Go to main content
Oracle® Server X5-8

Exit Print View

Updated: August 2015
 
 

Software Security

Most hardware security is implemented through software measures.

  • Change all default passwords when installing a new system. Most types of equipment use default passwords, such as changeme, that are widely known and would allow unauthorized access to the equipment.

  • Change every password on network switches which might have multiple user accounts and passwords by default.

  • Limit the use of the default Administrator account (root) to a single administrator user. Always create a new Oracle ILOM account for each new user. Ensure that a unique password and a proper level of authorization privileges (operator, administrator, and so on) always are assigned to each Oracle ILOM user account.

  • Use a dedicated network for service processors to separate them from the general network.

  • Protect access to USB consoles. Devices such as system controllers, power distribution units (PDUs), and network switches can have USB connections, which can provide more powerful access than SSH connections.

  • Refer to the documentation that came with your software to enable any security features available for the software.

  • Implement port security to limit access based upon MAC addresses. Disable autotrunking on all ports.