Basic Security
This document provides general security guidelines to help you protect your Oracle server,
server network interfaces, and connected network switches.
Contact your IT Security Officer for additional security requirements that pertain to your system
and specific environment.
There are basic security principles that you should adhere to when using all hardware and
software. This section covers the four basic security principles:
■
“Access” on page 7
■
“Authentication” on page 8
■
“Authorization” on page 8
■
“Accounting and Auditing” on page 8
Access
Access refers to physical access to hardware, or physical or virtual access to software.
■
Use physical and software controls to protect your hardware and data from intrusion.
■
Change all default passwords when installing a new system. Most types of equipment use
default passwords, such as
changeme
, that are widely known and could allow unauthorized
access to hardware or software.
■
Refer to the documentation that came with your software to enable any security features
available for the software.
■
Install servers and related equipment in a locked, restricted access room.
■
If equipment is installed in a rack with a locking door, keep the door locked except when
you have to service components in the rack.
■
Restrict access to USB ports and consoles. Devices such as system controllers, power
distribution units (PDUs), and network switches have USB connections, which can
provide direct access to the system. Physical access is a more secure method of accessing
components since it is not susceptible to network-based attacks.
■
Restrict the capability to restart the system over the network.
Basic Security
7