This topic provides security information and recommendations for Threat Intelligence.
Security Responsibilities
To use Threat Intelligence securely, learn about your security and compliance responsibilities.
Unlike most other services in Oracle Cloud Infrastructure, Threat Intelligence is a read-only database. You do not create and manage resources within Threat Intelligence. As a result, securing Threat Intelligence is relatively simple.
Access Control: Limit privileges as much as possible. Users should be given only the access necessary to perform their work.
Initial Security Tasks 🔗
Use this checklist to identify the tasks you perform to secure
Threat Intelligence
in a new Oracle Cloud Infrastructure tenancy.
Task
More Information
Use IAM policies to grant access to users and resources
Threat Intelligence
does not have any security tasks that you need to perform regularly.
IAM Policies 🔗
Use policies to limit access to Threat Intelligence.
A policy specifies who can access Oracle Cloud Infrastructure resources and how. For more information, see How Policies Work.
Assign a group the least privileges that are required to perform their responsibilities. Each policy has a verb that describes what actions the group is allowed to do. From the least amount of access to the most, the available verbs are: inspect, read, use, and manage.
Because all resources in Threat Intelligence are read-only, only the inspect and read verbs are applicable.