Build Cloud Guard detector recipe configurations with rules and risk levels.
Last verified: May 2026
Build Cloud Guard detector recipe configurations for security monitoring and compliance.
Required Fields
compartmentIddisplayNamedetectorRecipeTypedetectorRulesOutput will appear here...OCI Cloud Guard provides automated security monitoring by using detector and responder recipes that define what threats to look for and how to react. Detector recipes contain rules that identify security problems — like public buckets, instances without monitoring, or overly permissive policies — while responder recipes define automated or manual remediation actions. Building custom recipes requires understanding rule parameters, condition groups, risk levels, and managed list references. This tool helps you assemble detector and responder recipes with correct rule configurations, thresholds, and target mappings.
Your security team needs to detect compute instances launched without their corporate-required tags (cost-center, environment, owner). The builder helps you clone the Oracle Configuration detector recipe, enable the 'Compute Instance has missing required tags' rule with a custom list of required tags, set risk level to HIGH, and configure a responder recipe to send a Slack notification (no auto-remediation). Within hours of deploy, the security team has visibility into 28 untagged production instances they hadn't previously known existed.
Always start by cloning the Oracle-managed OCI Detector recipe and disabling rules you don't need rather than building from scratch. The managed recipe has 50+ well-tuned rules covering common compliance requirements; building your own from zero is months of work.
Responder recipes default to MANUAL_APPROVAL for risky actions like 'disable user' or 'delete suspicious resource'. Don't blindly switch to AUTOMATIC — a false positive on a CRITICAL detector can cause an outage faster than a real attack would. Auto-remediation should be reserved for low-blast-radius actions like 'disable a leaked API key'.
Cloud Guard problems flow into OCI Notifications by default — wire that to PagerDuty or Slack so security findings are visible to the team. Without external alerting, problems sit in the Cloud Guard console untouched until someone happens to look.
The builder generates OCI Cloud Guard recipe resources: detector recipes (with rule references, condition groups, risk level overrides, target resource type filters) and responder recipes (with responder rule references, action mode AUTOMATIC/MANUAL_APPROVAL, condition groups). Output includes oci cloud-guard CLI commands and Terraform oci_cloud_guard_detector_recipe / oci_cloud_guard_responder_recipe resources.
Was this tool helpful?
Disclaimer: This tool runs entirely in your browser. No data is sent to our servers. Always verify outputs before using them in production. AWS, Azure, and GCP are trademarks of their respective owners.