Skip Headers
Oracle® Communications IP Service Activator Security Guide
Release 7.2

Go to Documentation Home
Go to Table of Contents
Go to Feedback page
Contact Us

Go to previous page
PDF · Mobi · ePub

A Secure Deployment Checklist

The following security checklist lists guidelines to help you secure Oracle Communications IP Service Activator and its components.

Secure Deployment Checklist

  • Install only the components you require.

  • Lock and expire default user accounts.

  • Enforce strong password management.

  • Restrict and control user privileges.

  • Restrict network access by doing the following:

    • Use firewalls.

    • Never leave an unnecessary hole in a firewall.

    • Password-protect the Oracle listener against remote access.

    • Monitor who accesses your systems.

    • Encrypt network traffic.

    • Harden the operating system by installing it in a secure location where it is difficult for a hacker to access.

  • Apply all security patches and workarounds.

  • Encrypt sensitive information.

  • Contact Oracle Security Products if you discover a vulnerability in any Oracle product.