Skip to main content

Oracle Cloud Infrastructure Configuration Detector Rules

Lacework provides coverage of the Oracle Cloud Infrastructure Configuration Detector Rules (or OCI Configuration Detector Rules for short).

Once you have integrated your Oracle Cloud Infrastructure (OCI) environment with Lacework, you can check whether your resources are compliant with the benchmark recommendations.

Visibility and Usage in the Lacework Console

You can use the OCI Configuration Detector Rules in the following ways:

Prerequisites

Ensure you have integrated your OCI environment with the Lacework Compliance platform. Completing this will prepare your environment for the OCI Configuration Detector Rules:

Previous Integrations using Terraform

If you have previously integrated OCI with Lacework using Terraform before this benchmark was available:

  1. Enter the directory containing the Terraform files used for the integration.
  2. Run terraform init -upgrade to initialize the working directory (containing the Terraform files).
  3. Run terraform plan and review the changes that will be applied.
  4. Once satisfied with the changes that will be applied, run terraform apply to upgrade the modules.

OCI Configuration Detector Rule Policies

All policies for the OCI Configuration Detector Rules are enabled by default.

You can enable or disable them using one of the following methods outlined in this section.

Enable or Disable Policies in the Lacework Console

On the Policies page, use the framework:oci-cfg-detector tag to filter for OCI Configuration Detector Rules only.

You can enable or disable each one using the status toggle.

Alternatively, see Batch Update Policies to enable or disable multiple policies at once.

note

Manual policies do not have a status toggle as there is no functional check to enable. For more information about manual policies, see Automated vs Manual Policies.

Enable or Disable Policies using the Lacework CLI

tip

If you have not set up the Lacework CLI before, see the Lacework CLI guide to get started.

Enable or disable all the OCI Configuration Detector Rules using the following commands in the Lacework CLI:

Enable all policies
lacework policy enable --tag framework:oci-cfg-detector
Disable all policies
lacework policy disable --tag framework:oci-cfg-detector

Enable or disable specific OCI Configuration Detector Rule policies using the following command examples in the Lacework CLI:

Enable lacework-global-724
lacework policy enable lacework-global-724
Disable lacework-global-724
lacework policy disable lacework-global-724

Policy Mapping for OCI Configuration Detector Rules

The mapping of Lacework policies to the resource types of the OCI Configuration Detector Rules is shown in the tables below.

Table key:

  • Title - The policy/rule title.
  • Lacework Policy ID - The Lacework policy identifier.
  • Lacework Assessment - Whether Lacework have determined that the rule can be assessed automatically or if it requires manual verification.
  • Severity - The severity of the policy (as determined by Lacework).
note

This framework uses CIS OCI 1.2.0 Benchmark policies when there is an overlap with the OCI CFG Detector Rules.

TitleLacework Policy IDLacework AssessmentSeverity
Instance has a public IP addresslacework-global-724AutomatedLow
Instance is publicly accessiblelacework-global-725AutomatedMedium
Instance is running an Oracle public imagelacework-global-717ManualLow
Instance is not running an Oracle public imageTBATBALow
Instance is running without required Tagslacework-global-661AutomatedLow

Automated vs Manual Policies

Lacework automates compliance policies where possible. This allows the Lacework platform to monitor your environment resources to check whether they are compliant with the benchmark recommendations.

For some benchmark recommendations, it is not possible to automate the policy checks in an OCI environment. These policies are manual, and you must verify such policies manually. Lacework provides the manual remediation steps for these policies (when available).