Chapter 7 Security

Table of Contents

7.1 Physical Security
7.1.1 Delegate Minimal Privileges as Appropriate
7.1.2 About Discretionary and Mandatory Access Control Policies
7.1.3 About Targeted and Multilevel Security Policies
7.1.4 About Security Contexts and Users
7.1.5 Ensure Strong Defenses
7.1.6 Encryption Algorithms, Mechanisms, and Mapping

For data centers hosting enterprise applications, security is of utmost importance. In most enterprises, security is considered one of the prime factors for making platform decisions. To build a secure environment, rather than looking at security as set of commands and features available in operating systems, it is necessary that the security features be designed into the core of an operating system. Oracle Linux provides enterprise-class features that you can depend on to protect your applications by combining multiple security technologies to process and user rights as well as unmatched monitoring and auditing capabilities.

Regardless of the hosting operating system, security administrators follow simple rules to build a secure system:

  • Ensure physical security

  • Deploy stringent access controls

  • Simplify administration

  • Delegate appropriate (minimal) privileges

  • Do minimal installs

  • Ensure strong defenses

This chapter discusses some of these aspects of ensuring system security in more detail.