JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Netra Blade X3-2B (formerly Sun Netra X6270 M3 Server Module)

Security Guide

search filter icon
search icon

Document Information

Overview

Product Overview

Basic Security Principles

Planning a Secure Environment

Hardware Physical Security

Software Security

Oracle ILOM Firmware

Operating System Security Guidelines

Oracle System Assistant Security Information

Maintaining a Secure Environment

Oracle ILOM Security

Hardware Power Control

Asset Tracking

Maintaining Updates for Software and Firmware

Local and Remote Access

Data Security

Basic Security Principles

There are four basic security principles: access, authentication, authorization, and accounting.

Access

Use physical and software controls to protect your hardware or data from intrusion.

Authentication

Set up all authentication features such as a password system in your platform operating systems to verify that users are who they say they are.

Authentication provides varying degrees of security through measures such as badges and passwords. For example, ensure that personnel use employee badges properly to enter a computer room.

Authorization

Authorization allows company personnel to work only with hardware and software that they are trained and qualified to use.

For example, set up a system of Read/Write/Execute permissions to control user access to commands, disk space, devices, and applications.

Accounting

Customer IT personnel can use Oracle software and hardware features to monitor login activity and maintain hardware inventories.