Table of Contents
This chapter describes the main security mechanisms offered by Oracle VM. Its users are administrators, who rely on Oracle VM Manager and the CLI to configure and maintain the physical and virtual environment. The essential elements that define the level of security in Oracle VM, are:
installation into a default, secure state, as described in Chapter 2, Performing a Secure Oracle VM Installation
strict control of administrative privileges
network segregation and host isolation to prevent exposure of all but the required services
separate end user access to virtual machines, and isolation of virtual machines from the underlying Oracle VM infrastructure
Oracle VM itself does not provide role based access control. If your environment requires it, use Oracle Enterprise Manager to manage your environment and all access to its physical and virtual resources.