Accessing Oracle SuperCluster T5-8 Security Resources
Security Information for SuperCluster Components
Understanding Oracle SuperCluster T5-8 Security Guidelines
Understanding Hardware Security Guidelines
Network Security Considerations
Understanding Oracle SuperCluster T5-8 Security Settings and Services
Changing Passwords on Default User Accounts
Change Passwords on Default Accounts
Default User Accounts and Passwords
Change the Exadata Storage Server Passwords
Change the Ethernet Switch Password
Default TCP/IP Ports and Services
Keeping Oracle SuperCluster T5-8 Secure
Managing SuperCluster Security
Oracle ILOM for Secure Management
Oracle Identity Management Suite
Oracle Enterprise Manager Ops Center (Optional)
Workload Monitoring and Auditing
Database Activity Monitoring and Auditing
Install Oracle SuperCluster T5-8 and related equipment in a locked, restricted-access room.
Lock the rack doors unless service is required on components within the rack. Doing so restricts access to hot-pluggable or hot-swappable devices, and to USB ports, network ports, and system consoles.
Store spare field-replaceable units (FRUs) or customer-replaceable units (CRUs) in a locked cabinet. Restrict access to the locked cabinet to authorized personnel.
Periodically verify the status and integrity of the locks on the rack and the spares cabinet to guard against, or detect, tampering or doors being accidentally left unlocked.
Store cabinet keys in a secure location with limited access.
Restrict access to USB consoles. Devices such as system controllers, power distribution units (PDUs), and network switches can have USB connections. Restricting physical access is a more secure method of accessing a component since it is not susceptible to network-based attacks.