In today’s environment, securing your computing infrastructure is essential. Effective security measures must carefully balance the risk of potential exposure, associated security costs, and the overall value of the protected information. Each organization will determine its own optimal balance based on specific needs and priorities. To support this process, we offer practical configuration guidance to help secure Oracle E-Business Suite.
The security recommendations in this guide address all layers of the three-tier architecture that make up an Oracle E-Business Suite installation. This architecture consists of:
Desktop tier: Delivers the user interface through a plug-in or add-on to a standard web browser.
Application tier: Hosts and manages the various Oracle E-Business Suite components. This tier is sometimes still referred to as the middle tier.
Database tier: Supports and manages the Oracle database.
The following diagram is an overview of the Oracle E-Business Suite architecture.
Oracle E-Business Suite Architecture

The recommendations in these next chapters generally fall into one of five categories:
Hardening covers hardening the file system, programs, products, and configuration.
Network covers physical topology, firewalls, IP restrictions at web server and database listener.
Authentication covers account management, password management, and other account related activities.
Authorization covers restrictions to executables, data files, web pages, administrative tools, and so on.
Audit covers configuration, on-going review, and purging.
We cover security for the database and listener, the application server, Oracle E-Business Suite, and individual desktops. We follow this with advice for hardening operating systems including a sample Linux hardening.
Some advice applies to the entire Oracle E-Business Suite deployment and the infrastructure in which it operates.
To help you review the most critical security configurations in your environment, you can use the Secure Configuration Console. This tool offers a centralized dashboard that allows you to assess whether your Oracle E-Business Suite environment meets key secure configuration guidelines.
Note: If you have not already done so, you should run the Secure Configuration Console now to assess your environment and then remediate any issues.
For more information see Secure Configuration Console.
While many of the items documented in this guide are automatically configured and the Secure Configuration Console can help assess compliance with many of these recommendations, you should also review the documentation thoroughly to ensure compliance with all guidelines.
Keep your Oracle E-Business Suite environment up-to-date with patching and by applying Critical Patch Updates (CPUs) and fixes for Security Alerts.
Security features and fixes are deployed regularly with patches delivered as one-off patches, cumulative updates (CUPs), Release Updates (RUPs), and Maintenance Packs (MPs).
For information on Oracle E-Business Suite features see:
Oracle E-Business Suite Applications Technology 12.2 What's New
My Oracle Support article KB203671, R12.1 / R12.2 : Oracle E-Business Suite Releases 12.1 and 12.2 Release Content Documents
For more information on the latest Oracle E-Business Suite security features:
In Oracle E-Business Suite Applications Technology 12.2 What's New, navigate to Application Object Library, and select the latest release to view the latest Oracle E-Business Suite security features.
One of the basic principles of secure configuration is to keep all software up-to-date with the latest releases. Throughout this document, we assume the following:
An Oracle E-Business Suite maintenance level at the Error Correction Baseline or later. For more information, see My Oracle Support article PALRT2871, Alert: Oracle E-Business Suite Release 12.2 End of Error Correction Support for Oracle Database 12c Release 12.1.0.2 and 11g Release 11.2.0.4.
The latest versions of the Oracle E-Business Suite code for AD (administration) and TXK (configuration management) are also expected to properly administer and configure Oracle E-Business Suite Release 12.2 per the recommendations in this guide. For more information, see My Oracle Support article KA1264, Oracle E-Business Suite Release 12.2 Technology Stack Documentation Roadmap.
You must regularly review CPUs and Security Alerts. The primary program for the release of security fixes for Oracle E-Business Suite is the Critical Patch Update (CPU) program. CPUs are released on a quarterly basis. Security Alerts are released on an as-needed basis. Oracle always recommends applying all fixes for Critical Patch Update security patches and Security Alerts without delay.
Note: This configuration is checked by the Secure Configuration Console based upon recommended security guidelines. For more information, see the details for the check "Oracle E-Business Suite CPU Patch Level is the Expected Level or Later". For an overview of all security features that are checked by the console, see Checked Security Guidelines.
For Oracle E-Business Suite Release 12.2, refer to:
Oracle Critical Patch Updates, Security Alerts and Third Party Bulletin Page on Oracle Technology Network for the latest Critical Patch Updates and Security Alerts
My Oracle Support article KA923, Identifying the Latest Critical Patch Update for Oracle E-Business Suite Release 12.2 for the latest Oracel E-Business Suite Release 12.2 CPU
For Oracle E-Business Suite Release 12.1.3 and 11i customers that have a Market Driven Support (MDS) contract, refer to the appropriate My Oracle Support article:
My Oracle Support article PNEWS2596, ANNOUNCEMENT: Additional Coverage Options for 12.1.3 E-Business Suite Sustaining Support
My Oracle Support article KB624725, ANNOUNCEMENT: Additional Coverage Options for 11.5.10 E-Business Suite Sustaining Support
Oracle E-Business Suite secure configuration deployment guidelines include the following:
Use separate network subnets.
Deploy Oracle E-Business Suite application tier nodes in one subnet and the Oracle E-Business Suite database tier nodes in a separate subnet. Using separate subnets creates greater security for your Oracle E-Business Suite environment.
Use firewalls.
Keep both the Oracle E-Business Suite application tier and database tier behind a firewall. In addition, place a firewall between the application tier and database tier.
The firewalls provide assurance that access to these systems is restricted to a known network route, which can be monitored and further restricted, if necessary. As an alternative, a firewall router substitutes for multiple, independent firewalls.
Use demilitarized zones (DMZ).
Follow the DMZ guidelines when exposing Oracle E-Business Suite to the internet. For more information, see My Oracle Support article KA1036, Oracle E-Business Suite Release 12.2 Configuration in a DMZ.
The principle of least privilege states that users should be given the least amount of privilege to perform their jobs. Over ambitious granting of responsibilities, roles, grants, etc., especially early on in an organization's life cycle when people are few and work needs to be done quickly, often leaves a system wide open for abuse. User privileges should be reviewed periodically to determine relevance to current job responsibilities.
System security is built on three key pillars: robust security protocols, proper system configuration, and ongoing system monitoring. Auditing and regular review of audit records are essential to effective monitoring. Each system component offers varying levels of monitoring features. To support strong security, follow the auditing recommendations in this guide and consistently review your audit records. For more information, see Guidelines for Auditing and Logging.
Oracle is committed to ongoing enhancements of its software and documentation. Designated individuals or teams within your organization should regularly review the following resources:
This guide (Oracle E-Business Suite Security Guide)
My Oracle Support article KA1033, FAQ: Oracle E-Business Suite Security
Oracle continually improves its software and documentation. Check this document regularly for revisions.
Oracle's Critical Patch Updates, security alerts, and bulletins are summarized at the following URL: https://www.oracle.com/security-alerts/.