Oracle maintains teams of specialized security professionals for the purpose of assessing the security strength of the company’s infrastructure, products, and services. These teams perform various levels of complementary security testing:
Oracle IT organizations are responsible for security scanning of the Oracle corporate systems and Cloud services they manage, per Oracle’s Server Security Policy and associated technology standards. All scanning tools must be approved per the Corporate Security Solution Assurance Process (CSSAP). Scan results are analyzed using a risk-based approach. Change management processes are used to address any identified issues according to risk-based prioritization, per management approval.
Information about penetration tests of Oracle systems is Oracle Confidential and is not shared externally. However, Oracle does makes penetration testing summary reports available for many Cloud Services.
Oracle requires that external facing systems and cloud services undergo penetration testing. Global Information Security’s Penetration Testing Team performs penetration tests and provides oversight to all lines of business in instances where other internal security teams or an approved third-party perform penetration testing activities. This oversight is designed to drive quality, accuracy, and consistency of penetration testing activities and their associated methodology. Oracle has formal penetration testing requirements which include test scope and environment definition, approved tools, findings classification, categories of exploits to attempt via automation and manual steps, and procedures for reporting results.
Penetration tests are routinely performed against Oracle cloud services and in test environments against on-premises products. Oracle’s corporate security teams monitor test execution, reporting quality and findings remediation. Before a line of business is allowed to bring a new system or cloud service into production, Oracle requires that the remediation of significant penetration test findings be completed.
Information about penetration tests of Oracle systems is Oracle Confidential and is not shared externally. However, Oracle does makes penetration testing summary reports available for many Cloud Services.
In contrast to operational security scanning and penetration testing, ethical hacking is an open book engagement where the ethical hacking team has access to the engineering documentation, for example, design specifications, and the source code of the product being tested. Administrative access can be granted to the ethical hacking team to enable a more intrusive analysis of the targeted systems and to provide the ability to leverage additional logging and debug modes. Ethical Hacking engagements are typically performed against dedicated test environments because the target systems are often negatively impacted by testing and may need to be rebuilt at the end of the assessment.
Oracle’s Ethical Hacking Team (EHT) is an independent group of security researchers in the Global Product Security organization. EHT test reports are never disclosed externally. The team reports its findings to the corporate security architect as well as the senior leadership of the affected lines of business. In addition, the EHT is a significant contributor to the Oracle Secure Coding Standards and periodically presents “lessons learned” for Oracle development.