Skip to content

Security

Oracle’s renowned security with TEAM IM Tier 1 DIA certification

Oracle Cloud Infrastructure (OCI) employs a comprehensive security framework designed to protect cloud workloads against various threats. This framework is built around seven core pillars that aim to maximize the security and compliance of the platform.

Physical security zones within the context of data centres in New Zealand refer to the layers or tiers of security measures implemented to protect the physical infrastructure of data centres from unauthorised access, theft, and other security threats. These zones are crucial for maintaining the integrity and reliability of the data stored and processed within these facilities, especially given the importance of data sovereignty, privacy, and protection in New Zealand. The implementation of physical security zones is guided by international standards and best practices, such as those outlined by the Uptime Institute or ISO/IEC standards, and adapted to local regulations and requirements.

Further to physical security, TEAM Cloud OCI starts with a zero trust architecture, ensuring tenants are isolated both from each other, from TEAM Cloud and from Oracle. Defences are layered upon each other all the way out to the edge, including least-privilege identity and access management, default data encryption, and granular resource and network control. The combination of secure architecture, technology, development, and process provides a more secure environment than most on-premises facilities, as well as other clouds. Additionally, OCI is compliant with more than 80 global, regional, and industry standards including: SOC; ISO; PCI- DSS; HIPAA; FedRAMP; IL-5; GDPR; and more.

SECURITY_2.0

Seven core pillars of OCI Security

Customer Isolation

Customer Isolation

Ensuring the isolation of your applications, data, and resources from other tenants and Oracle.

Data Encryption

Data Encryption

Safeguarding your data with security controls to meet security and compliance requirements.

Security Controls

Security Controls

Managing access to services and segregating operational responsibilities to mitigate risks.

Visibility

Visibility

Auditing and monitoring actions on resources to minimise security and operational risks.

TEAM Cloud_Web Icons_Security Page_Secure Hybrid Cloud

Secure Hybrid Cloud

Leveraging existing security assets for accessing cloud resources and securing data.

TEAM Cloud_Web Icons_Security Page_High Availability

High Availability

Utilising fault-tolerant data centers to protect against network attacks and ensure consistent uptime.

TEAM Cloud_Web Icons_Security Page_Verifiably Secure Infrastructure

Verifiably Secure Infrastructure

Operating on an infrastructure that integrates rigorous security controls throughout development and operation phases.

Physical Security of your Sovereign Cloud

TEAM Cloud_Web Icons_ZONES 0-1

1. Location (Zone 0)

We do not publicly disclose the location of our data centres.

TEAM Cloud_Web Icons_ZONES 1-1

2. Perimeter Security (Zone 1)

This is the first layer of defense and includes measures to secure the outer boundary of the data centre property. It typically involves fencing, surveillance cameras, security lighting, and manned or automated gates. The goal is to deter unauthorised entry and to monitor and control access to the data centre site.

ZONES 2-1

3. Building Exterior (Zone 2)

This zone focuses on the physical security measures at the building's exterior, including walls, doors, and windows. Security measures may include reinforced walls, bulletproof glass, security cameras, and secure entry points that require authentication (e.g., card access, biometrics) to pass through.

TEAM Cloud_Web Icons_ZONES 3-1

4. Lobby and Reception (Zone 3)

The lobby or reception area acts as a controlled entry point into the data centre's interior spaces. Access control measures here are stringent, with visitors required to present identification, be logged, and be escorted by authorised personnel. Surveillance and security personnel are always present in this area.

TEAM Cloud_Web Icons_ZONES 4-1

5. Operations and Data Halls (Zone 4)

This is the core area where critical infrastructure and data storage devices are located. Access to these areas is highly restricted and monitored through advanced access control systems (e.g., biometric authentication). The zone is monitored 24/7 by CCTV and include additional security measures like mantraps that prevent tailgating.

TEAM Cloud_Web Icons_ZONES 5-1

6. Secure Areas and Cabinets (Zone 5)

Within the data halls, there is further segregation into more secure areas or cabinets, especially for sensitive or critical data. These areas have their own set of access controls and monitoring, ensuring that only authorised personnel can access specific devices or data sets.

The Five S's

TEAM Cloud is distinguished in the New Zealand cloud services market through a strategic focus on five key pillars, which are designed to address specific needs and concerns of New Zealand businesses, government agencies, and indigenous communities, offering a unique value proposition compared to other hyperscale cloud providers planning operations in New Zealand.

Speak with one of our team today to learn how to get started with TEAM Cloud.