| Topic | Details |
| Topic 1 | - Detecting, Remediating, and Monitoring OCI Resources: This section of the exam measures the skills of OCI Administrators and emphasizes monitoring and maintaining security posture across cloud resources. It focuses on the use of Cloud Guard, security zones, and the Security Advisor. Candidates also need to understand how to identify rogue users with threat intelligence, as well as use monitoring, logging, and event services for continuous visibility into performance and security.
|
| Topic 2 | - Protecting Infrastructure - Network and Applications: This section of the exam measures the skills of Cloud Security Professionals and covers methods for securing networks and applications on OCI. Topics include network security groups, firewalls, and security lists, while also focusing on the use of load balancers for availability. The section further addresses the configuration of OCI certificates and web application firewalls to strengthen infrastructure security.
|
| Topic 3 | - Implementing OS and Workload Protection: This section of the exam measures the skills of OCI Administrators and looks at securing workloads and operating systems. It includes the use of OCI Bastion for time-limited access, vulnerability scanning of hosts and containers, and the use of OS management for automated updates. The goal is to ensure that workloads remain resilient and well-protected.
|
| Topic 4 | - Protecting Data: This section of the exam measures the skills of Cloud Security Professionals and highlights data security practices in OCI. It tests knowledge of using the Key Management Service for encryption keys, managing secrets in the OCI Vault, and applying features of OCI Data Safe to ensure sensitive data remains protected.
|
| Topic 5 | - Implementing Identity and Access Management (IAM): This section of the exam measures skills of OCI Administrators and focuses on identity and access controls. It covers IAM domains, users, groups, and compartments, as well as the use of IAM policies to manage access to resources. Candidates are also tested on configuring dynamic groups, network sources, and tag-based access control, along with managing MFA, sign-on policies, and activity monitoring.
|