Securing Threat Intelligence
This topic provides security information and recommendations for Threat Intelligence.
Security Responsibilities
To use Threat Intelligence securely, learn about your security and compliance responsibilities.
Unlike most other services in Oracle Cloud Infrastructure, Threat Intelligence is a read-only database. You do not create and manage resources within Threat Intelligence. As a result, securing Threat Intelligence is relatively simple.
- Access Control: Limit privileges as much as possible. Users should be given only the access necessary to perform their work.
Initial Security Tasks
Use this checklist to identify the tasks you perform to secure Threat Intelligence in a new Oracle Cloud Infrastructure tenancy.
Task | More Information |
---|---|
Use IAM policies to grant access to users and resources | IAM Policies |
Routine Security Tasks
Threat Intelligence does not have any security tasks that you need to perform regularly.
IAM Policies
Use policies to limit access to Threat Intelligence.
A policy specifies who can access Oracle Cloud Infrastructure resources and how. For more information, see How Policies Work.
Assign a group the least privileges that are required to perform their responsibilities. Each policy has a verb that describes what actions the group is allowed to do. From the least amount of access to the most, the available verbs are: inspect
, read
, use
, and manage
.
Because all resources in Threat Intelligence are read-only, only the inspect
and read
verbs are applicable.
Allow users in the group SecurityAdmins
to search for and view threat indicators:
Allow group SecurityAdmins to read threat-intel-family in tenancy
For more information about Threat Intelligence policies and to view more examples, see Threat Intelligence Policies.