Security Checklist for Post Server Deployment
To determine which Oracle ILOM security practices are best to maintain on existing servers in
your environment, system administrators should consult the list of security tasks recommended in the
following Figure 2, Table 2, Checklist - Maintaining Oracle ILOM Security After Server Deployment .
Table 2 Checklist - Maintaining Oracle ILOM Security After Server Deployment
|
|
|
|
|
Maintain a secure management connection to Oracle ILOM
|
All firmware versions
|
|
|
Ensure that remote KVMS and serial text-based sessions are securely launched from Oracle ILOM.
|
All firmware versions
|
|
|
Maintain and track user access to Oracle ILOM.
|
All firmware versions
|
|
|
Security actions required for resetting a lost password for the preconfigured Admin
root account.
|
Firmware versions 3.1 and later
|
|
|
Security actions required if the FIPS 140-2 compliance mode must be modified in Oracle ILOM
after server deployment.
|
Firmware version 3.2.4 and later
|
|
|
Ensure your software and firmware are current on the server.
|
All firmware releases
|
|
|