After the initial installation and setup, use Oracle hardware and software security features to continue controlling hardware and software assets.
Contact your IT Security Officer for additional security requirements that pertain to your system and specific environment.