Prerequisites

Perform these tasks before you enable Oracle Cloud Guard.

Note

Cloud Guard is not available for free Oracle Cloud Infrastructure tenancies. Before you attempt to enable Cloud Guard, ensure that:
  • You have a paid tenancy.
  • Your tenancy account type is one of these:
    • default_dbaas
    • enterprise_dbaas
    • enterprise

Creating the Cloud Guard User Group

To allow users to work with Cloud Guard, create a user group with administrator privileges.

Cloud Guard deals with security information globally and should be available to a restricted audience.

  1. Log in to the Oracle Cloud Infrastructure console as a tenancy administrator.
  2. Open the navigation menu and click Identity & Security. Under Identity, click Groups.
  3. Click Create Group.
  4. Fill in the required fields and then click Create.
    Provide a name that clearly identifies the group, such as CloudGuardUsers. Avoid entering confidential information.

What's Next

Add Cloud Guard users to the group you created.

If you plan to use an identity provider (IdP), such as Oracle Identity Cloud Service, for federated authentication of users, you must map the Identity Provider Group to the OCI IAM Group you created. See Managing Oracle Identity Cloud Service Users in the Console for steps to follow for Oracle Identity Cloud Service.

Policy Statements for Users

Add a policy statement that enables the Cloud Guard users group you defined to manage Cloud Guard resources.

Note

You can find all the policies required to enable Cloud Guard in the Oracle Cloud Infrastructure Identity and Access Management (IAM) Common Policies topic. On that page, search for "Cloud Guard" and expand the four lists that you find.

For detailed information on individual Cloud Guard policies, see Cloud Guard Policies.

To manage Cloud Guard resources, add the policy following statement to enable all users in the CloudGuardUsers group. Substitute the name you assigned to the group, if you did not name it CloudGuardUsers.

allow group <identity_domain_name>/CloudGuardUsers to manage cloud-guard-family in tenancy

If the Cloud Guard users group is not in the default identity domain, you must include the <identity_domain_name>, followed by a forward slash ("/"), before the group name:

allow group <identity_domain_name>/CloudGuardUsers to manage cloud-guard-family in tenancy

With this policy in place, users that you add to the Cloud Guard users group are now ready to proceed with Enabling Cloud Guard.

Note

If for some reason you choose not to add the exact policy statement above, you must add the following policy statement as a minimum requirement to allow users to access Cloud Guard:
allow group CloudGuardUsers to use cloud-guard-config in tenancy

If the Cloud Guard users group is not in the default identity domain, you must include the <identity_domain_name>, followed by a forward slash ("/"), before the group name:

allow group <identity_domain_name>/CloudGuardUsers to use cloud-guard-config in tenancy

Was this article helpful?