Build Security Zone recipe policies to enforce security posture in compartments.
Last verified: May 2026
Build Security Zone recipe policies to enforce security posture in OCI compartments.
Required Fields
compartmentIddisplayNamesecurityPoliciesOutput will appear here...OCI Security Zones enforce security posture policies on compartments by preventing actions that violate predefined or custom security recipes. When a Security Zone is active, operations like creating public buckets, disabling encryption, or launching instances without approved images are automatically blocked. This builder helps you configure Security Zone recipes by selecting from Oracle's predefined policies and adding custom policy statements, then associating recipes with target compartments.
Your security team is hardening production after an audit found public Object Storage buckets that shouldn't have been public. The builder generates a Security Zone recipe combining Oracle's 'Maximum Security Recipe' (denies public buckets, requires encryption, blocks unencrypted volumes) plus custom statements requiring all instances use approved images from the security-approved-images compartment. Apply to all production compartments. From that point forward, no one — even admins — can create non-compliant resources. The audit finding is closed structurally, not just remediated.
Security Zones are STRICT — they CANNOT be bypassed even by admins. This is intentional and the security strength of the feature, but means a poorly-designed recipe can block legitimate operations. Test recipes in a sandbox compartment first; promote to production only after validating that legitimate workflows still work.
Combine predefined Oracle recipes with custom statements. Oracle's recipes cover ~80% of common security requirements (no public buckets, encryption at rest, etc.). Add custom statements for org-specific rules (approved-image-only, mandatory tags, region restrictions). The combination gives you well-tested baselines + your specific overlays.
Plan compartment hierarchy with Security Zones in mind from day 1. Production compartments get a strict zone; dev/test compartments can have looser zones or none. Trying to retrofit Security Zones onto an existing compartment with non-compliant resources is painful — you have to relocate or remediate every offender.
The builder constructs OCI Security Zone recipes: recipe resource (display name, description, list of policy statements that combine predefined Oracle policies and custom statements), recipe compartment association (which compartments enforce this recipe), and security zone activation. Output is generated as oci cloud-guard security-recipe + oci cloud-guard security-zone commands and Terraform oci_cloud_guard_security_recipe + oci_cloud_guard_security_zone resources.
Was this tool helpful?
Disclaimer: This tool runs entirely in your browser. No data is sent to our servers. Always verify outputs before using them in production. AWS, Azure, and GCP are trademarks of their respective owners.