1 BRM Security Overview

This chapter provides an overview of Oracle Communications Billing and Revenue Management (BRM) security.

Basic Security Considerations

The following principles are fundamental to using any application securely:

  • Keep software up to date. This includes the latest product release and any patches that apply to it. This guide assumes that the BRM maintenance level is 7.5 Patch Set 10 or later.

    It is the responsibility of the system administrator to ensure that all the installed software dependencies are kept up to date wherever possible. Oracle supports versions of the software where the software vendor declares backward compatibility to the version certified with BRM and where the upgrade is a minor version increment (i.e. A.B.C to A.B.D).

    It is particularly important for system administrators to adopt this policy for software dependencies for which upgrades are generally related to security rather than focussed on functionality.

    Review the latest product release documentation for any new guidelines to follow.

  • Restrict network access to critical services. Keep the BRM Business Process, Data Management, and Data tiers behind a firewall. The firewall provides assurance that access to these systems is restricted to a known network route, which can be monitored and restricted, if necessary. As an alternative, a firewall router substitutes for multiple, independent firewalls.

    Oracle does not recommend placing a firewall between the Data Management tier and the Data tier because the connection between these two tiers is persistent. As such, it is vital that a firewall not terminate the connection after a period of time.

    Configure the TNS Listener Valid Node Checking feature, which restricts access based upon IP address. Restricting database access by IP address often causes application client/server programs to fail for DHCP clients. To resolve this, consider using static IP addresses, a software/hardware VPN, or Windows Terminal Services or its equivalent.

  • Limit privileges as much as possible. Give users only as much access as necessary to perform their work. User privileges should be reviewed regularly to determine relevance to current work requirements.

  • Monitor system activity. Ensuring system security requires good security protocols, proper system configuration, and system monitoring. Establish who should access which system components, and how often, and monitor those components.

    See "Configuring and Using Security Audit" for more information.

  • Install software securely. For example, use firewalls, secure protocols such as secure sockets layer (SSL), transport layer security (TLS), and secure passwords.

    See "Performing a Secure BRM Installation" for more information.

  • Learn and use the BRM security features. See "Managing BRM Security".

  • Keep up to date on security information. Oracle regularly issues security-related patch updates and security alerts. You must install all security patches as soon as possible.

    See the "Critical Patch Updates and Security Alerts" article on the Oracle Technology Web site:

    http://www.oracle.com/technetwork/topics/security/alerts-086861.html

About Protecting Data

When planning your BRM implementation, consider the following:

  • Which resources need to be protected?

    Many resources in the production environment can be protected, including information in databases accessed by BRM and the availability, performance, applications, and the integrity of the BRM architecture. Consider the resources you want to protect when deciding the level of security you must provide.

    • You need to protect customer data, such as credit-card numbers.

    • You need to protect internal data, such as proprietary source code.

    • You need to protect system components from being disabled by external attacks or intentional system overloads.

  • Who are you protecting data from?

    For all BRM implementations, resources must be protected from everyone on the Internet. But what data should also be protected from the employees on the intranet in your enterprise? What data should be accessible to a system administrator?

    For example, you need to protect your subscribers' data from other subscribers, but someone in your organization might need to access that data to manage it. You can analyze your workflow to determine who needs access to the data; for example, it is possible that a system administrator can manage your system components without needing to access the system data.

  • What will happen if protections on strategic resources fail?

    In some cases, a fault in your security scheme is nothing more than an inconvenience. In other cases, a fault might cause great damage to you or your customers. Understanding the security ramifications of each resource helps you protect it properly.

Recommended Deployment Configurations

This section describes recommended deployment configurations for BRM.

Figure 1-1 shows the general architectural recommendation using the well-known and generally accepted trusted network.

Figure 1-1 Traditional Trusted Network View

Description of Figure 1-1 follows
Description of ''Figure 1-1 Traditional Trusted Network View''

Firewalls separating the protecting trusted networks provide two essential functions:

  • Blocking any traffic types that are known to be illegal.

  • Providing intrusion containment, should successful intrusions take over processes or processors.

Note:

Oracle recommends not having a second firewall between the BRM server and the database server.

Operating System Security

See the following documents:

  • Guide to the Secure Configuration of Red Hat Enterprise Linux 5

  • Hardening Tips for the Red Hat Enterprise Linux 5

Oracle Database Security

See Oracle Database Security Guide.