The Monitor

Monitor OCI Audit Logs with Datadog Cloud SIEM

5 minute read

Published

Share

Monitor OCI Audit Logs with Datadog Cloud SIEM
Vera Chan

Vera Chan

Ellie Cohen

Ellie Cohen

Shreya Batra

Shreya Batra

Oren Margalit

Oren Margalit

Oracle Cloud Infrastructure (OCI) provides compute, storage, networking, and database services for running enterprise applications and workloads in Oracle. OCI supports both traditional and cloud-native applications, offering scalable, secure, and high-performance infrastructure for hybrid and multi-cloud environments. Securing workloads in OCI can be complex for organizations managing a mix of on-prem, hybrid, and cloud environments. To detect threats effectively, security teams need visibility into the activities recorded in OCI Audit Logs, including authentication attempts, API calls, and changes to infrastructure resources. Analyzing this data in real time is critical for spotting anomalies, maintaining compliance, and containing potential incidents before they escalate.

Datadog Cloud SIEM simplifies this process by centralizing OCI Audit Logs alongside security data from across your stack. With prebuilt detection rules, dashboards, and native integrations, teams can quickly surface suspicious activity—such as brute force attempts, anomalous resource creation, or password resets from malicious IPs—while also correlating these events with signals from the rest of their enterprise environment.

In this post, we’ll explore how the OCI integration and OCI Content Pack help your team accelerate onboarding, prioritize investigations, and respond confidently to threats.

Centralize OCI Audit Logs for threat detection

With Datadog Log Management and the OCI integration, organizations can collect, process, and analyze all of their OCI Audit Logs in a single place, giving security teams a unified platform for monitoring and investigation. Organizations can also set up monitoring for their infrastructure and applications in just a few clicks with Datadog's OCI QuickStart. OCI QuickStart automatically provisions the services needed to collect metrics, logs, and resource data from your OCI tenancy, ensuring comprehensive observability as your cloud environment evolves.

Today, Datadog supports log pipelines for OCI Audit, Kubernetes, Virtual Cloud Network (VCN), Object Storage, and Load Balancer, with more on the way. OCI Audit Logs—covering API calls, user identities, and request details—provide a complete trail of control plane activity. Service-specific and custom logs from resources like Object Storage, Load Balancer, or Compute can add deeper visibility into access attempts, network traffic, and application behavior. By centralizing these signals in Datadog, analysts can quickly identify suspicious patterns such as repeated access denials, unexpected resource creation, or logins from unusual geographies. Alongside Slack and Jira integrations, threat details can be shared or escalated in real time, accelerating investigation and response.

Quickly detect threats with prebuilt detection rules

To speed up threat detection in OCI, Datadog offers the new OCI Content Pack for Cloud SIEM, a curated collection of out-of-the-box detection rules and a prebuilt dashboard. This pack enables security teams to quickly onboard and start monitoring their OCI environment without needing to build custom detections from scratch.

This screenshot shows the OCI Content Pack in Datadog, including a view of prebuilt dashboards and detection rules.
The OCI Content Pack, shown in the Datadog Cloud SIEM Content Packs library.
This screenshot shows the OCI Content Pack in Datadog, including a view of prebuilt dashboards and detection rules.
The OCI Content Pack, shown in the Datadog Cloud SIEM Content Packs library.

The included detection rules cover a range of potential threats, such as brute force attempts, anomalous resource creation, and unauthorized password reset requests.

This screenshot shows a possible brute force detection rule triggered in Datadog, generated from OCI Audit Logs.
A possible brute force attack from a detection rule generated by OCI Audit Logs in Datadog.
This screenshot shows a possible brute force detection rule triggered in Datadog, generated from OCI Audit Logs.
A possible brute force attack from a detection rule generated by OCI Audit Logs in Datadog.

Some highlights include:

  • Brute force and login anomalies: Detects both repeated failed logins and scenarios where a failed login sequence is quickly followed by a successful one—an indication of a potential brute force attack.
  • Enumeration and reconnaissance: Identifies anomalous increases in denied API calls, which can reveal when an attacker is probing for permissions or available resources in a compromised account.
  • Resource misuse and cryptomining: Spots unusual infrastructure usage, such as the sudden creation of GPU-intensive instances (a common sign of illicit cryptomining) or large numbers of instances spun up across multiple availability domains.

For example, an attacker who has already compromised a user’s email account could then attempt to reset the user’s Oracle Cloud password by issuing a CreateOrResetMyPasswordRequest, gaining full account access to escalate privileges, persist access, or exfiltrate data. When this detection rule is triggered, a security analyst can investigate surrounding activity—such as failed logins, privilege escalations, or suspicious instance creation—and correlate it with related detections like impossible travel or brute force attempts.

This screenshot shows another detection rule triggered, based on a new user request from a malicious IP.
A detection rule for OCI based on a new user request from a malicious IP.
This screenshot shows another detection rule triggered, based on a new user request from a malicious IP.
A detection rule for OCI based on a new user request from a malicious IP.

The analyst can then disable the user, rotate credentials, and trace the source IP for related activity in OCI Audit Logs. They can also enrich findings with threat intelligence sources like VirusTotal to see if the IP is linked to malicious infrastructure.

Together, these rules provide analysts with a ready-made foundation for investigating threats in OCI, while still leaving room to build custom detections tuned to their own environments.

Visualize logs and alert activity with the OCI Security Dashboard

To complement these detection rules, the Oracle Cloud Infrastructure (OCI) Security Dashboard gives analysts a centralized view of Oracle Cloud activity, identities, and triggered security signals, helping them quickly scope and investigate potential threats.

This screenshot shows the first view of the OCI Security Dashboard, with a section on the different OCI Audit Logs captured and audit log volume by tenancy.
An overview of the OCI Security Dashboard.
This screenshot shows the first view of the OCI Security Dashboard, with a section on the different OCI Audit Logs captured and audit log volume by tenancy.
An overview of the OCI Security Dashboard.

The dashboard includes overview charts for OCI Audit log volume, tenancies, availability zones, and event names, as well as Cloud SIEM signal visibility that shows alerts by severity and type so teams can prioritize what to investigate.

This screenshot shows security signals from OCI Audit Logs captured by Datadog and shown in the OCI Security Dashboard.
Security signals from OCI Audit Logs in the OCI Security Dashboard.
This screenshot shows security signals from OCI Audit Logs captured by Datadog and shown in the OCI Security Dashboard.
Security signals from OCI Audit Logs in the OCI Security Dashboard.

Analysts can also quickly view identity insights on the OCI Security Dashboard, including user IDs, authentication methods (e.g., API keys, federated logins, instance principals), request headers, account activity, and user geography.

This screenshot shows a collection of widgets showing various OCI Audit Log identity information, including users from different countries, user IDs, and authentication methods.
User identity widgets for OCI Audit Logs in the OCI Security Dashboard.
This screenshot shows a collection of widgets showing various OCI Audit Log identity information, including users from different countries, user IDs, and authentication methods.
User identity widgets for OCI Audit Logs in the OCI Security Dashboard.

From any widget, analysts can click into specific users, hosts, or events to filter activity, pivot directly into related logs or security signals, and uncover correlated behavior. For example, if a password reset is attempted from a suspicious IP, you can scope the dashboard to that user and immediately view all related events. This dashboard provides a clear, actionable starting point for triaging suspicious activity in Oracle Cloud Infrastructure, with quick pivots into deeper investigation in Datadog.

Get deeper visibility into your Oracle Cloud Infrastructure with Datadog Cloud SIEM

Datadog’s OCI Content Pack for Cloud SIEM centralizes security monitoring for Oracle Cloud Infrastructure, drawing upon OCI Audit Logs and features in both Log Management and Cloud SIEM to deliver detection rules, dashboards, and other key security insights. With a single hub for OCI-related security events, your team can quickly investigate suspicious activity and remediate threats to help protect your cloud environment at scale.

You can see how this integration empowers security teams to accelerate threat detection and response across OCI at Oracle AI World in Vegas, and you can sign up to meet us there. If you’re already a Datadog customer, start exploring the new OCI Content Pack today. If not, you can get started with a 14-day .

Related Articles

Monitor Oracle Cloud logs with Datadog

Monitor Oracle Cloud logs with Datadog

Accelerate investigations with Datadog Cloud SIEM Risk Insights for AWS, GCP, and Azure entities

Accelerate investigations with Datadog Cloud SIEM Risk Insights for AWS, GCP, and Azure entities

Abusing AI infrastructure: How mismanaged credentials and resources expose LLM applications

Abusing AI infrastructure: How mismanaged credentials and resources expose LLM applications

Abusing AI interfaces: How prompt-level attacks exploit LLM applications

Abusing AI interfaces: How prompt-level attacks exploit LLM applications

Start monitoring your metrics in minutes