Skip to Content

OCI CAF: Which security architecture step is not part of design?

Security architecture vs operational checks: what belongs and what doesn’t

Learn why “periodic evaluation of permissions” is not included in Security Architecture design and how data sensitivity, workload isolation, shared‑security model, and risk assessment are core architecture steps.

Question

Which step is NOT included in Security Architecture?

A. Data sensitivity and compliance concerns
B. Periodic evaluation of permissions
C. Workload isolation
D. Understanding shared security model for cloud provider
E. Risk assessment, prioritization, and scoring

Answer

B. Periodic evaluation of permissions

Explanation

In the Security Architecture context, the core steps are about defining how security is designed and structured for the cloud environment, not about ongoing operational checks. The included steps are:

  • Data sensitivity and compliance concerns (A) – classifying data and aligning with regulatory requirements.
  • Workload isolation (C) – separating workloads to reduce blast radius and lateral movement.
  • Understanding shared security model for cloud provider (D) – clarifying what the cloud provider versus the customer is responsible for.
  • Risk assessment, prioritization, and scoring (E) – evaluating threats and ranking them to guide controls.

“Periodic evaluation of permissions” (B) is an operational or governance activity done after the architecture is in place; it is not a primary design‑phase step of security architecture itself.

Oracle Cloud Infrastructure Cloud Adoption Framework and Essentials certification exam practice question and answer (Q&A) dump with detail explanation and reference available free, helpful to pass the OCI CAF graded quizzes and final assessments, earn OCI CAF digital credential and badge.