SOLUTIONS

Oracle Cloud Infrastructure Security

Security for Cloud Native Applications on Oracle Cloud Infrastructure

Enterprises using Oracle Cloud Infrastructure to build, manage, and run their containers also leverage Twistlock to provide complete security of their environments. Twistlock ensures that images and containers are free of vulnerabilities and compliance policies are implemented, while runtime protection and cloud native firewalls secure your environment and networks from active threats. Oracle Cloud is an official member of the Twistlock Advantage Partner (TAP) Program.

Vulnerability Prevention from Development to Runtime

Twistlock detects vulnerabilities in your images throughout their lifecycle, from the beginning of the CI process with Oracle Container Pipelines, to your container images in Oracle Cloud Infrastructure Registry (OCIR), to all your production deployments on Oracle Container Engine for Kubernetes (OKE).

Compliance Across the Application Lifecycle

With compliance rules covering over 300 security best practices and pre-built policy templates for specific regulations like HIPAA, PCI, GDPR, and NIST SP 800-190, Twistlock can automatically enforce compliance policies across the build to runtime. Twistlock is the only platform that continuously monitors your hosts, images, and containers for compliance.

Risk Prioritization Tailored to Your Environment

Twistlock ranks vulnerabilities and compliance issues by leveraging our proprietary risk score, a combination of CVSS score and metrics about your specific environment, so you can measure and prioritize remediation of top risks. The Twistlock Intelligence Stream ensures the most precise, layer-aware, vulnerability analysis with zero false positives.

Runtime Security for OKE

From network and application firewalls, to runtime defense, to host protection, Twistlock is the only security tool you need to defend your applications running on OKE against vulnerabilities and security threats. Twistlock deploys natively on OKE to automatically provide automatically-created explicit allow list protection for every pod along with microservices-aware layer 3 and layer 7 firewalls.

VIDEO
How Twistlock and Oracle Protect Cloud Native Workloads

Watch now

Kubernetes Deployment & Security Patterns
Shine a light on answering the question: How well does Kubernetes work in production? Get data research and findings about Kubernetes deployment and security practices.
Download
DOWNLOAD THE GUIDE