A Secure Deployment Checklist

The following security checklist lists guidelines to help you secure Oracle Communications Session Monitor and its components.

Secure Deployment Checklist

  • Install only the components you require.

  • Enable only the extensions and features you require.

  • Ensure that all default passwords have been changed.

  • Enforce user passwords to expire upon creation.

  • Enforce strong password management.

  • Ensure that users store their password securely, or not at all.

  • Ensure that users close all sessions and log out from the web browser after they are finished with their work.

  • Grant only the necessary privileges to each user.

  • Restrict network access by doing the following:

    • Use firewalls.

    • Ensure that the system is not reachable from the Internet.

    • Ensure that the system cannot reach the Internet nor resolve public DNS names.

    • Use network traffic encryption.

    • Never leave an unnecessary open ports in a firewall.

    • Harden the system by installing it in a secure location where it would be difficult for a hacker to access.

  • Apply all security patches and workarounds.

  • Contact Oracle Security Products if you discover vulnerability in any Oracle product.