Operating System Security Guidelines
■
Do not create passwords that contain a word or string that is easily discovered by a simple
Internet search.
■
Do not allow users to reuse the same password across multiple systems.
■
Do not allow users to reuse old passwords.
Change passwords on a regular basis. This helps to prevent malicious activity and ensures that
passwords adhere to current password policies.
Operating System Security Guidelines
Refer to Oracle operating system (OS) documents for information on:
■
How to use security features when configuring your systems
■
How to operate securely when you add applications and users to a system
■
How to protect network-based applications
Security Guide documents for supported Oracle operating systems are part of the
documentation library for the operating system. To find the Security Guide document for an
Oracle operating system, go to the Oracle operating system documentation library:
Operating System
Link
Oracle Solaris OS
http://www.oracle.com/technetwork/documentation/solaris-11-192991.html
Oracle Linux OS
http://www.oracle.com/technetwork/documentation/ol-1-1861776.html
Oracle VM
http://www.oracle.com/technetwork/documentation/vm-096300.html
For information on operating systems from other vendors, such as Red Hat Enterprise Linux,
SUSE Linux Enterprise Server, Microsoft Windows, and VMware ESXi, refer to the vendor’s
documentation.
Network Switches and Ports
Network switches offer different levels of port security features. Refer to the switch
documentation to learn how to do the following:
■
Use authentication, authorization, and accounting features for local and remote access to the
switch.
■
Change every password on network switches that might have multiple user accounts and
passwords by default.
16
Oracle Server X5-2 Security Guide • May 2015