π‘οΈ Oracle Cloud Guard is not enabled in the root compartmentπ’
- Contextual name: π‘οΈ Cloud Guard is not enabled in the root compartmentπ’
- ID:
/ce/ca/oracle/cloud-guard/cloud-guard-in-root-compartment - Tags:
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Logicβ
- π§ prod.logic.yamlπ’
Similar Policiesβ
- Internal:
dec-x-dcb56f35
Similar Internal Rulesβ
| Rule | Policies | Flags |
|---|---|---|
| βοΈ dec-x-dcb56f35 | 1 |
Descriptionβ
Descriptionβ
This policy identifies Oracle Tenancies that do not have Oracle Cloud Guard enabled with an active target for the root compartment.
Oracle Cloud Guard provides security posture monitoring, detector rules, and responder capabilities for OCI resources. Configuring Cloud Guard at the root compartment helps ensure monitoring coverage starts at the tenancy boundary and includes resources across child compartments.
Rationaleβ
The root compartment is the top-level compartment for an OCI tenancy. If Cloud Guard is not enabled at this scope, security findings and automated response capabilities may be unavailable or incomplete for resources in the tenancy. This can create blind spots for misconfigurations, risky activity, and policy violations.
Enabling Cloud Guard for the root compartment provides a consistent baseline for tenancy-wide threat detection and security posture management.
Impactβ
Cloud Guard may generate findings and responder activity that require operational review. Review detector and responder recipes before enabling automated responses in production environments.
... see more
Remediationβ
Remediationβ
Enable Cloud Guard in the Root Compartmentβ
From Oracle Cloud Consoleβ
- Type
Cloud Guardinto the search box at the top of the Console.- Click
Cloud Guardfrom theServicessubmenu.- Click
Enable Cloud Guard.- Click
Create Policy.- Click
Next.- Under
Reporting Region, select a region.- Under
Compartments To Monitor, chooseSelect Compartment.- Under
Select Compartments, select the root compartment.- Under
Configuration Detector Recipe, selectOCI Configuration Detector Recipe (Oracle Managed).- Under
Activity Detector Recipe, selectOCI Activity Detector Recipe (Oracle Managed).- Click
Enable.From OCI CLIβ
Create an OCI IAM policy that grants Cloud Guard the required read permissions in the tenancy:
oci iam policy create \
--compartment-id {{tenancy-id}} \
--name "CloudGuardPolicies" \
--description "Cloud Guard Access Policy" \
--statements '[
"allow service cloudguard to read vaults in tenancy",... see more