|Oracle® Communications Network Integrity Security Guide
|PDF · Mobi · ePub|
The following security checklist lists guidelines to help you secure Oracle Communications Network Integrity and its components.
Install only the components you require.
Lock and expire default user accounts.
Enforce strong password management.
Enable data dictionary protection on the Oracle Database for Network Integrity.
Restrict, control, and revisit user privileges:
Grant only the necessary privileges to each user.
Revoke unnecessary privileges from the PUBLIC user group.
Restrict permissions on run-time facilities
Enforce the use of access controls.
Require clients to authenticate.
Restrict network access by doing the following:
Never leave an unnecessary hole in a firewall.
Password-protect the Oracle listener against remote access.
Monitor listener activity.
Monitor who accesses your systems.
Restrict system access by IP addresses
Encrypt network traffic.
Harden the operating system by installing it in a secure location where it would be difficult for a hacker to access, by ensuring that all null passwords have been changed, and by disabling remote root login.
Apply all security patches and workarounds.
Encrypt sensitive information.
Contact Oracle Security Products if you discover a vulnerability in any Oracle product.