Siebel Security Hardening Guide > Securing the Siebel Database >

Reviewing Authorization Policies


Implement the following recommendations:

  • Restrict access to SQL trace and log files.

    In a production environment, do not run Siebel Business Applications with a high level of logging, for example, use log level 2, not 5.

  • Restrict remote access to the operating system, such as through Telnet (Terminal Network), and restrict remote access diagnostics programs.
  • Limit access to the data dictionary files; these files store metadata about schema definitions, visibility rules, and other items.
Siebel Security Hardening Guide Copyright © 2013, Oracle and/or its affiliates. All rights reserved. Legal Notices.