Cloud Security
Sentinel is hosted in Oracle Cloud Infrastructure (OCI)
Last updated
Sentinel is hosted in Oracle Cloud Infrastructure (OCI)
Last updated
Sentinel's SAAS solution is provided by Oracle Cloud Infrastructure (OCI), to ensure that customers get maximum security and control of their application running in the cloud.
The Sentinel Software solution is now available for the cloud network infrastructure. Sentinel’s cloud solution is hosted on Oracle’s Gen2 Cloud Infrastructure (OCI). Oracle’s Cloud is engineered with several enterprise security technologies that are outlined in the security overview.
Oracle Cloud is optimized to most efficiently run the PeopleSoft applications and comes complete with the PeopleSoft Cloud Manager (PCM) tool, further assisting and automating various lifecycle management actions; including PUM Images, PeopleTools Patches, and PeopleSoft Change Management Tools.
Sentinel supports the Oracle Cloud Infrastructure as Oracle’s commitment to heightened cloud security aligns with the company's values and mission.
Customer isolation that allows you to deploy your application and data assets in an environment that commits full isolation from other tenants and Oracle’s staff, as well as between the same tenant’s workloads.
Always-on encryption that protects customer data at-rest and HTTPS-only public APIs.
Easy-to-use IAM policies that allow you to constrain access to your services, and to segregate operational responsibilities to reduce risk associated with malicious and accidental user actions.
Security zone policies that allow you to be confident that your resources comply with security principles and best practices related to encryption, network access, and so on.
Detection of security weakness in resource configuration, and detection of risky activities performed by operators and end users.
Comprehensive log data that allows you to audit and monitor actions on your resources, helping you to meet your audit requirements while reducing security and operational risk.
Identity federation that allows you to use your existing users and groups in the cloud.
Fault-independent data centers that enable high availability scale-out architectures and are resilient against network attacks, ensuring constant uptime in the face of disaster and security attack.
Support for third-party software solutions for protecting customer data and resources in the cloud.
Rigorous internal processes and use of effective security controls in all phases of cloud service development and operation.
Customer Isolation - Customer application and data assets are totally isolated from other tenants and Oracle’s staff.
Data Encryption - Data is encrypted at rest and in transit using cryptographic algorithms and keys to satisfy compliance requirements.
Security Controls - Customer services are isolated in cloud compartments, ensuring separation of services.
Hybrid Setup Security - Customers manage VPN and database connections and credentials, these are not shared with Sentinel.
High Availability - Data centers in split regions ensure high availability and constant uptime in the event of natural disasters or external attacks.
The Virtual Private Network (VPN) connection uses industry-standard IPSec protocols. The Oracle service that provides this site-to-site connection is named VPN Connect. VPN Connect offers site-to-site IPSec VPN between your on-premises network and your Virtual Cloud Network (VCN). The IPSec protocol suite encrypts IP traffic before the packets are transferred from the source to its destination and then decrypts the traffic when it arrives.
The Virtual Cloud Network (VCN) provides customers with complete control over their network environment, which allows you to assign Private IP addresses, subnets, route tables, and configure stateful firewalls.
OCI keeps customer code, data, and their information on a bare metal machine, while its cloud control code is housed on a separate computer under different architecture. This ensures Oracle does not have insight into the contents of customer data.
Customer information also remains protected within Sentinel’s architecture. For your privacy, Sentinel Software does not store any PII/PCI data. Common PeopleTools security and navigation tables are compiled into Sentinel’s database for administration and auditing purposes.
Any data customers stored with any of the OCI data services (Block Volumes including Boot Volumes, Object Storage, and Fire Storage) are protected by encryption keys. Oracle Transparent Data Encryption (TDE) is used for encrypting data in database data files and in backups.
The security of data in transit is achieved through network encryption and the VPN Connect.