Skip to main content

CIS Oracle Cloud Infrastructure (OCI) 1.2.0 Benchmark

Lacework provides compliance policies based on CIS Oracle Cloud Infrastructure Foundations Benchmark v1.2.0 (or CIS OCI 1.2.0 Benchmark for short).

Once you have integrated your Oracle Cloud Infrastructure (OCI) environment with Lacework, you can check whether your resources are compliant with the benchmark recommendations.

Visibility and Usage in the Lacework Console

You can use the CIS OCI 1.2.0 Benchmark in the following ways:

Prerequisites

Ensure you have integrated your OCI environment with the Lacework Compliance platform. Completing this will prepare your environment for the CIS OCI 1.2.0 Benchmark:

Previous Integrations using Terraform

If you have previously integrated OCI with Lacework using Terraform before this benchmark was available:

  1. Enter the directory containing the Terraform files used for the integration.
  2. Run terraform init -upgrade to initialize the working directory (containing the Terraform files).
  3. Run terraform plan and review the changes that will be applied.
  4. Once satisfied with the changes that will be applied, run terraform apply to upgrade the modules.

CIS OCI 1.2.0 Benchmark Policies

All policies in the CIS OCI 1.2.0 Benchmark are enabled by default.

You can enable or disable them using one of the following methods outlined in this section.

Enable or Disable Policies in the Lacework Console

On the Policies page, use the framework:cis-oci-1-2-0 tag to filter for CIS OCI 1.2.0 policies only.

You can enable or disable each one using the status toggle.

Alternatively, see Batch Update Policies to enable or disable multiple policies at once.

note

Manual policies do not have a status toggle as there is no functional check to enable. For more information about manual policies, see Automated vs Manual Policies.

Enable or Disable Policies using the Lacework CLI

tip

If you have not set up the Lacework CLI before, see the Lacework CLI guide to get started.

Enable or disable all the CIS OCI 1.2.0 policies using the following commands in the Lacework CLI:

Enable all policies
lacework policy enable --tag framework:cis-oci-1-2-0
Disable all policies
lacework policy disable --tag framework:cis-oci-1-2-0

Enable or disable specific CIS OCI 1.2.0 policies using the following command examples in the Lacework CLI:

Enable lacework-global-676
lacework policy enable lacework-global-676
Disable lacework-global-676
lacework policy disable lacework-global-676

Policy Mapping for CIS OCI 1.2.0

The CIS OCI 1.2.0 controls are mapped to Lacework policies, as listed in the following tables.

Table key:

  • Control ID - The CIS OCI 1.2.0 Benchmark security control identifier.
  • Title - The policy/control title.
  • Lacework Policy ID - The Lacework policy identifier.
  • CIS Assessment - Whether CIS have determined that the security control can be assessed automatically or if it requires manual verification.
  • Lacework Assessment - Whether Lacework have determined that the security control can be assessed automatically or if it requires manual verification.
  • Severity - The severity of the policy (as determined by Lacework).
Control IDTitleLacework Policy IDCIS AssessmentLacework AssessmentSeverity
1.1Ensure service level admins are created to manage resources of particular serviceTBAManualTBAHigh
1.2Give permissions on all resources only to the tenancy administrator grouplacework-global-669ManualAutomatedHigh
1.3Ensure Identity and Access Management (IAM) administrators cannot update tenancy Administrators grouplacework-global-670ManualAutomatedHigh
1.4Ensure IAM password policy requires minimum length of 14 or greaterTBAManualTBAMedium
1.5Ensure IAM password policy expires passwords within 365 daysTBAManualTBAMedium
1.6Ensure IAM password policy prevents password reuseTBAManualTBALow
1.7Enable Multi-Factor Authentication (MFA) for all users with console password capabilitylacework-global-674AutomatedAutomatedHigh
1.8Ensure user API keys rotate every 90 dayslacework-global-675AutomatedAutomatedMedium
1.9Ensure user customer secret keys rotate every 90 dayslacework-global-676AutomatedAutomatedMedium
1.10Ensure user auth tokens rotate within 90 dayslacework-global-677AutomatedAutomatedMedium
1.11Ensure API keys are not created for tenancy administrator userslacework-global-678AutomatedAutomatedHigh
1.12Ensure all OCI IAM user accounts have a valid and current email addressTBAManualTBALow
1.13Ensure Dynamic Groups are used for OCI instances, OCI Cloud Databases and OCI Function to access OCI resources.TBAManualTBAHigh
1.14Ensure storage service-level admins cannot delete resources they manage.TBAManualTBAHigh

Automated vs Manual Policies

Lacework automates compliance policies where possible. This allows the Lacework platform to monitor your environment resources to check whether they are compliant with the benchmark recommendations.

For some benchmark recommendations, it is not possible to automate the policy checks in an OCI environment. These policies are manual, and you must verify such policies manually. Lacework provides the manual remediation steps for these policies (when available).

Automated Policies (that were deemed manual)

In some cases, Lacework is able to automate certain CIS benchmark controls that were deemed as manual by CIS.

The following table outlines the CIS OCI 1.2.0 Benchmark policies that fall within this category:

Click to expand
Control IDTitleLacework Policy ID
1.2Give permissions on all resources only to the tenancy administrator grouplacework-global-669
1.3Ensure Identity and Access Management (IAM) administrators cannot update tenancy Administrators grouplacework-global-670
2.3Ensure no network security groups allow ingress from 0.0.0.0/0 to port 22lacework-global-684
2.4Ensure no network security groups allow ingress from 0.0.0.0/0 to port 3389lacework-global-685
2.5Ensure the default security list of every Virtual Cloud Network (VCN) restricts all traffic except Internet Control Message Protocol (ICMP)lacework-global-686
3.2Use default tags on resourceslacework-global-691
4.1.1Ensure no Object Storage buckets are publicly visiblelacework-global-707
4.1.2Encrypt Object Storage Buckets with a Customer Managed Key (CMK)lacework-global-708
4.2.1Encrypt Block Volumes with Customer Managed Keys (CMK)lacework-global-710

Manual Policies (that were deemed automated)

In some cases, Lacework cannot automate certain CIS benchmark controls that were deemed as automated by CIS.

This is often due to one of the following reasons:

  • Scope is defined by the user.
  • It requires configuring other products or API permissions that are out of scope.
  • Known issues for audit procedure described by the CIS control.

The following table outlines the CIS OCI 1.2.0 benchmark policies that fall within this category:

Click to expand
Control IDLacework Policy IDTitle
3.1Ensure audit log retention period is set to 365 dayslacework-global-690