Tenancy and compartments
The tenancy is the root of the OCI resource hierarchy. Compartments provide logical isolation within the tenancy — analogous to accounts (AWS), subscriptions (Azure), or projects (Google Cloud). A standard compartment hierarchy separates Security, Network, Shared Services, Workload, and Sandbox compartments. Compartment design is a foundational decision — it determines policy inheritance and audit scope.
IAM and identity domains
OCI Identity Domains manage users, groups, and credentials. IAM Policies grant permissions to groups or dynamic groups on specific resources in specific compartments. Policy design is based on verb-resource-compartment structure. Identity federation with external identity providers (SAML 2.0, SCIM) for enterprise SSO. Dynamic Groups for instance-principal-based access.
Network baseline
Virtual Cloud Networks (VCNs) provide the network boundary. Hub-and-spoke model using a hub VCN for centralised connectivity and inspection, with spoke VCNs attached via Local Peering Gateways (LPG) or DRG. FastConnect for dedicated on-premises connectivity. OCI Network Firewall or equivalent for centralised traffic inspection.
Security baseline
Security controls applied across the landing zone: Security Lists and Network Security Groups for traffic control, OCI Vault for secrets management, Key Management Service for encryption key governance, OS Management Hub for instance patching, and Bastion Service for privileged access to compute instances.
Cloud Guard and Security Zones
Cloud Guard continuously monitors the OCI tenancy for security risks — misconfigurations, anomalous activity, and policy violations — and can automatically remediate issues through Responders. Security Zones enforce a set of security policies on designated compartments, preventing non-compliant resource configurations from being deployed.
Logging and monitoring
OCI Audit Service captures all API calls across the tenancy. OCI Logging aggregates service logs, audit logs, and custom application logs. OCI Monitoring provides metrics and alerting. Service Connector Hub routes logs to archival storage, analytics, or external SIEM systems. Log retention and access controls are governance decisions.
Workload placement notes
Oracle workload placement decisions must account for: Oracle licensing terms and the impact of CPU architecture on licence compliance; Dedicated Region or Cloud@Customer options for data sovereignty; Exadata Cloud Service for Oracle Database performance requirements; and the separation of Oracle-managed PaaS services from customer-managed IaaS workloads in the compartment hierarchy.