Conditions key value pair and verify that the
following Conditions are present:
com.oraclecloud.identitycontrolplane.creategroup
com.oraclecloud.identitycontrolplane.deletegroup
com.oraclecloud.identitycontrolplane.updategroup
Remediation:
From Console:
From CLI:
1. Find the topic-id of the topic the Event Rule should use for sending
Notifications by using the topic name and Compartment OCID
2. Create a JSON file to be used when creating the Event Rule. Replace topic id,
display name, description and compartment OCID.
Page 108
{
"actions":
{
"actions": [
{
"actionType": "ONS",
"isEnabled": true,
"topicId": "<topic-id>"
}]
},
"condition":
"{\"eventType\":[\"com.oraclecloud.identitycontrolplane.creategroup\",\"com.o
raclecloud.identitycontrolplane.deletegroup\",\"com.oraclecloud.identitycontr
olplane.updategroup\"],\"data\":{}}",
"displayName": "<display-name>",
"description": "<description>",
"isEnabled": true,
"compartmentId": "<compartment-ocid>"
}
4. Note in the JSON returned that it lists the parameters specified in the JSON file
provided and that there is an OCID provided for the Event Rule
Additional Information:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 109
4.6 Ensure a notification is configured for IAM policy changes
(Automated)
Profile Applicability:
Level 1
Description:
It is recommended to setup an Event Rule and Notification that gets triggered when IAM
Policies are created, updated or deleted. Event Rules are compartment scoped and will
detect events in child compartments, it is recommended to create the Event rule at the
root compartment level.
Rationale:
IAM Policies govern access to all resources within an OCI Tenancy. Monitoring and
alerting on changes to IAM policies will help in identifying changes to the security
posture.
Impact:
There is no performance impact when enabling the above described features but
depending on the amount of notifications sent per month there may be a cost
associated.
Audit:
From Console:
From CLI:
1. Find the OCID of the specific Event Rule based on Display Name and
Compartment OCID
Page 110
2. List the details of a specific Event Rule based on the OCID of the rule.
3. In the JSON output locate the Conditions key value pair and verify that the
following Conditions are present:
com.oraclecloud.identitycontrolplane.createpolicy
com.oraclecloud.identitycontrolplane.deletepolicy
com.oraclecloud.identitycontrolplane.updatepolicy
Remediation:
From Console:
From CLI:
1. Find the topic-id of the topic the Event Rule should use for sending
Notifications by using the topic name and Compartment OCID
2. Create a JSON file to be used when creating the Event Rule. Replace topic id,
display name, description and compartment OCID.
Page 111
{
"actions":
{
"actions": [
{
"actionType": "ONS",
"isEnabled": true,
"topicId": "<topic-id>"
}]
},
"condition":
"{\"eventType\":[\"com.oraclecloud.identitycontrolplane.createpolicy\",\"com.
oraclecloud.identitycontrolplane.deletepolicy\",\"com.oraclecloud.identitycon
trolplane.updatepolicy\"],\"data\":{}}",
"displayName": "<display-name>",
"description": "<description>",
"isEnabled": true,
"compartmentId": "<compartment-ocid>"
}
4. Note in the JSON returned that it lists the parameters specified in the JSON file
provided and that there is an OCID provided for the Event Rule
Additional Information:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 112
4.7 Ensure a notification is configured for user changes
(Automated)
Profile Applicability:
Level 1
Description:
It is recommended to setup an Event Rule and Notification that gets triggered when IAM
Users are created, updated, deleted, capabilities updated, or state updated. Event
Rules are compartment scoped and will detect events in child compartments, it is
recommended to create the Event rule at the root compartment level.
Rationale:
Users use or manage Oracle Cloud Infrastructure resources. Monitoring and alerting on
changes to Users will help in identifying changes to the security posture.
Impact:
There is no performance impact when enabling the above described features but
depending on the amount of notifications sent per month there may be a cost
associated.
Audit:
From Console:
From CLI:
1. Find the OCID of the specific Event Rule based on Display Name and
Compartment OCID
Page 113
oci events rule list --compartment-id <compartment-ocid> --query "data
[?\"display-name\"=='<display-name>']".{"id:id"} --output table
2. List the details of a specific Event Rule based on the OCID of the rule.
3. In the JSON output locate the Conditions key value pair and verify that the
following Conditions are present:
com.oraclecloud.identitycontrolplane.createuser
com.oraclecloud.identitycontrolplane.deleteuser
com.oraclecloud.identitycontrolplane.updateuser
com.oraclecloud.identitycontrolplane.updateusercapabilities
com.oraclecloud.identitycontrolplane.updateuserstate
Remediation:
From Console:
Page 114
From CLI:
1. Find the topic-id of the topic the Event Rule should use for sending
Notifications by using the topic name and Compartment OCID
2. Create a JSON file to be used when creating the Event Rule. Replace topic id,
display name, description and compartment OCID.
{
"actions":
{
"actions": [
{
"actionType": "ONS",
"isEnabled": true,
"topicId": "<topic-id>"
}]
},
"condition":
"{\"eventType\":[\"com.oraclecloud.identitycontrolplane.createuser\",\"com.or
aclecloud.identitycontrolplane.deleteuser\",\"com.oraclecloud.identitycontrol
plane.updateuser\",\"com.oraclecloud.identitycontrolplane.updateusercapabilit
ies\",\"com.oraclecloud.identitycontrolplane.updateuserstate\"],\"data\":{}}"
,
"displayName": "<display-name>",
"description": "<description>",
"isEnabled": true,
"compartmentId": "<compartment-ocid>"
}
4. Note in the JSON returned that it lists the parameters specified in the JSON file
provided and that there is an OCID provided for the Event Rule
Additional Information:
Page 115
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 116
4.8 Ensure a notification is configured for VCN changes
(Automated)
Profile Applicability:
Level 1
Description:
It is recommended to setup an Event Rule and Notification that gets triggered when
Virtual Cloud Networks are created, updated or deleted. Event Rules are compartment
scoped and will detect events in child compartments, it is recommended to create the
Event rule at the root compartment level.
Rationale:
Virtual Cloud Networks (VCNs) closely resembles a traditional network. Monitoring and
alerting on changes to VCNs will help in identifying changes to the security posture.
Impact:
There is no performance impact when enabling the above described features but
depending on the amount of notifications sent per month there may be a cost
associated.
Audit:
From Console:
From CLI:
1. Find the OCID of the specific Event Rule based on Display Name and
Compartment OCID
Page 117
2. List the details of a specific Event Rule based on the OCID of the rule.
3. In the JSON output locate the Conditions key value pair and verify that the
following Conditions are present:
com.oraclecloud.virtualnetwork.createvcn
com.oraclecloud.virtualnetwork.deletevcn
com.oraclecloud.virtualnetwork.updatevcn
Remediation:
From Console:
From CLI:
1. Find the topic-id of the topic the Event Rule should use for sending
Notifications by using the topic name and Compartment OCID
2. Create a JSON file to be used when creating the Event Rule. Replace topic id,
display name, description and compartment OCID.
Page 118
{
"actions":
{
"actions": [
{
"actionType": "ONS",
"isEnabled": true,
"topicId": "<topic-id>"
}]
},
"condition":
"{\"eventType\":[\"com.oraclecloud.virtualnetwork.createvcn\",\"com.oracleclo
ud.virtualnetwork.deletevcn\",\"com.oraclecloud.virtualnetwork.updatevcn\"],\
"data\":{}}",
"displayName": "<display-name>",
"description": "<description>",
"isEnabled": true,
"compartmentId": "<compartment-ocid>"
}
4. Note in the JSON returned that it lists the parameters specified in the JSON file
provided and that there is an OCID provided for the Event Rule
Additional Information:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 119
4.9 Ensure a notification is configured for changes to route tables
(Automated)
Profile Applicability:
Level 1
Description:
It is recommended to setup an Event Rule and Notification that gets triggered when
route tables are created, updated or deleted. Event Rules are compartment scoped and
will detect events in child compartments, it is recommended to create the Event rule at
the root compartment level.
Rationale:
Route tables control traffic flowing to or from Virtual Cloud Networks and Subnets.
Monitoring and alerting on changes to route tables will help in identifying changes these
traffic flows.
Impact:
There is no performance impact when enabling the above described features but
depending on the amount of notifications sent per month there may be a cost
associated.
Audit:
From Console:
From CLI:
1. Find the OCID of the specific Event Rule based on Display Name and
Compartment OCID
Page 120
oci events rule list --compartment-id <compartment-ocid> --query "data
[?\"display-name\"=='<display-name>']".{"id:id"} --output table
2. List the details of a specific Event Rule based on the OCID of the rule.
3. In the JSON output locate the Conditions key value pair and verify that the
following Conditions are present:
com.oraclecloud.virtualnetwork.changeroutetablecompartment
com.oraclecloud.virtualnetwork.createroutetable
com.oraclecloud.virtualnetwork.deleteroutetable
com.oraclecloud.virtualnetwork.updateroutetable
Remediation:
From Console:
From CLI:
1. Find the topic-id of the topic the Event Rule should use for sending
Notifications by using the topic name and Compartment OCID
Page 121
2. Create a JSON file to be used when creating the Event Rule. Replace topic id,
display name, description and compartment OCID.
{
"actions":
{
"actions": [
{
"actionType": "ONS",
"isEnabled": true,
"topicId": "<topic-id>"
}]
},
"condition":
"{\"eventType\":[\"com.oraclecloud.virtualnetwork.changeroutetablecompartment
\",\"com.oraclecloud.virtualnetwork.createroutetable\",\"com.oraclecloud.virt
ualnetwork.deleteroutetable\",\"com.oraclecloud.virtualnetwork.updateroutetab
le\"],\"data\":{}}",
"displayName": "<display-name>",
"description": "<description>",
"isEnabled": true,
"compartmentId": "<compartment-ocid>"
}
4. Note in the JSON returned that it lists the parameters specified in the JSON file
provided and that there is an OCID provided for the Event Rule
Additional Information:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 122
Controls
Control IG 1 IG 2 IG 3
Version
Page 123
4.10 Ensure a notification is configured for security list changes
(Automated)
Profile Applicability:
Level 1
Description:
It is recommended to setup an Event Rule and Notification that gets triggered when
security lists are created, updated or deleted. Event Rules are compartment scoped and
will detect events in child compartments, it is recommended to create the Event rule at
the root compartment level.
Rationale:
Security Lists control traffic flowing into and out of Subnets within a Virtual Cloud
Network. Monitoring and alerting on changes to Security Lists will help in identifying
changes to these security controls.
Impact:
There is no performance impact when enabling the above described features but
depending on the amount of notifications sent per month there may be a cost
associated.
Audit:
From Console:
From CLI:
1. Find the OCID of the specific Event Rule based on Display Name and
Compartment OCID
Page 124
oci events rule list --compartment-id <compartment-ocid> --query "data
[?\"display-name\"=='<display-name>']".{"id:id"} --output table
2. List the details of a specific Event Rule based on the OCID of the rule.
3. In the JSON output locate the Conditions key value pair and verify that the
following Conditions are present:
com.oraclecloud.virtualnetwork.changesecuritylistcompartment
com.oraclecloud.virtualnetwork.createsecuritylist
com.oraclecloud.virtualnetwork.deletesecuritylist
com.oraclecloud.virtualnetwork.updatesecuritylist
Remediation:
From Console:
From CLI:
1. Find the topic-id of the topic the Event Rule should use for sending
Notifications by using the topic name and Compartment OCID
Page 125
2. Create a JSON file to be used when creating the Event Rule. Replace topic-id,
display name, description and compartment OCID.
{
"actions":
{
"actions": [
{
"actionType": "ONS",
"isEnabled": true,
"topicId": "<topic-id>"
}]
},
"condition":
"{\"eventType\":[\"com.oraclecloud.virtualnetwork.changesecuritylistcompartme
nt\",\"com.oraclecloud.virtualnetwork.createsecuritylist\",\"com.oraclecloud.
virtualnetwork.deletesecuritylist\",\"com.oraclecloud.virtualnetwork.updatese
curitylist\"],\"data\":{}}",
"displayName": "<display-name>",
"description": "<description>",
"isEnabled": true,
"compartmentId": "<compartment-ocid>"
}
4. Note in the JSON returned that it lists the parameters specified in the JSON file
provided and that there is an OCID provided for the Event Rule
Additional Information:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 126
Controls
Control IG 1 IG 2 IG 3
Version
Page 127
4.11 Ensure a notification is configured for network security group
changes (Automated)
Profile Applicability:
Level 1
Description:
It is recommended to setup an Event Rule and Notification that gets triggered when
network security groups are created, updated or deleted. Event Rules are compartment
scoped and will detect events in child compartments, it is recommended to create the
Event rule at the root compartment level.
Rationale:
Network Security Groups control traffic flowing between Virtual Network Cards attached
to Compute instances. Monitoring and alerting on changes to Network Security Groups
will help in identifying changes these security controls.
Impact:
There is no performance impact when enabling the above described features but
depending on the amount of notifications sent per month there may be a cost
associated.
Audit:
From Console:
From CLI:
1. Find the OCID of the specific Event Rule based on Display Name and
Compartment OCID
Page 128
oci events rule list --compartment-id <compartment-ocid> --query "data
[?\"display-name\"=='<display name used>']".{"id:id"} --output table
2. List the details of a specific Event Rule based on the OCID of the rule.
3. In the JSON output locate the Conditions key value pair and verify that the
following conditions are present:
com.oraclecloud.virtualnetwork.changenetworksecuritygroupcompartment
com.oraclecloud.virtualnetwork.createnetworksecuritygroup
com.oraclecloud.virtualnetwork.deletenetworksecuritygroup
com.oraclecloud.virtualnetwork.updatenetworksecuritygroup
Remediation:
From Console:
From CLI:
1. Find the topic-id of the topic the Event Rule should use for sending
Notifications by using the topic name and Compartment OCID
Page 129
oci ons topic list --compartment-id <compartment-ocid> --all --query "data
[?name=='<topic-name>']".{"name:name,topic_id:\"topic-id\""} --output table
2. Create a JSON file to be used when creating the Event Rule. Replace topic id,
display name, description and compartment OCID.
{
"actions": {
"actions": [
{
"actionType": "ONS",
"isEnabled": true,
"topicId": "<topic-id>"
}
]
},
"condition":
"{\"eventType\":[\"com.oraclecloud.virtualnetwork.changenetworksecuritygroupc
ompartment\",\"com.oraclecloud.virtualnetwork.createnetworksecuritygroup\",\"
com.oraclecloud.virtualnetwork.deletenetworksecuritygroup\",\"com.oraclecloud
.virtualnetwork.updatenetworksecuritygroup\"],\"data\":{}}",
"displayName": "<display-name>",
"description": "<description>",
"isEnabled": true,
"compartmentId": "<compartment-ocid>"
}
4. Note in the JSON returned that it lists the parameters specified in the JSON file
provided and that there is an OCID provided for the Event Rule
Additional Information:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 130
Controls
Control IG 1 IG 2 IG 3
Version
Page 131
4.12 Ensure a notification is configured for changes to network
gateways (Automated)
Profile Applicability:
Level 1
Description:
It is recommended to setup an Event Rule and Notification that gets triggered when
Network Gateways are created, updated, deleted, attached, detached, or moved. This
recommendation includes Internet Gateways, Dynamic Routing Gateways, Service
Gateways, Local Peering Gateways, and NAT Gateways. Event Rules are compartment
scoped and will detect events in child compartments, it is recommended to create the
Event rule at the root compartment level.
Rationale:
Network Gateways act as routers between VCNs and the Internet, Oracle Services
Networks, other VCNS, and on-premise networks. Monitoring and alerting on changes
to Network Gateways will help in identifying changes to the security posture.
Impact:
There is no performance impact when enabling the above described features but
depending on the amount of notifications sent per month there may be a cost
associated.
Audit:
From Console:
Page 132
DRG – Create
DRG – Delete
DRG – Update
DRG Attachment – Create
DRG Attachment – Delete
DRG Attachment – Update
Internet Gateway – Create
Internet Gateway – Delete
Internet Gateway – Update
Internet Gateway – Change Compartment
Local Peering Gateway – Create
Local Peering Gateway – Delete End
Local Peering Gateway – Update
Local Peering Gateway – Change Compartment
NAT Gateway – Create
NAT Gateway – Delete
NAT Gateway – Update
NAT Gateway – Change Compartment
Service Gateway – Create
Service Gateway – Delete End
Service Gateway – Update
Service Gateway – Attach Service
Service Gateway – Detach Service
Service Gateway – Change Compartment
5. Verify that in the Actions section the Action Type contains: Notifications and
that a valid Topic is referenced.
From CLI:
1. Find the OCID of the specific Event Rule based on Display Name and
Compartment OCID
2. List the details of a specific Event Rule based on the OCID of the rule.
3. In the JSON output locate the Conditions key value pair and verify that the
following Conditions are present:
Page 133
com.oraclecloud.virtualnetwork.createdrg
com.oraclecloud.virtualnetwork.deletedrg
com.oraclecloud.virtualnetwork.updatedrg
com.oraclecloud.virtualnetwork.createdrgattachment
com.oraclecloud.virtualnetwork.deletedrgattachment
com.oraclecloud.virtualnetwork.updatedrgattachment
com.oraclecloud.virtualnetwork.changeinternetgatewaycompartment
com.oraclecloud.virtualnetwork.createinternetgateway
com.oraclecloud.virtualnetwork.deleteinternetgateway
com.oraclecloud.virtualnetwork.updateinternetgateway
com.oraclecloud.virtualnetwork.changelocalpeeringgatewaycompartment
com.oraclecloud.virtualnetwork.createlocalpeeringgateway
com.oraclecloud.virtualnetwork.deletelocalpeeringgateway.end
com.oraclecloud.virtualnetwork.updatelocalpeeringgateway
com.oraclecloud.natgateway.changenatgatewaycompartment
com.oraclecloud.natgateway.createnatgateway
com.oraclecloud.natgateway.deletenatgateway
com.oraclecloud.natgateway.updatenatgateway
com.oraclecloud.servicegateway.attachserviceid
com.oraclecloud.servicegateway.changeservicegatewaycompartment
com.oraclecloud.servicegateway.createservicegateway
com.oraclecloud.servicegateway.deleteservicegateway.end
com.oraclecloud.servicegateway.detachserviceid
com.oraclecloud.servicegateway.updateservicegateway
Remediation:
From Console:
Page 134
DRG – Create
DRG – Delete
DRG – Update
DRG Attachment – Create
DRG Attachment – Delete
DRG Attachment – Update
Internet Gateway – Create
Internet Gateway – Delete
Internet Gateway – Update
Internet Gateway – Change Compartment
Local Peering Gateway – Create
Local Peering Gateway – Delete End
Local Peering Gateway – Update
Local Peering Gateway – Change Compartment
NAT Gateway – Create
NAT Gateway – Delete
NAT Gateway – Update
NAT Gateway – Change Compartment
Service Gateway – Create
Service Gateway – Delete End
Service Gateway – Update
Service Gateway – Attach Service
Service Gateway – Detach Service
Service Gateway – Change Compartment
From CLI:
1. Find the topic-id of the topic the Event Rule should use for sending
Notifications by using the topic name and Compartment OCID
2. Create a JSON file to be used when creating the Event Rule. Replace topic id,
display name, description and compartment OCID.
Page 135
{
"actions": {
"actions": [
{
"actionType": "ONS",
"isEnabled": true,
"topicId": "<topic-id>"
}
]
},
"condition":
"{\"eventType\":[\"com.oraclecloud.virtualnetwork.createdrg\",\"com.oracleclo
ud.virtualnetwork.deletedrg\",\"com.oraclecloud.virtualnetwork.updatedrg\",\"
com.oraclecloud.virtualnetwork.createdrgattachment\",\"com.oraclecloud.virtua
lnetwork.deletedrgattachment\",\"com.oraclecloud.virtualnetwork.updatedrgatta
chment\",\"com.oraclecloud.virtualnetwork.changeinternetgatewaycompartment\",
\"com.oraclecloud.virtualnetwork.createinternetgateway\",\"com.oraclecloud.vi
rtualnetwork.deleteinternetgateway\",\"com.oraclecloud.virtualnetwork.updatei
nternetgateway\",\"com.oraclecloud.virtualnetwork.changelocalpeeringgatewayco
mpartment\",\"com.oraclecloud.virtualnetwork.createlocalpeeringgateway\",\"co
m.oraclecloud.virtualnetwork.deletelocalpeeringgateway.end\",\"com.oracleclou
d.virtualnetwork.updatelocalpeeringgateway\",\"com.oraclecloud.natgateway.cha
ngenatgatewaycompartment\",\"com.oraclecloud.natgateway.createnatgateway\",\"
com.oraclecloud.natgateway.deletenatgateway\",\"com.oraclecloud.natgateway.up
datenatgateway\",\"com.oraclecloud.servicegateway.attachserviceid\",\"com.ora
clecloud.servicegateway.changeservicegatewaycompartment\",\"com.oraclecloud.s
ervicegateway.createservicegateway\",\"com.oraclecloud.servicegateway.deletes
ervicegateway.end\",\"com.oraclecloud.servicegateway.detachserviceid\",\"com.
oraclecloud.servicegateway.updateservicegateway\"],\"data\":{}}",
"displayName": "<display-name>",
"description": "<description>",
"isEnabled": true,
"compartmentId": "<compartment-ocid>"
}
4. Note in the JSON returned that it lists the parameters specified in the JSON file
provided and that there is an OCID provided for the Event Rule
Additional Information:
Page 136
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 137
4.13 Ensure VCN flow logging is enabled for all subnets
(Automated)
Profile Applicability:
Level 2
Description:
VCN flow logs record details about traffic that has been accepted or rejected based on
the security list rule.
Rationale:
Enabling VCN flow logs enables you to monitor traffic flowing within your virtual network
and can be used to detect anomalous traffic.
Impact:
Enabling VCN flow logs will not affect the performance of your virtual network but it will
generate additional use of object storage that should be controlled via object lifecycle
management.
By default, VCN flow logs are stored for 30 days in object storage. Users can specify a
longer retention period.
Audit:
From Console (For Logging enabled Flow logs):
Page 138
From Console (For Network Command Center Enabled Flow logs):
Remediation:
From Console:
First, if a Capture filter has not already been created, create a Capture Filter by the
following steps:
Second, enable VCN flow logging for your VCN or subnet(s) by the following steps:
Page 139
8. Select the Capture filter from above
9. Type a name for your flow logs in the Log Name text box.
10. Select the Compartment for the Log Location
11. Select the Log Group for the Log Location or Click Create New Group to create
a new log group
12. Click the Enable Log button in the lower left-hand corner.
References:
1. https://docs.oracle.com/en/solutions/oci-aggregate-logs-siem/index.html#GUID-
601E052A-8A8E-466B-A8A8-2BBBD3B80B6D
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 140
4.14 Ensure Cloud Guard is enabled in the root compartment of
the tenancy (Automated)
Profile Applicability:
Level 1
Description:
Cloud Guard detects misconfigured resources and insecure activity within a tenancy
and provides security administrators with the visibility to resolve these issues. Upon
detection, Cloud Guard can suggest, assist, or take corrective actions to mitigate these
issues. Cloud Guard should be enabled in the root compartment of your tenancy with
the default configuration, activity detectors and responders.
Rationale:
Cloud Guard provides an automated means to monitor a tenancy for resources that are
configured in an insecure manner as well as risky network activity from these resources.
Impact:
There is no performance impact when enabling the above described features, but
additional IAM policies will be required.
Audit:
From Console:
1. Type Cloud Guard into the Search box at the top of the Console.
2. Click Cloud Guard from the "Services" submenu.
3. View if Cloud Guard is enabled
From CLI:
Remediation:
From Console:
1. Type Cloud Guard into the Search box at the top of the Console.
2. Click Cloud Guard from the "Services" submenu.
Page 141
3. Click Enable Cloud Guard.
4. Click Create Policy.
5. Click Next.
6. Under Reporting Region, select a region.
7. Under Compartments To Monitor, choose Select Compartment.
8. Under Select Compartments, select the root compartment.
9. Under Configuration Detector Recipe, select OCI Configuration
Detector Recipe (Oracle Managed).
10. Under Activity Detector Recipe, select OCI Activity Detector Recipe
(Oracle Managed).
11. Click Enable.
From CLI:
References:
1. https://docs.oracle.com/en-us/iaas/Content/General/Concepts/regions.htm
Page 142
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 143
4.15 Ensure a notification is configured for Oracle Cloud Guard
problems detected (Automated)
Profile Applicability:
Level 1
Description:
Cloud Guard detects misconfigured resources and insecure activity within a tenancy
and provides security administrators with the visibility to resolve these issues. Upon
detection, Cloud Guard generates a Problem. It is recommended to setup an Event
Rule and Notification that gets triggered when Oracle Cloud Guard Problems are
created, dismissed or remediated. Event Rules are compartment scoped and will detect
events in child compartments. It is recommended to create the Event rule at the root
compartment level.
Rationale:
Cloud Guard provides an automated means to monitor a tenancy for resources that are
configured in an insecure manner as well as risky network activity from these resources.
Monitoring and alerting on Problems detected by Cloud Guard will help in identifying
changes to the security posture.
Impact:
There is no performance impact when enabling the above described features but
depending on the amount of notifications sent per month there may be a cost
associated.
Audit:
From Console:
From CLI:
1. Find the OCID of the specific Event Rule based on Display Name and
Compartment OCID
Page 144
oci events rule list --compartment-id=<compartment OCID> --query "data
[?\"display-name\"=='<display name used>']".{"id:id"} --output table
1. List the details of a specific Event Rule based on the OCID of the rule.
2. In the JSON output locate the Conditions key-value pair and verify that the
following Conditions are present:
"com.oraclecloud.cloudguard.problemdetected","com.oraclecloud.cloudguard.prob
lemdismissed","com.oraclecloud.cloudguard.problemremediated"
Remediation:
From Console:
From CLI:
1. Find the topic-id of the topic the Event Rule should use for sending Notifications
by using the topic name and Compartment OCID
2. Create a JSON file to be used when creating the Event Rule. Replace topic id,
display name, description and compartment OCID.
Page 145
{
"actions":
{
"actions": [
{
"actionType": "ONS",
"isEnabled": true,
"topicId": "<topic id>"
}]
},
"condition":
"{\"eventType\":[\" com.oraclecloud.cloudguard.problemdetected\",\"
com.oraclecloud.cloudguard.problemdismissed\",\"
com.oraclecloud.cloudguard.problemremediated\"],\"data\":{}}",
"displayName": "<display name>",
"description": "<description>",
"isEnabled": true,
"compartmentId": "compartment OCID"
}
4. Note in the JSON returned that it lists the parameters specified in the JSON file
provided and that there is an OCID provided for the Event Rule
References:
1. https://docs.oracle.com/en-us/iaas/cloud-guard/using/export-notifs-config.htm
Additional Information:
Your tenancy might have a different Cloud Reporting region than your home
region.
The same Notification topic can be reused by many Event Rules.
The generated notification will include an eventID that can be used when
querying the Audit Logs in case further investigation is required.
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 146
Controls
Control IG 1 IG 2 IG 3
Version
Page 147
4.16 Ensure customer created Customer Managed Key (CMK) is
rotated at least annually (Automated)
Profile Applicability:
Level 1
Description:
Oracle Cloud Infrastructure Vault securely stores master encryption keys that protect
your encrypted data. You can use the Vault service to rotate keys to generate new
cryptographic material. Periodically rotating keys limits the amount of data encrypted by
one key version.
Rationale:
Rotating keys annually limits the data encrypted under one key version. Key rotation
thereby reduces the risk in case a key is ever compromised.
Audit:
From Console:
From CLI:
2. Ensure the date of the Master Encryption key is no more than 365 days old and
is also in the ENABLED state.
Remediation:
From Console:
Page 148
2. Select Identity & Security from the Services menu.
3. Select Vault.
4. Click on the individual Vault under the Name heading.
5. Click on the menu next to the time created.
6. Click Rotate Key
From CLI:
CIS Controls:
Page 149
4.17 Ensure write level Object Storage logging is enabled for all
buckets (Automated)
Profile Applicability:
Level 2
Description:
Object Storage write logs will log all write requests made to objects in a bucket.
Rationale:
Enabling an Object Storage write log, the requestAction property would contain
values of PUT, POST, or DELETE. This will provide you more visibility into changes to
objects in your buckets.
Impact:
There is no performance impact when enabling the above described features, but will
generate additional use of object storage that should be controlled via object lifecycle
management.
By default, Object Storage logs are stored for 30 days in object storage. Users can
specify a longer retention period.
Audit:
From Console:
From CLI:
Page 150
2. Find the OCID of the Log Group used for FlowLogs.
3. List the logs associated with the bucket name for this bucket
Remediation:
From Console:
First, if a log group for holding these logs has not already been created, create a log
group by the following steps:
Second, enable Object Storage write log logging for your bucket(s) by the following
steps:
From CLI:
First, if a log group for holding these logs has not already been created, create a log
group by the following steps:
Page 151
oci logging log-group create --compartment-id <compartment-id> --display-name
"<display-name>" --description "<description>"
The output of the command gives you a work request id. You can query the work
request to see the status of the job by issuing the following command:
oci logging work-request get --work-request-id <work-request-id>
Look for status filed to be SUCCEEDED.
Second, enable Object Storage write log logging for your bucket(s) by the following
steps:
{
"compartment-id":"<compartment-id>",
"source": {
"resource": "<bucket-name.",
"service": "ObjectStorage",
"source-type": "OCISERVICE",
"category": "write"
}
}
The compartment-id is the Compartment OCID of where the bucket is exists. The
resource value is the bucket name.
Page 152
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 153
4.18 Ensure a notification is configured for Local OCI User
Authentication (Automated)
Profile Applicability:
Level 1
Description:
It is recommended that an Event Rule and Notification be set up when a user in the via
OCI local authentication. Event Rules are compartment-scoped and will detect events in
child compartments. This Event rule is required to be created at the root compartment
level.
Rationale:
Users should rarely use OCI local authenticated and be authenticated via organizational
standard Identity providers, not local credentials. Access in this matter would represent
a break glass activity and should be monitored to see if changes made impact the
security posture.
Impact:
There is no performance impact when enabling the above-described features but
depending on the amount of notifications sent per month there may be a cost
associated.
Audit:
From Console:
From CLI:
1. Find the OCID of the specific Event Rule based on Display Name and Tenancy
OCID
Page 154
2. List the details of a specific Event Rule based on the OCID of the rule.
3. In the JSON output locate the Conditions key value pair and verify that the
following Conditions are present:
com.oraclecloud.identitysignon.interactivelogin
Remediation:
From Console:
From CLI:
1. Find the topic-id of the topic the Event Rule should use for sending
notifications by using the topic name and Tenancy OCID
2. Create a JSON file to be used when creating the Event Rule. Replace topic id,
display name, description and compartment OCID.
Page 155
{
"actions":
{
"actions": [
{
"actionType": "ONS",
"isEnabled": true,
"topicId": "<topic-id>"
}]
},
"condition":
"{\"eventType\":[\"com.oraclecloud.identitysignon.interactivelogin\",data\":{
}}",
"displayName": "<display-name>",
"description": "<description>",
"isEnabled": true,
"compartmentId": "<tenancy-ocid>"
}
4. Note in the JSON returned that it lists the parameters specified in the JSON file
provided and that there is an OCID provided for the Event Rule
Default Value:
Not set
References:
1. https://docs.oracle.com/en-
us/iaas/Content/Security/Reference/iam_security_topic-
IAM_Federation.htm#IAM_Federation
Additional Information:
Page 156
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
5 Storage
This section contains recommendations for configuring object, file and block storage.
Page 157
5.1 Object Storage
Page 158
5.1.1 Ensure no Object Storage buckets are publicly visible.
(Automated)
Profile Applicability:
Level 1
Description:
A bucket is a logical container for storing objects. It is associated with a single
compartment that has policies that determine what action a user can perform on a
bucket and on all the objects in the bucket. By Default a newly created bucket is private.
It is recommended that no bucket be publicly accessible.
Rationale:
Removing unfettered reading of objects in a bucket reduces an organization's exposure
to data loss.
Impact:
For updating an existing bucket, care should be taken to ensure objects in the bucket
can be accessed through either IAM policies or pre-authenticated requests.
Audit:
From Console:
query
bucket resources
where
(publicAccessType == 'ObjectRead') || (publicAccessType ==
'ObjectReadWithoutList')
From CLI:
Page 159
oci search resource structured-search --query-text "query
bucket resources
where
(publicAccessType == 'ObjectRead') || (publicAccessType ==
'ObjectReadWithoutList')"
Cloud Guard
To Enable Cloud Guard Auditing:
Ensure Cloud Guard is enabled in the root compartment of the tenancy. For more
information about enabling Cloud Guard, please look at the instructions included in
Recommendation 3.15.
From Console:
1. Type Cloud Guard into the Search box at the top of the Console.
2. Click Cloud Guard from the “Services” submenu.
3. Click Detector Recipes in the Cloud Guard menu.
4. Click OCI Configuration Detector Recipe (Oracle Managed) under the
Recipe Name column.
5. Find Bucket is public in the Detector Rules column.
6. Verify that the Bucket is public Detector Rule is Enabled.
From CLI:
1. Verify the Bucket is public Detector Rule in Cloud Guard is enabled to generate
Problems if Object Storage Buckets are configured to be accessible over the
public Internet with the following command:
Remediation:
From Console:
From CLI:
Page 160
oci os bucket update --bucket-name <bucket-name> --public-access-type
NoPublicAccess
Default Value:
Private
References:
1. https://docs.oracle.com/en-us/iaas/Content/Object/Tasks/managingbuckets.htm
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 161
5.1.2 Ensure Object Storage Buckets are encrypted with a
Customer Managed Key (CMK). (Automated)
Profile Applicability:
Level 2
Description:
Oracle Object Storage buckets support encryption with a Customer Managed Key
(CMK). By default, Object Storage buckets are encrypted with an Oracle managed key.
Rationale:
Encryption of Object Storage buckets with a Customer Managed Key (CMK) provides
an additional level of security on your data by allowing you to manage your own
encryption key lifecycle management for the bucket.
Impact:
Encrypting with a Customer Managed Keys requires a Vault and a Customer Master
Key. In addition, you must authorize Object Storage service to use keys on your behalf.
Required Policy:
Allow service objectstorage-<region_name>, to use keys in compartment
<compartment-id> where target.key.id = '<key_OCID>'
Audit:
From Console:
1. Go to https://cloud.oracle.com/object-storage/buckets
From CLI:
Page 162
Cloud Guard
To Enable Cloud Guard Auditing:
Ensure Cloud Guard is enabled in the root compartment of the tenancy. For more
information about enabling Cloud Guard, please look at the instructions included in
Recommendation 3.15.
From Console:
1. Type Cloud Guard into the Search box at the top of the Console.
2. Click Cloud Guard from the “Services” submenu.
3. Click Detector Recipes in the Cloud Guard menu.
4. Click OCI Configuration Detector Recipe (Oracle Managed) under the
Recipe Name column.
5. Find Object Storage bucket is encrypted with Oracle-managed key in the
Detector Rules column.
6. Verify that the Object Storage bucket is encrypted with Oracle-managed key
Detector Rule is Enabled.
From CLI:
1. Verify the Object Storage bucket is encrypted with Oracle-managed key Detector
Rule in Cloud Guard is enabled to generate Problems if Object Storage Buckets
are configured without a customer managed key with the following command:
Remediation:
From Console:
1. Go to https://cloud.oracle.com/object-storage/buckets
From CLI:
Page 163
oci os bucket update --bucket-name <bucket-name> --kms-key-id <master-
encryption-key-id>
Default Value:
Oracle Managed Key for Encryption
References:
1. https://docs.oracle.com/en/solutions/oci-best-practices/protect-data-
rest1.html#GUID-9C0F713E-4C67-43C6-80CA-525A6AB221F1
2. https://docs.oracle.com/en-us/iaas/Content/Object/Tasks/encryption.htm
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 164
5.1.3 Ensure Versioning is Enabled for Object Storage Buckets
(Automated)
Profile Applicability:
Level 2
Description:
A bucket is a logical container for storing objects. Object versioning is enabled at the
bucket level and is disabled by default upon creation. Versioning directs Object Storage
to automatically create an object version each time a new object is uploaded, an
existing object is overwritten, or when an object is deleted. You can enable object
versioning at bucket creation time or later.
Rationale:
Versioning object storage buckets provides for additional integrity of your data.
Management of data integrity is critical to protecting and accessing protected data.
Some customers want to identify object storage buckets without versioning in order to
apply their own data lifecycle protection and management policy.
Audit:
From Console:
From CLI:
Page 165
for region in $(oci iam region-subscription list --all | jq -r '.data[] |
."region-name"')
do
echo "Enumerating region $region"
for compid in $(oci iam compartment list --include-root --compartment-id-
in-subtree TRUE 2>/dev/null | jq -r '.data[] | .id')
do
echo "Enumerating compartment $compid"
for bkt in $(oci os bucket list --compartment-id $compid --region $region
2>/dev/null | jq -r '.data[] | .name')
do
output=$(oci os bucket get --bucket-name $bkt --region $region
2>/dev/null | jq -r '.data | select(."versioning" == "Disabled").name')
if [ ! -z "$output" ]; then echo $output; fi
done
done
done
Remediation:
From Console:
From CLI:
Default Value:
Object versioning is Disabled.
References:
1. https://docs.oracle.com/en-us/iaas/Content/Object/Tasks/usingversioning.htm
2. https://docs.oracle.com/en-
us/iaas/api/#/en/objectstorage/20160918/Bucket/GetBucket
Page 166
5.2 Block Volumes
This section contains recommendations for configuring block volume related options.
Page 167
5.2.1 Ensure Block Volumes are encrypted with Customer
Managed Keys (CMK). (Automated)
Profile Applicability:
Level 2
Description:
Oracle Cloud Infrastructure Block Volume service lets you dynamically provision and
manage block storage volumes. By default, the Oracle service manages the keys that
encrypt block volumes. Block Volumes can also be encrypted using a customer
managed key.
Terminated Block Volumes cannot be recovered and any data on a terminated volume
is permanently lost. However, Block Volumes can exist in a terminated state within the
OCI Portal and CLI for some time after deleting. As such, any Block Volumes in this
state should not be considered when assessing this policy.
Rationale:
Encryption of block volumes provides an additional level of security for your data.
Management of encryption keys is critical to protecting and accessing protected data.
Customers should identify block volumes encrypted with Oracle service managed keys
in order to determine if they want to manage the keys for certain volumes and then
apply their own key lifecycle management to the selected block volumes.
Impact:
Encrypting with a Customer Managed Key requires a Vault and a Customer Master Key.
In addition, you must authorize the Block Volume service to use the keys you create.
Required IAM Policy:
Allow service blockstorage to use keys in compartment <compartment-id> where
target.key.id = '<key_OCID>'
Audit:
From Console:
6. For each block volume returned, click the link under Display name.
Page 168
7. Ensure the value for Encryption Key is not Oracle-managed key.
8. Repeat for other subscribed regions.
From CLI:
Remediation:
From Console:
From CLI:
Page 169
References:
1. https://docs.oracle.com/en/solutions/oci-best-practices/protect-data-
rest1.html#GUID-BA1F5A20-8C78-49E3-8183-927F0CC6F6CC
2. https://docs.oracle.com/en-us/iaas/Content/Block/Concepts/overview.htm
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 170
5.2.2 Ensure boot volumes are encrypted with Customer
Managed Key (CMK). (Automated)
Profile Applicability:
Level 2
Description:
When you launch a virtual machine (VM) or bare metal instance based on a platform
image or custom image, a new boot volume for the instance is created in the same
compartment. That boot volume is associated with that instance until you terminate the
instance. By default, the Oracle service manages the keys that encrypt this boot
volume. Boot Volumes can also be encrypted using a customer managed key.
Rationale:
Encryption of boot volumes provides an additional level of security for your data.
Management of encryption keys is critical to protecting and accessing protected data.
Customers should identify boot volumes encrypted with Oracle service managed keys in
order to determine if they want to manage the keys for certain boot volumes and then
apply their own key lifecycle management to the selected boot volumes.
Impact:
Encrypting with a Customer Managed Keys requires a Vault and a Customer Master
Key. In addition, you must authorize the Boot Volume service to use the keys you
create. Required IAM Policy:
Allow service Bootstorage to use keys in compartment <compartment-id> where
target.key.id = '<key_OCID>'
Audit:
From Console:
6. For each boot volume returned click on the link under Display name
7. Ensure Encryption Key does not say Oracle managed key
8. Repeat for other subscribed regions
Page 171
From CLI:
Remediation:
From Console:
From CLI:
References:
1. https://docs.oracle.com/en/solutions/oci-best-practices/protect-data-
rest1.html#GUID-BA1F5A20-8C78-49E3-8183-927F0CC6F6CC
Page 172
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 173
5.3 File Storage Service
This section contains recommendations for configuring File Storage Service related
options.
Page 174
5.3.1 Ensure File Storage Systems are encrypted with Customer
Managed Keys (CMK) (Automated)
Profile Applicability:
Level 2
Description:
Oracle Cloud Infrastructure File Storage service (FSS) provides a durable, scalable,
secure, enterprise-grade network file system. By default, the Oracle service manages
the keys that encrypt FSS file systems. FSS file systems can also be encrypted using a
customer managed key.
Rationale:
Encryption of FSS systems provides an additional level of security for your data.
Management of encryption keys is critical to protecting and accessing protected data.
Customers should identify FSS file systems that are encrypted with Oracle service
managed keys in order to determine if they want to manage the keys for certain FSS file
systems and then apply their own key lifecycle management to the selected FSS file
systems.
Impact:
Encrypting with a Customer Managed Keys requires a Vault and a Customer Master
Key. In addition, you must authorize the File Storage service to use the keys you create.
Required IAM Policy:
Allow service FssOc1Prod to use keys in compartment <compartment-id> where
target.key.id = '<key_OCID>'
Audit:
From Console:
6. For each file storage system returned click on the link under Display name
7. Ensure Encryption Key does not say Oracle-managed key
8. Repeat for other subscribed regions
Page 175
From CLI:
Remediation:
From Console:
From CLI:
References:
1. https://docs.oracle.com/en/solutions/oci-best-practices/protect-data-
rest1.html#GUID-BA1F5A20-8C78-49E3-8183-927F0CC6F6CC
2. https://docs.oracle.com/en-
us/iaas/Content/File/Concepts/filestorageoverview.htm
Page 176
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 177
6 Asset Management
This section contains recommendations for managing the creation of resources within a
tenancy.
Page 178
6.1 Create at least one compartment in your tenancy to store
cloud resources (Automated)
Profile Applicability:
Level 1
Description:
When you sign up for Oracle Cloud Infrastructure, Oracle creates your tenancy, which is
the root compartment that holds all your cloud resources. You then create additional
compartments within the tenancy (root compartment) and corresponding policies to
control access to the resources in each compartment.
Compartments allow you to organize and control access to your cloud resources. A
compartment is a collection of related resources (such as instances, databases, virtual
cloud networks, block volumes) that can be accessed only by certain groups that have
been given permission by an administrator.
Rationale:
Compartments are a logical group that adds an extra layer of isolation, organization and
authorization making it harder for unauthorized users to gain access to OCI resources.
Impact:
Once the compartment is created an OCI IAM policy must be created to allow a group
to resources in the compartment otherwise only group with tenancy access will have
access.
Audit:
From Console:
query
compartment resources
where
(compartmentId='<tenancy-id>' && lifecycleState='ACTIVE')
From CLI:
Page 179
1. Execute the following command
Remediation:
From Console:
From CLI:
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 180
6.2 Ensure no resources are created in the root compartment
(Automated)
Profile Applicability:
Level 1
Description:
When you create a cloud resource such as an instance, block volume, or cloud network,
you must specify to which compartment you want the resource to belong. Placing
resources in the root compartment makes it difficult to organize and isolate those
resources.
Rationale:
Placing resources into a compartment will allow you to organize and have more
granular access controls to your cloud resources.
Impact:
Placing a resource in a compartment will impact how you write policies to manage
access and organize that resource.
Audit:
From Console:
query
VCN, instance, bootvolume, volume, filesystem, bucket,
autonomousdatabase, database, dbsystem resources
where compartmentId = '<tenancy-id>'
From CLI:
Page 181
oci search resource structured-search --query-text "query
VCN, instance, volume, bootvolume, filesystem, bucket,
autonomousdatabase, database, dbsystem resources
where compartmentId = '<tenancy-id>'"
Remediation:
From Console:
From CLI:
3. For other resources use the change-compartment command for the resource
type:
Additional Information:
https://docs.cloud.oracle.com/en-
us/iaas/Content/GSG/Concepts/settinguptenancy.htm#Understa
Page 182
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 183
Appendix: Summary Table
CIS Benchmark Recommendation Set
Correctly
Yes No
Page 184
CIS Benchmark Recommendation Set
Correctly
Yes No
1.13 Ensure all OCI IAM user accounts have a valid and
current email address (Manual)
1.17 Ensure there is only one active API Key for any single
OCI IAM user (Automated)
2 Networking
2.5 Ensure the default security list of every VCN restricts all
traffic except ICMP within VCN (Automated)
Page 185
CIS Benchmark Recommendation Set
Correctly
Yes No
3 Compute
Page 186
CIS Benchmark Recommendation Set
Correctly
Yes No
5 Storage
Page 187
CIS Benchmark Recommendation Set
Correctly
Yes No
6 Asset Management
Page 188
Appendix: CIS Controls v7 IG 1 Mapped
Recommendations
Recommendation Set
Correctly
Yes No
1.1 Ensure service level admins are created to manage
resources of particular service
1.2 Ensure permissions on all resources are given only to the
tenancy administrator group
1.3 Ensure IAM administrators cannot update tenancy
Administrators group
1.4 Ensure IAM password policy requires minimum length of
14 or greater
1.5 Ensure IAM password policy expires passwords within
365 days
1.8 Ensure user API keys rotate within 90 days
1.9 Ensure user customer secret keys rotate every 90 days
1.10 Ensure user auth tokens rotate within 90 days or less
1.12 Ensure API keys are not created for tenancy
administrator users
1.14 Ensure Instance Principal authentication is used for OCI
instances, OCI Cloud Databases and OCI Functions to
access OCI resources.
1.15 Ensure storage service-level admins cannot delete
resources they manage.
1.16 Ensure OCI IAM credentials unused for 45 days or more
are disabled
4.1 Ensure default tags are used on resources
4.2 Create at least one notification topic and subscription to
receive monitoring alerts
4.4 Ensure a notification is configured for IdP group mapping
changes
4.13 Ensure VCN flow logging is enabled for all subnets
4.14 Ensure Cloud Guard is enabled in the root compartment
of the tenancy
Page 189
Recommendation Set
Correctly
Yes No
4.17 Ensure write level Object Storage logging is enabled for
all buckets
5.1.1 Ensure no Object Storage buckets are publicly visible.
Page 190
Appendix: CIS Controls v7 IG 2 Mapped
Recommendations
Recommendation Set
Correctly
Yes No
1.1 Ensure service level admins are created to manage
resources of particular service
1.2 Ensure permissions on all resources are given only to the
tenancy administrator group
1.3 Ensure IAM administrators cannot update tenancy
Administrators group
1.4 Ensure IAM password policy requires minimum length of
14 or greater
1.5 Ensure IAM password policy expires passwords within
365 days
1.6 Ensure IAM password policy prevents password reuse
1.7 Ensure MFA is enabled for all users with a console
password
1.8 Ensure user API keys rotate within 90 days
1.9 Ensure user customer secret keys rotate every 90 days
1.10 Ensure user auth tokens rotate within 90 days or less
1.12 Ensure API keys are not created for tenancy
administrator users
1.13 Ensure all OCI IAM user accounts have a valid and
current email address
1.14 Ensure Instance Principal authentication is used for OCI
instances, OCI Cloud Databases and OCI Functions to
access OCI resources.
1.15 Ensure storage service-level admins cannot delete
resources they manage.
1.16 Ensure OCI IAM credentials unused for 45 days or more
are disabled
2.1 Ensure no security lists allow ingress from 0.0.0.0/0 to
port 22
2.2 Ensure no security lists allow ingress from 0.0.0.0/0 to
port 3389
Page 191
Recommendation Set
Correctly
Yes No
2.3 Ensure no network security groups allow ingress from
0.0.0.0/0 to port 22
2.4 Ensure no network security groups allow ingress from
0.0.0.0/0 to port 3389
2.5 Ensure the default security list of every VCN restricts all
traffic except ICMP within VCN
2.6 Ensure Oracle Integration Cloud (OIC) access is
restricted to allowed sources.
2.7 Ensure Oracle Analytics Cloud (OAC) access is
restricted to allowed sources or deployed within a Virtual
Cloud Network.
2.8 Ensure Oracle Autonomous Shared Databases (ADB)
access is restricted to allowed sources or deployed within
a Virtual Cloud Network
4.1 Ensure default tags are used on resources
4.2 Create at least one notification topic and subscription to
receive monitoring alerts
4.3 Ensure a notification is configured for Identity Provider
changes
4.4 Ensure a notification is configured for IdP group mapping
changes
4.5 Ensure a notification is configured for IAM group changes
4.6 Ensure a notification is configured for IAM policy changes
4.7 Ensure a notification is configured for user changes
4.8 Ensure a notification is configured for VCN changes
4.9 Ensure a notification is configured for changes to route
tables
4.10 Ensure a notification is configured for security list
changes
4.11 Ensure a notification is configured for network security
group changes
4.12 Ensure a notification is configured for changes to network
gateways
4.13 Ensure VCN flow logging is enabled for all subnets
Page 192
Recommendation Set
Correctly
Yes No
4.14 Ensure Cloud Guard is enabled in the root compartment
of the tenancy
4.17 Ensure write level Object Storage logging is enabled for
all buckets
5.1.1 Ensure no Object Storage buckets are publicly visible.
6.2 Ensure no resources are created in the root compartment
Page 193
Appendix: CIS Controls v7 IG 3 Mapped
Recommendations
Recommendation Set
Correctly
Yes No
1.1 Ensure service level admins are created to manage
resources of particular service
1.2 Ensure permissions on all resources are given only to the
tenancy administrator group
1.3 Ensure IAM administrators cannot update tenancy
Administrators group
1.4 Ensure IAM password policy requires minimum length of
14 or greater
1.5 Ensure IAM password policy expires passwords within
365 days
1.6 Ensure IAM password policy prevents password reuse
1.7 Ensure MFA is enabled for all users with a console
password
1.8 Ensure user API keys rotate within 90 days
1.9 Ensure user customer secret keys rotate every 90 days
1.10 Ensure user auth tokens rotate within 90 days or less
1.12 Ensure API keys are not created for tenancy
administrator users
1.13 Ensure all OCI IAM user accounts have a valid and
current email address
1.14 Ensure Instance Principal authentication is used for OCI
instances, OCI Cloud Databases and OCI Functions to
access OCI resources.
1.15 Ensure storage service-level admins cannot delete
resources they manage.
1.16 Ensure OCI IAM credentials unused for 45 days or more
are disabled
2.1 Ensure no security lists allow ingress from 0.0.0.0/0 to
port 22
2.2 Ensure no security lists allow ingress from 0.0.0.0/0 to
port 3389
Page 194
Recommendation Set
Correctly
Yes No
2.3 Ensure no network security groups allow ingress from
0.0.0.0/0 to port 22
2.4 Ensure no network security groups allow ingress from
0.0.0.0/0 to port 3389
2.5 Ensure the default security list of every VCN restricts all
traffic except ICMP within VCN
2.6 Ensure Oracle Integration Cloud (OIC) access is
restricted to allowed sources.
2.7 Ensure Oracle Analytics Cloud (OAC) access is
restricted to allowed sources or deployed within a Virtual
Cloud Network.
2.8 Ensure Oracle Autonomous Shared Databases (ADB)
access is restricted to allowed sources or deployed within
a Virtual Cloud Network
4.1 Ensure default tags are used on resources
4.2 Create at least one notification topic and subscription to
receive monitoring alerts
4.3 Ensure a notification is configured for Identity Provider
changes
4.4 Ensure a notification is configured for IdP group mapping
changes
4.5 Ensure a notification is configured for IAM group changes
4.6 Ensure a notification is configured for IAM policy changes
4.7 Ensure a notification is configured for user changes
4.8 Ensure a notification is configured for VCN changes
4.9 Ensure a notification is configured for changes to route
tables
4.10 Ensure a notification is configured for security list
changes
4.11 Ensure a notification is configured for network security
group changes
4.12 Ensure a notification is configured for changes to network
gateways
4.13 Ensure VCN flow logging is enabled for all subnets
Page 195
Recommendation Set
Correctly
Yes No
4.14 Ensure Cloud Guard is enabled in the root compartment
of the tenancy
4.17 Ensure write level Object Storage logging is enabled for
all buckets
5.1.1 Ensure no Object Storage buckets are publicly visible.
5.1.2 Ensure Object Storage Buckets are encrypted with a
Customer Managed Key (CMK).
5.2.1 Ensure Block Volumes are encrypted with Customer
Managed Keys (CMK).
5.2.2 Ensure boot volumes are encrypted with Customer
Managed Key (CMK).
5.3.1 Ensure File Storage Systems are encrypted with
Customer Managed Keys (CMK)
6.2 Ensure no resources are created in the root compartment
Page 196
Appendix: CIS Controls v7 Unmapped
Recommendations
Recommendation Set
Correctly
Yes No
1.11 Ensure user IAM Database Passwords rotate within 90
days
1.17 Ensure there is only one active API Key for any single
OCI IAM user
3.1 Ensure Compute Instance Legacy Metadata service
endpoint is disabled
3.2 Ensure Secure Boot is enabled on Compute Instance
3.3 Ensure In-transit Encryption is enabled on Compute
Instance
4.15 Ensure a notification is configured for Oracle Cloud
Guard problems detected
4.18 Ensure a notification is configured for Local OCI User
Authentication
5.1.3 Ensure Versioning is Enabled for Object Storage Buckets
6.1 Create at least one compartment in your tenancy to store
cloud resources
Page 197
Appendix: CIS Controls v8 IG 1 Mapped
Recommendations
Recommendation Set
Correctly
Yes No
1.1 Ensure service level admins are created to manage
resources of particular service
1.2 Ensure permissions on all resources are given only to the
tenancy administrator group
1.3 Ensure IAM administrators cannot update tenancy
Administrators group
1.4 Ensure IAM password policy requires minimum length of
14 or greater
1.5 Ensure IAM password policy expires passwords within
365 days
1.6 Ensure IAM password policy prevents password reuse
1.7 Ensure MFA is enabled for all users with a console
password
1.8 Ensure user API keys rotate within 90 days
1.9 Ensure user customer secret keys rotate every 90 days
1.10 Ensure user auth tokens rotate within 90 days or less
1.11 Ensure user IAM Database Passwords rotate within 90
days
1.12 Ensure API keys are not created for tenancy
administrator users
1.13 Ensure all OCI IAM user accounts have a valid and
current email address
1.15 Ensure storage service-level admins cannot delete
resources they manage.
1.16 Ensure OCI IAM credentials unused for 45 days or more
are disabled
2.1 Ensure no security lists allow ingress from 0.0.0.0/0 to
port 22
2.2 Ensure no security lists allow ingress from 0.0.0.0/0 to
port 3389
Page 198
Recommendation Set
Correctly
Yes No
2.3 Ensure no network security groups allow ingress from
0.0.0.0/0 to port 22
2.4 Ensure no network security groups allow ingress from
0.0.0.0/0 to port 3389
2.6 Ensure Oracle Integration Cloud (OIC) access is
restricted to allowed sources.
2.7 Ensure Oracle Analytics Cloud (OAC) access is
restricted to allowed sources or deployed within a Virtual
Cloud Network.
2.8 Ensure Oracle Autonomous Shared Databases (ADB)
access is restricted to allowed sources or deployed within
a Virtual Cloud Network
3.2 Ensure Secure Boot is enabled on Compute Instance
3.3 Ensure In-transit Encryption is enabled on Compute
Instance
4.1 Ensure default tags are used on resources
4.2 Create at least one notification topic and subscription to
receive monitoring alerts
4.3 Ensure a notification is configured for Identity Provider
changes
4.5 Ensure a notification is configured for IAM group changes
4.6 Ensure a notification is configured for IAM policy changes
4.7 Ensure a notification is configured for user changes
4.8 Ensure a notification is configured for VCN changes
4.9 Ensure a notification is configured for changes to route
tables
4.10 Ensure a notification is configured for security list
changes
4.11 Ensure a notification is configured for network security
group changes
4.12 Ensure a notification is configured for changes to network
gateways
4.13 Ensure VCN flow logging is enabled for all subnets
4.14 Ensure Cloud Guard is enabled in the root compartment
of the tenancy
Page 199
Recommendation Set
Correctly
Yes No
4.15 Ensure a notification is configured for Oracle Cloud
Guard problems detected
4.17 Ensure write level Object Storage logging is enabled for
all buckets
5.1.1 Ensure no Object Storage buckets are publicly visible.
6.1 Create at least one compartment in your tenancy to store
cloud resources
Page 200
Appendix: CIS Controls v8 IG 2 Mapped
Recommendations
Recommendation Set
Correctly
Yes No
1.1 Ensure service level admins are created to manage
resources of particular service
1.2 Ensure permissions on all resources are given only to the
tenancy administrator group
1.3 Ensure IAM administrators cannot update tenancy
Administrators group
1.4 Ensure IAM password policy requires minimum length of
14 or greater
1.5 Ensure IAM password policy expires passwords within
365 days
1.6 Ensure IAM password policy prevents password reuse
1.7 Ensure MFA is enabled for all users with a console
password
1.8 Ensure user API keys rotate within 90 days
1.9 Ensure user customer secret keys rotate every 90 days
1.10 Ensure user auth tokens rotate within 90 days or less
1.11 Ensure user IAM Database Passwords rotate within 90
days
1.12 Ensure API keys are not created for tenancy
administrator users
1.13 Ensure all OCI IAM user accounts have a valid and
current email address
1.15 Ensure storage service-level admins cannot delete
resources they manage.
1.16 Ensure OCI IAM credentials unused for 45 days or more
are disabled
2.1 Ensure no security lists allow ingress from 0.0.0.0/0 to
port 22
2.2 Ensure no security lists allow ingress from 0.0.0.0/0 to
port 3389
Page 201
Recommendation Set
Correctly
Yes No
2.3 Ensure no network security groups allow ingress from
0.0.0.0/0 to port 22
2.4 Ensure no network security groups allow ingress from
0.0.0.0/0 to port 3389
2.5 Ensure the default security list of every VCN restricts all
traffic except ICMP within VCN
2.6 Ensure Oracle Integration Cloud (OIC) access is
restricted to allowed sources.
2.7 Ensure Oracle Analytics Cloud (OAC) access is
restricted to allowed sources or deployed within a Virtual
Cloud Network.
2.8 Ensure Oracle Autonomous Shared Databases (ADB)
access is restricted to allowed sources or deployed within
a Virtual Cloud Network
3.1 Ensure Compute Instance Legacy Metadata service
endpoint is disabled
3.2 Ensure Secure Boot is enabled on Compute Instance
3.3 Ensure In-transit Encryption is enabled on Compute
Instance
4.1 Ensure default tags are used on resources
4.2 Create at least one notification topic and subscription to
receive monitoring alerts
4.3 Ensure a notification is configured for Identity Provider
changes
4.5 Ensure a notification is configured for IAM group changes
4.6 Ensure a notification is configured for IAM policy changes
4.7 Ensure a notification is configured for user changes
4.8 Ensure a notification is configured for VCN changes
4.9 Ensure a notification is configured for changes to route
tables
4.10 Ensure a notification is configured for security list
changes
4.11 Ensure a notification is configured for network security
group changes
Page 202
Recommendation Set
Correctly
Yes No
4.12 Ensure a notification is configured for changes to network
gateways
4.13 Ensure VCN flow logging is enabled for all subnets
4.14 Ensure Cloud Guard is enabled in the root compartment
of the tenancy
4.15 Ensure a notification is configured for Oracle Cloud
Guard problems detected
4.17 Ensure write level Object Storage logging is enabled for
all buckets
4.18 Ensure a notification is configured for Local OCI User
Authentication
5.1.1 Ensure no Object Storage buckets are publicly visible.
5.1.2 Ensure Object Storage Buckets are encrypted with a
Customer Managed Key (CMK).
5.2.1 Ensure Block Volumes are encrypted with Customer
Managed Keys (CMK).
5.2.2 Ensure boot volumes are encrypted with Customer
Managed Key (CMK).
5.3.1 Ensure File Storage Systems are encrypted with
Customer Managed Keys (CMK)
6.1 Create at least one compartment in your tenancy to store
cloud resources
6.2 Ensure no resources are created in the root compartment
Page 203
Appendix: CIS Controls v8 IG 3 Mapped
Recommendations
Recommendation Set
Correctly
Yes No
1.1 Ensure service level admins are created to manage
resources of particular service
1.2 Ensure permissions on all resources are given only to the
tenancy administrator group
1.3 Ensure IAM administrators cannot update tenancy
Administrators group
1.4 Ensure IAM password policy requires minimum length of
14 or greater
1.5 Ensure IAM password policy expires passwords within
365 days
1.6 Ensure IAM password policy prevents password reuse
1.7 Ensure MFA is enabled for all users with a console
password
1.8 Ensure user API keys rotate within 90 days
1.9 Ensure user customer secret keys rotate every 90 days
1.10 Ensure user auth tokens rotate within 90 days or less
1.11 Ensure user IAM Database Passwords rotate within 90
days
1.12 Ensure API keys are not created for tenancy
administrator users
1.13 Ensure all OCI IAM user accounts have a valid and
current email address
1.14 Ensure Instance Principal authentication is used for OCI
instances, OCI Cloud Databases and OCI Functions to
access OCI resources.
1.15 Ensure storage service-level admins cannot delete
resources they manage.
1.16 Ensure OCI IAM credentials unused for 45 days or more
are disabled
2.1 Ensure no security lists allow ingress from 0.0.0.0/0 to
port 22
Page 204
Recommendation Set
Correctly
Yes No
2.2 Ensure no security lists allow ingress from 0.0.0.0/0 to
port 3389
2.3 Ensure no network security groups allow ingress from
0.0.0.0/0 to port 22
2.4 Ensure no network security groups allow ingress from
0.0.0.0/0 to port 3389
2.5 Ensure the default security list of every VCN restricts all
traffic except ICMP within VCN
2.6 Ensure Oracle Integration Cloud (OIC) access is
restricted to allowed sources.
2.7 Ensure Oracle Analytics Cloud (OAC) access is
restricted to allowed sources or deployed within a Virtual
Cloud Network.
2.8 Ensure Oracle Autonomous Shared Databases (ADB)
access is restricted to allowed sources or deployed within
a Virtual Cloud Network
3.1 Ensure Compute Instance Legacy Metadata service
endpoint is disabled
3.2 Ensure Secure Boot is enabled on Compute Instance
3.3 Ensure In-transit Encryption is enabled on Compute
Instance
4.1 Ensure default tags are used on resources
4.2 Create at least one notification topic and subscription to
receive monitoring alerts
4.3 Ensure a notification is configured for Identity Provider
changes
4.5 Ensure a notification is configured for IAM group changes
4.6 Ensure a notification is configured for IAM policy changes
4.7 Ensure a notification is configured for user changes
4.8 Ensure a notification is configured for VCN changes
4.9 Ensure a notification is configured for changes to route
tables
4.10 Ensure a notification is configured for security list
changes
Page 205
Recommendation Set
Correctly
Yes No
4.11 Ensure a notification is configured for network security
group changes
4.12 Ensure a notification is configured for changes to network
gateways
4.13 Ensure VCN flow logging is enabled for all subnets
4.14 Ensure Cloud Guard is enabled in the root compartment
of the tenancy
4.15 Ensure a notification is configured for Oracle Cloud
Guard problems detected
4.17 Ensure write level Object Storage logging is enabled for
all buckets
4.18 Ensure a notification is configured for Local OCI User
Authentication
5.1.1 Ensure no Object Storage buckets are publicly visible.
5.1.2 Ensure Object Storage Buckets are encrypted with a
Customer Managed Key (CMK).
5.2.1 Ensure Block Volumes are encrypted with Customer
Managed Keys (CMK).
5.2.2 Ensure boot volumes are encrypted with Customer
Managed Key (CMK).
5.3.1 Ensure File Storage Systems are encrypted with
Customer Managed Keys (CMK)
6.1 Create at least one compartment in your tenancy to store
cloud resources
6.2 Ensure no resources are created in the root compartment
Page 206
Appendix: CIS Controls v8 Unmapped
Recommendations
Recommendation Set
Correctly
Yes No
4.4 Ensure a notification is configured for IdP group mapping
changes
5.1.3 Ensure Versioning is Enabled for Object Storage Buckets
Page 207
Appendix: Change History
Date Version Changes for this version
Jun 24, 2024 3.0.0 UPDATE - Ensure no network security groups allow ingress
from 0.0.0.0/0 to port 22 - Update audit CLI procedure to
provide clearer output (Ticket 20583)
Jun 24, 2024 3.0.0 UPDATE - Ensure a notification is configured for changes
to network gateways -Typo correction (Ticket 21691)
Feb 18, 2025 3.0.0 UPDATE - Ensure no resources are created in the root
compartment - change the Advanced Resource Query
query to include bootvolume (Ticket 21302)
Feb 18, 2025 3.0.0 UPDATE - Ensure Block Volumes are encrypted with
Customer Managed Keys (CMK) - change audit CLI
procedure to provide clearer output (Ticket 20586)
Feb 18, 2025 3.0.0 UPDATE - Ensure Versioning is Enabled for Object
Storage Buckets - Update audit CLI procedure to provide
clearer output (Ticket 20585)
Feb 18, 2025 3.0.0 UPDATE - Ensure no network security groups allow ingress
from 0.0.0.0/0 to port 3389 - Update audit CLI procedure to
provide clearer output (Ticket 20584)
Feb 18, 2025 3.0.0 ADD - Ensure OCI IAM credentials unused for 45 days or
more are disabled (Ticket 22004)
Feb 18, 2025 3.0.0 ADD - Ensure there is only one active API Key for any
single OCI IAM user (Ticket 23737)
Page 208
Date Version Changes for this version
Feb 21, 2025 3.0.0 UPDATE - Ensure VCN flow logging is enabled for all
subnets - Update Audit and Remediation Steps for VCN
level flow logs (Ticket 23949)
Feb 21, 2025 3.0.0 UPDATE - Ensure the default security list of every VCN
restricts all traffic except ICMP within VCN -
Recommendation content does not match title (Ticket
21911)
Feb 21, 2025 3.0.0 ADD - Ensure a notification is configured for Local User
Authentication (Ticket 23132)
Oct 18, 2023 2.0.0 UPDATE - Ensure user API keys rotate within 90 days or
less - update audit and remediation console steps (Ticket
19277)
Oct 30, 2023 2.0.0 UPDATE - Ensure no security lists allow ingress from
0.0.0.0/0 to port 22 - change to Description, Audit and
Remediation sections (Ticket 18648)
Oct 30, 2023 2.0.0 UPDATE - Ensure no security lists allow ingress from
0.0.0.0/0 to port 3389 - Minor changes to the wording in the
Description, Audit Procedure, and Remediation Procedure
(Ticket 18680)
Oct 30, 2023 2.0.0 UPDATE - Ensure no network security groups allow ingress
from 0.0.0.0/0 to port 22 - changing the Assessment Status
from Manual to Automated (Ticket 19266)
Oct 30, 2023 2.0.0 UPDATE - Ensure no network security groups allow ingress
from 0.0.0.0/0 to port 22 - Add Console steps to
remediation and Audit sections (Ticket 18940)
Oct 30, 2023 2.0.0 UPDATE - Ensure the default security list of every VCN
restricts all traffic except ICMP - changes to Audit and
remediation procedures. (Ticket 19008)
Oct 31, 2023 2.0.0 UPDATE - Ensure default tags are used on resources -
changes to Audit and Remediation console steps (Ticket
19489)
Oct 31, 2023 2.0.0 UPDATE - Ensure default tags are used on resources -
change Assessment Status to Automated (Ticket 17885)
Page 209
Date Version Changes for this version
Oct 31, 2023 2.0.0 UPDATE - Create at least one notification topic and
subscription to receive monitoring alerts - change
Assessment Status to Automated (Ticket 17886)
Oct 31, 2023 2.0.0 UPDATE - Ensure a notification is configured for Identity
Provider changes - Change assessment status and
grammatical updates (Ticket 18104)
Oct 31, 2023 2.0.0 UPDATE - Ensure a notification is configured for IdP group
mapping changes - correct event names in audit and
remediation (Ticket 16869)
Oct 31, 2023 2.0.0 UPDATE - Ensure a notification is configured for IdP group
mapping changes - syntax corrections in audit and
remediation (Ticket 18103)
Oct 31, 2023 2.0.0 UPDATE - Ensure a notification is configured for IAM group
changes - Syntax updates in audit and remediation (Ticket
18105)
Nov 1, 2023 2.0.0 UPDATE - Ensure a notification is configured for IAM policy
changes - Syntax changes in audit and remediation (Ticket
18106)
Page 210
Date Version Changes for this version
Nov 13, 2023 2.0.0 UPDATE - Ensure VCN flow logging is enabled for all
subnets - syntax corrections in audit and remediation
(Ticket 17891)
Nov 13, 2023 2.0.0 UPDATE - Ensure Cloud Guard is enabled in the root
compartment of the tenancy - syntax corrections in audit
and remediation (Ticket 17892)
Nov 13, 2023 2.0.0 UPDATE - Ensure customer created Customer Managed
Key (CMK) is rotated at least annually - syntax corrections
in audit and remediation (Ticket 17893)
Nov 13, 2023 2.0.0 UPDATE - Ensure write level Object Storage logging is
enabled for all buckets - syntax corrections in audit and
remediation (Ticket 17894)
Nov 13, 2023 2.0.0 DELETE - Ensure audit log retention period is set to 365
days (Ticket 18290)
Nov 15, 2023 2.0.0 UPDATE - Ensure no Object Storage buckets are publicly
visible - Default Value to Private (Ticket 18791)
Nov 15, 2023 2.0.0 UPDATE - Ensure no Object Storage buckets are publicly
visible - Change Assessment Status to Automated (Ticket
17869)
Nov 15, 2023 2.0.0 UPDATE - Ensure no Object Storage buckets are publicly
visible - Language updates to Audit Procedure and
Remediation Procedure (Ticket 18712)
Page 211
Date Version Changes for this version
Nov 15, 2023 2.0.0 UPDATE - Ensure Object Storage Buckets are encrypted
with a Customer Managed Key (CMK) - Change
Assessment Status to Automated (Ticket 17870)
Nov 15, 2023 2.0.0 UPDATE - Ensure Object Storage Buckets are encrypted
with a Customer Managed Key (CMK) - Default Value to
Oracle Managed Key (Ticket 18828)
Nov 15, 2023 2.0.0 UPDATE - Ensure Object Storage Buckets are encrypted
with a Customer Managed Key (CMK) - Update to Audit
and Remediation Procedure (Ticket 18739)
Nov 15, 2023 2.0.0 UPDATE - Ensure Versioning is Enabled for Object
Storage Buckets - Update in language to Audit and
Remediation Procedures (Ticket 18754)
Nov 15, 2023 2.0.0 UPDATE - Ensure Versioning is Enabled for Object
Storage Buckets - Add Default Value as Versioning Disable
(Ticket 18792)
Nov 15, 2023 2.0.0 UPDATE - Ensure Versioning is Enabled for Object
Storage Buckets - Change Assessment Status to
Automated (Ticket 17871)
Nov 17, 2023 2.0.0 UPDATE - Ensure Block Volumes are encrypted with
Customer Managed Keys (CMK). - small updates made
(Ticket 18720)
Nov 17, 2023 2.0.0 UPDATE - Ensure Block Volumes are encrypted with
Customer Managed Keys (CMK) - Change Assessment
Status to Automated (Ticket 17872)
Nov 17, 2023 2.0.0 UPDATE - Ensure boot volumes are encrypted with
Customer Managed Key (CMK) - Change Assessment
Status to Automated (Ticket 17873)
Nov 20, 2023 2.0.0 UPDATE - Ensure File Storage Systems are encrypted with
Customer Managed Keys (CMK) - Change Assessment
Status to Automated (Ticket 17874)
Nov 20, 2023 2.0.0 UPDATE - Ensure no resources are created in the root
compartment - Change Assessment Status to Automated
(Ticket 17884)
Page 212
Date Version Changes for this version
Nov 20, 2023 2.0.0 UPDATE - Create at least one compartment in your
tenancy to store cloud resources - Change Assessment
Status to Automated and expand audit CLI (Ticket 17883)
Nov 20, 2023 2.0.0 UPDATE - Ensure user customer secret keys rotate within
90 days or less - changes to reduce ambiguity (Ticket
19092)
Nov 20, 2023 2.0.0 UPDATE - Ensure no security lists allow ingress from
0.0.0.0/0 to port 3389 - Automated Auditing Alternative in
additional information section (Ticket 18422)
Nov 22, 2023 2.0.0 UPDATE - Ensure permissions on all resources are given
only to the tenancy administrator group - Add remediation
via CLI and change to automated status (Ticket 18695)
Nov 22, 2023 2.0.0 UPDATE - Ensure IAM administrators cannot update
tenancy Administrators group - change Assessment Status
from Manual to Automated (Ticket 17836)
Nov 22, 2023 2.0.0 UPDATE - Ensure MFA is enabled for all users with
console password capability - CLI Changes (Ticket 18959)
Nov 22, 2023 2.0.0 UPDATE - Ensure API keys are not created for tenancy
administrator users - Changes to include Audit and
Remediation CLI commands (Ticket 19300)
Nov 22, 2023 2.0.0 UPDATE - Compute Section - Move Compute Section after
Networking section (Ticket 20216)
Dec 4, 2023 2.0.0 UPDATE - Ensure MFA is enabled for all users with a
console password - Updates for accuracy and readability
(Ticket 18953)
Dec 4, 2023 2.0.0 ADD - Ensure a notification is configured for Oracle Cloud
Guard problems detected (Ticket 20356)
Dec 11, 2023 2.0.0 ADD - Ensure Compute Instance Legacy MetaData service
endpoint is disabled (Ticket 20112)
Dec 11, 2023 2.0.0 ADD - Ensure Secure Boot is enabled on Compute
Instance (Ticket 20113)
Page 213
Date Version Changes for this version
Dec 18, 2023 2.0.0 ADD - Ensure user IAM Database Passwords rotate within
90 days (Ticket 20483)
Dec 28, 2023 2.0.0 UPDATE - Ensure IAM password policy requires minimum
length of 14 or greater - update Assessment Status from
Manual to Automated and add CLI audit steps (Ticket
17838)
Dec 28, 2023 2.0.0 ADD - Ensure In-transit Encryption is enabled on Compute
Instance (Ticket 20473)
Dec 29, 2023 2.0.0 UPDATE - Mutiple recommendations in Identity and Access
Management section - audit and remediation steps to
support tenancy with Identity Domains (Ticket 20440)
Dec 29, 2023 2.0.0 UPDATE - Ensure Dynamic Groups are used for OCI
instances, OCI Cloud Databases and OCI Function to
access OCI resources - change Dynamic Groups to to
Instance Principal (Ticket 20499)
Dec 29, 2023 2.0.0 UPDATE - Ensure no network security groups allow ingress
from 0.0.0.0/0 to port 3389 - Change the Assessment
Status from Manual to Automated (Ticket 19267)
Dec 29, 2023 2.0.0 UPDATE - Ensure IAM password policy expires passwords
within 365 days - Setting moved (Ticket 17889)
Dec 29, 2023 2.0.0 UPDATE - Ensure IAM password policy prevents password
reuse - setting removed (Ticket 17890)
Dec 29, 2023 2.0.0 UPDATE - Ensure no security lists allow ingress from
0.0.0.0/0 to port 22 - Check port range (Ticket 20482)
Dec 29, 2023 2.0.0 UPDATE - Ensure no security lists allow ingress from
0.0.0.0/0 to port 3389 - change audit query (Ticket 18756)
Page 214