Simplify your Oracle Cloud Infrastructure (OCI) adoption across a range of workloads. From planning to implementation, unlock OCI’s potential with guides, architectures, videos, and automation scripts.
Description | Resource type |
---|---|
OCI Migration Hub: Container to OCI Container Engine for Kubernetes | OCI Migration Hub |
Description | Resource type |
---|---|
How to deploy OCI Service Mesh and microservices on OKE using OCI Cloud Shell | Reference architecture |
How OCI implements service mesh and the sidecar concept, including demos | Video (28:10) |
Description | Resource type |
---|---|
The OCI Security Health Check: Verifying an OCI tenancy for CIS OCI Foundations Benchmark compliance | GitHub |
Deploy an autoscaling virus scanner using OCI Container Engine for Kubernetes | Reference architecture |
Description | Resource type |
---|---|
How to autoscale OCI Container Instances | Reference architecture |
Description | Resource type |
---|---|
How to automate deployments with Terraform infrastructure and run furiously fast cloud native Java | Video (1:04:34) |
Scale and optimize Jenkins on OCI Container Engine for Kubernetes | Reference architecture |
Jenkins meets OKE: How Jenkins can be provisioned in a cloud native way | Video (44:07) |
Description | Resource type |
---|---|
How to manage version control for your database in a microservices architecture | Video (7:18) |
Description | Resource type |
---|---|
Develop a web application that modifies PDF documents | Solution playbook |
Deploy IBM Sterling Order Management software in an OCI Container Engine for Kubernetes cluster | Reference architecture |
Description | Resource type |
---|---|
Migration Hub for Oracle E-Business Suite to Oracle Cloud Infrastructure | Oracle.com |
Moving E-Busines Suite Workloads to Oracle Cloud with Weblogic for Oracle Cloud Infrastructure | Video (29:50) |
Learn About Deploying Oracle E-Business Suite on Oracle Cloud Infrastructure | Solution playbook |
Description | Resource type |
---|---|
Resiliency, High Availability, and Disaster Recovery | Solution playbook |
Description | Resource type |
---|---|
Cost management and analysis basics for OCI tenancies and services | Oracle.com |
Description | Resource type |
---|---|
Data Replication Options for Moving from E-Business Suite to Autonomous Database | Video (37:25) |
Description | Resource type |
---|---|
Integration Options for On-Premises and the Cloud with Oracle E-Business Suite | Oracle University video |
Salesforce to EBS Event-Based Integration with Oracle Integration Cloud: Opportunity to Sales Order | Video (8:32) |
Description | Resource type |
---|---|
Solving Oracle E-Business Suite and External System Integration Challenges with Oracle APEX | Video (47:06) |
E-Business Suite Analytics with Autonomous Data Warehouse and Oracle Analytics Cloud | Video (4:35) |
An introduction to Oracle Cloud Infrastructure security and the shared responsibility model
Description | Resource type |
---|---|
Introduction to Oracle Cloud Infrastructure security | Documentation |
Security overview and the shared responsibility model | Documentation |
Security checklist for Oracle Cloud Infrastructure | Solution playbook |
Design guidance: Identity and access management (IAM) security structure | Documentation |
Oracle's approach to cloud security | Webinar |
Prepare a secure environment with landing zones
Description | Resource type |
---|---|
Learn the value of landing zones | Training |
How to deploy a CIS-compliant landing zone | Ask the Architect webinar |
How to deploy a CIS-compliant landing zone | Reference architecture |
How to deploy a CIS-compliant landing zone | LiveLab |
Oracle Quickstart: OCI CIS landing zone compliance checking script | GitHub |
Assess the state of the security of your tenancy
Description | Resource type |
---|---|
OCI Security Health Check basics | Video (2:45) |
OCI Security Health Check - Standard Edition | GitHub |
Cyber-resilience capabilities in OCI
Description | Resource type |
---|---|
Incorporate cyber-resilience capabilities Iinto your OCI tenancy | Reference architecture and Ask the Architects webinar |
Migrate data securely
Description | Resource type |
---|---|
Data migration tools | Oracle.com |
Zero trust security
Description | Resource type |
---|---|
Approaching zero trust security with Oracle Cloud Infrastructure (PDF) | Technical brief |
Manage access to your cloud tenancy
Description | Resource type |
---|---|
Adopt identity domains (PDF) | Technical brief |
Check encryption
Description | Resource type |
---|---|
Learn how Oracle encrypts data at rest and in transit | Blog post |
Consider more encryption controls | Blog post |
Set up your network firewall
Description | Resource type |
---|---|
Secure your network with OCI Network Firewall | Reference architecture |
Secure your workloads in security zones
Description | Resource type |
---|---|
Set up security zones | Reference architecture |
Modernize application security
Description | Resource type |
---|---|
Use OCI Web Application Firewall to protect internet-facing and internal applications | Video (5:26) |
Enhance the security of your Fusion Applications environment | Documentation |
Assure the quality of code and deployment security (DevSecOps)
Description | Resource type |
---|---|
Use Linux for DevSecOps (PDF) | Technical brief |
Protect against distributed denial-of-service (DDoS) attacks
Description | Resource type |
---|---|
How to deploy DDoS prevention on OCI | Ask the Architects webinar |
Learn about deploying layer 3 and 4 DDoS prevention on Oracle Cloud Infrastructure | Solution playbook |
Protect your OCI tenancy from threats and improve security resilience
Description | Resource type |
---|---|
Manage threats with Oracle Cloud Guard | Documentation |
Monitor for vulnerabilities
Description | Resource type |
---|---|
Set up OCI Vulnerability Scanning Service (PDF) | Technical brief |
External security information and event management (SIEM) integration
Description | Resource type |
---|---|
Design guidance for SIEM integration | Documentation |
How to aggregate OCI service logs into third-party security management platforms | Ask the Architects webinar |
Monitor for misconfigurations and respond to security threats and vulnerabilities
Description | Resource type |
---|---|
Configure Cloud Guard to detect problems | Learning page |
Configure Oracle Data Safe | Reference architecture |
Set up Oracle Access Governance | Documentation |
Responding to a suspected cybersecurity incident | Blog post |