Oracle Cloud Infrastructure—Isolated Network Virtualization

Prevent attacks on customer tenancies with isolated network virtualization. A foundational element of Oracle Cloud infrastructure’s security-first architecture, Isolated network virtualization stops malware in its tracks with a custom-designed SmartNIC to isolate and virtualize the network.

Learn about security-first design principles

See how security is fundamental to the architecture of Oracle Cloud Infrastructure with tiered defenses and highly secure operations.

Oracle Cloud Infrastructure Architecture

Reduce the risk of attacks with isolated network virtualization, a key design of Oracle Cloud Infrastructure’s security architecture.

Shortcomings of first-generation clouds

In first-generation cloud offerings, if a successful attack compromises a virtual machine instance and subsequently a hypervisor, there are no barriers to prevent an attacker’s attempts to modify the network. The networking function is managed by the same hypervisor that has been compromised: a virtual machine escape that gains access to the hypervisor also has access to the network. This can lead to several threats to hosts on the network and could expose private tenant data.


Second-generation cloud advantage

Oracle Cloud Infrastructure is different from first-generation clouds because of its use of a custom-designed SmartNIC that isolates and virtualizes the network.

The SmartNIC is isolated by hardware and software from the host, preventing a compromised instance from compromising the network. Oracle Cloud Infrastructure maintains greater external control of host network functionality and can prevent network traversal attacks.


May 7, 2020

Why Oracle Cloud Infrastructure Security is a Cut Above

Amanda OCallaghan, Oracle Content Strategist

As companies transition to the cloud for greater speed and agility, they’re also starting to see security as a cloud benefit rather than a risk. But with today’s larger and more diversified threat landscape, businesses need to be absolutely sure of the depth of their security before they trust the cloud with such important workloads. At Oracle, we anticipated this need and built our cloud from the ground up to address it.

Read the complete post

Featured blogs

View all

Resources

cloud readiness

Oracle Cloud Free Tier

Build, test, and deploy applications on Oracle Cloud for free. Sign up once, get access to two free offers.

documentation

Oracle Cloud Infrastructure Security Guide

Get the latest documentation for Oracle Cloud Infrastructure Security.

customer community

Join a community of peers

Cloud Customer Connect is Oracle’s premier online cloud community. With more than 200,000 members, it’s designed to promote peer-to-peer collaboration and sharing of best practices, product updates, and feedback.

cloud learning

Develop Oracle Cloud Security skills

Oracle Training and Certification provides training and certification organizations can rely on to ensure their success, all delivered in a choice of formats.

Additional areas of interest:

Hardware Root of Trust

Protect tenants from firmware-based attacks

Autonomous Linux

Get to know about the world’s first autonomous OS

Compliance

Learn how Oracle Cloud Infrastructure is addressing global compliance concerns

Oracle Cloud Infrastructure Regions

See Oracle Cloud Infrastructure Data Center Regions
De Oracle Playbook reeks

We hebben de geheimen van onze strategie voor mensen, processen en systemen op een rij gezet. En die willen we graag met u delen.

Get started


Oracle Cloud Infrastructure Security

Read the architecture technical brief paper.


Explore Our Blog

Read our isolated network virtualization expert’s blog.


Try Oracle Cloud

Take advantage of Oracle Cloud Free Tier.


Oracle Cloud Infrastructure Security Differentiators

Learn more about Oracle Cloud Infrastructure security differentiators.