Skip to content

Latest commit

 

History

History
94 lines (70 loc) · 5.44 KB

File metadata and controls

94 lines (70 loc) · 5.44 KB

Frequently Asked Questions

Questions

  1. What is the CIS Oracle Cloud Infrastructure Foundations Benchmark version 1.1.0?
  2. What is the CIS OCI Landing Zone?
  3. What is the cost of the services created by the Landing Zone?
  4. What permissions are needed to deploy the Landing Zone?
  5. Do I have deploy the Landing Zone to use the the compliance check script?
  6. What permissions are needed to run the compliance script?
  7. What network architectures can be deployed by the Landing Zone?
  8. Which OCI services can be deployed by the Landing Zone?

Answers

1. What is the CIS Oracle Cloud Infrastructure Foundations Benchmark version 1.1.0?

Objective, consensus-driven, security guidelines for OCI that have been accepted by the Center for Internet Security (CIS) and the supporting CIS community. Click here to download a copy.

2. What is the CIS OCI Landing Zone?

The CIS OCI Landing Zone is a publicly available reference architecture for creating the foundations of a secure tenancy on OCI following best practices from the CIS Benchmark for OCI; along with best practices developed in OCI for our own Oracle PaaS, SaaS, and IT services. In addition to the reference architecture, the Landing Zone includes easy to deploy Terraform code (Quick Start) that automates the creation of a secure tenancy and a compliance checking script that can be used on new or existing tenancies that validates configuration in the tenancy for compliance with the CIS benchmark recommendations.

3. What is the cost of the services created by the Landing Zone?

There is no cost to the resources deployed out by the Landing Zone. However, the use of Service Hub Connector and OCI Logging may incur some charges for data stored and processed.

4. What permissions are needed to deploy the Landing Zone?

The Landing Zone can be deployed by a user with broad permissions (typically a member of the Administrators group), or as user with narrower permissions.

For deploying as a user with narrower permissions, some requirements must be satisfied. Landing Zone V2 provides the pre-config module for fulfilling the requirements. The pre-config module is expected to be executed by a user with broad permissions (typically a member of the Administrators group). Then assign a user to the provisioning group created by the pre-config module and execute the config module as that user.

For deploying as a user with broad permissions, simply execute the config module.

For more details, please check the following documentation:

5. Do I have deploy the Landing Zone to use the the compliance check script?

No. The cis_reports.py is a stand alone python3 script that can be run in any tenancy.

6. What permissions are needed to run the compliance script?

The user running the script should be in the Auditors group.

To allow the Auditor group to write the reports to an output bucket the below policy must be added to the <prefix>-auditor-policy policy:

Allow group <prefix>-auditor-group to manage objects in compartment <compartment-name> where target.bucket.name='<bucket-name>'

7. What network architectures can be deployed by the Landing Zone?

The Landing Zone can deploy multiple network architectures. It can create multiple VCNs (including VCNs configured for Exadata Cloud service deployments) as either stand alone networks or in one of the below Hub and Spoke architectures:

  • Access to multiple VCNs in the same region: This scenario enables communication between an on-premises network and multiple VCNs in the same region over a single FastConnect private virtual circuit or Site-to-Site VPN and uses a DRG as the hub.
  • Access between multiple networks through a single DRG with a firewall between networks: This scenario connects several VCNs to a single DRG, with all routing configured to send packets through a firewall in a hub VCN before they can be sent to another network.

You can choose if want to allow the creation of Internet Gateways and NAT Gateways to provide a more isolated network.

8. Which OCI services can be deployed by the Landing Zone?

The Landing Zone can deploy the following services:

  • IAM (Identity & Access Management)
    • Compartments
    • Groups
    • Policies
  • Networking
    • VCN (Virtual Cloud Networks)
      • Route Tables
      • Internet Gateway (IGW)
      • NAT Gateway
      • Service Gateway (SGW)
      • Dynamic Gateway Attachments
      • Default Security Lists
      • Network Security Groups
    • Dynamic Routing Gateways (DRG)
  • Vaults
    • Keys
  • Cloud Guard
    • Target
  • Logging
    • Logs
    • Log Groups
  • Service Connector Hub
  • Vulnerability Scanning
    • Targets
    • Recipe
  • Bastion
  • Events Rules
  • Alarms
  • Notifications
    • Topics
    • Subscriptions
  • Object Storage