Modern cloud architectures demand security that is proactive, identity-aware, and deeply embedded within the network fabric. In Oracle Cloud Infrastructure (OCI), networking security is not limited to simple port restrictions—it spans intelligent firewalls, zero trust access, automated remediation, encryption lifecycle management, and deep traffic inspection.
In this blog, we explore the advanced security controls in OCI Networking, including NSGs vs Security Lists, OCI Network Firewall, WAF, Bastion, Zero Trust, Vault integration, and advanced capabilities like Cloud Guard, Threat Intelligence, and Flow Logs.
1. NSGs vs Security Lists – When to Use Which
Security Lists (SLs)
Security Lists are stateful virtual firewalls applied at the subnet level. All VMs in the subnet receive the same rules. This means each subnet can have different security list and it works at the subnet level. If you open the port 443 in the security list then all the servers or any OCI components can have the incoming traffic on port 443.
They’re ideal for broad, subnet-wide policies such as:
- Allowing port 22 internally
- Permitting egress to the internet
- Allowing VCN-to-VCN traffic within a private zone
v Use SLs when you need consistent security behavior for all resources in a subnet.
Network Security Groups (NSGs)
NSGs are stateful virtual firewalls attached directly to VNICs. They allow resource-level micro-segmentation and are more flexible than Security Lists. so if you create NSG and open port 1521 in it and attach it to the database then port 1521 will only accessible on the database.
Use NSGs when:
- You need granular control for individual compute, load balancers, databases, etc.
- You want different rules for different resources in the same subnet
- You want application tiers (web, app, DB) isolated without creating multiple subnets
2. OCI Network Firewall – Enterprise-Grade Threat Prevention
OCI Network Firewall (powered by Palo Alto Networks) delivers deep packet inspection (DPI), intrusion prevention, URL filtering, malware detection, and SSL inspection capabilities directly inside OCI. But the real power of the Network Firewall comes from where you place it.
Network Firewall in Hub-and-Spoke Architecture
For large deployments, OCI recommends a centralized transit (hub) VCN connected to multiple spoke VCNs through a DRG. The OCI network firewall can reside into the HUB VCN which is attached to the DRG via HUB VCN DRG attachment and all other VCN act as a spoke.
Whenever traffic comes to the DRG, A VCN route table attach to the DRG send all the traffic to the private IP of the OCI network firewall which inspect the traffic and sends to the destination. The traffic goes back to the DRG and check the spoke VCN for which it is send to and divert the same to that spoke VCN attachments.
By placing the Network Firewall in the hub VCN, it becomes the inspection point for:
- North–South traffic
On-prem ↔ VCN (via IPSec/FastConnect)
- East–West traffic
VCN ↔ VCN across regions via RPC
- Intrusion Prevention (IPS)
- Threat Intelligence–based filtering
- URL and application filtering
- SSL forward proxy and inspection
- Custom policy creation
- High availability
- Logging and analytics
3. OCI Web Application Firewall (WAF)
- OWASP Top 10 protection
- Bot management & rate limiting
- Custom access control rules
- Geo-blocking
- Integration with OCI Load Balancer & API Gateway
- Edge protection (CDN + WAF)
- WAF is essential for frontend applications, APIs, and any service exposed to the public.
4. Bastion Service – Secure Access into Private Networks
- They request a Bastion session.
- Bastion generates a short-lived SSH key.
- A secure tunnel is created to the private target.
- Default sessions last 180 minutes (TTL) and then automatically terminate.
- All access is logged in OCI Audit.
- Servers never require public IPs
- NSGs/Security Lists remain locked down
- No long-lived SSH keys
- Fine-grained IAM control
- Fully auditable access
5. Zero Trust in OCI Networking
- Identity-based access
- Least-privilege networking (NSGs, SLs)
- Encrypted communications
- No implicit trust between networks
- Continuous monitoring (Cloud Guard)
- Short-lived credentials (Bastion, Vault)
6. Oracle Cloud Guard – Cloud Security Posture Management
- Network configurations (open ports, NSGs, SLs)
- Public endpoints
- IAM privileges
- Object Storage exposure
- Logging/Audit anomalies
- Suspicious API activity
- Remove dangerous security rules
- Close exposed ports
- Disable risky network paths
- Remove public access from buckets
- Quarantine compromised resources
7. OCI Vault – Keys, Secrets & Certificates
Again OCI vaults comes under security but it can be consumed by network-facing services (e.g., Load Balancer SSL termination, API Gateway certificates).
OCI Vault provides secure, centralized storage for encryption keys, credentials, API tokens, SSL certificates, and other sensitive secrets that applications depend on. With strong lifecycle management, automated secret rotation, versioning, and fine-grained IAM access control,
Vault ensures secrets never appear in code or on servers. Integrations with services like Load Balancer, OKE, Functions, and Databases enable a fully encrypted, identity-driven, Zero Trust environment where sensitive data is always protected both at rest and in transit.
- Encryption keys (KMS)
- Secrets (passwords, tokens, API keys, private keys)
- Certificates (TLS/SSL)
- App passwords
- DB credentials
- SSH keys
- Cloud API tokens
- Application secrets
8. Additional Advanced Security Features You Should Not Ignore
Conclusion
OCI provides a rich suite of networking security tools—from foundational firewalls to Zero Trust frameworks, encryption vaults, cloud firewalls, and intelligent automated remediation. Whether securing a small application or designing a global-scale, multi-region enterprise architecture, these tools enable deep protection for workloads and data.
Adopting NSGs for micro-segmentation, deploying Network Firewall in a hub, enabling Cloud Guard across the tenancy, storing secrets in Vault, and using Bastion for secure access together create a layered security model aligned with modern Zero Trust principles.














