Oracle® EDR InfiniBand Switch and Virtualized I/O Systems Hardware Security Guide

Exit Print View

Updated: September 2016
 
 

Log Security

Inspect and maintain your log files on a regular schedule.

  • Review both system and Oracle ILOM logs for possible incidents and archive them in accordance with a security policy.

  • Periodically archive and clear log files when they exceed a reasonable size. Maintain the archives in a secure location for possible future reference or statistical analysis.