Accessing Oracle SuperCluster T5-8 Security Resources
Security Information for SuperCluster Components
Understanding Oracle SuperCluster T5-8 Security Guidelines
Understanding Hardware Security Guidelines
Network Security Considerations
Understanding Oracle SuperCluster T5-8 Security Settings and Services
Changing Passwords on Default User Accounts
Change Passwords on Default Accounts
Default User Accounts and Passwords
Change the Exadata Storage Server Passwords
Change the Ethernet Switch Password
Default TCP/IP Ports and Services
Keeping Oracle SuperCluster T5-8 Secure
Managing SuperCluster Security
Oracle ILOM for Secure Management
Oracle Identity Management Suite
Oracle Enterprise Manager Ops Center (Optional)
Database Activity Monitoring and Auditing
The Oracle Solaris OS has a comprehensive auditing facility that can monitor administrative actions, command-line invocations, and even individual kernel-level system calls. This facility is highly configurable, offering a global, per-zone, and even per-user auditing policies.
When the system is configured to use Oracle Solaris Zones, audit records for each zone can be stored in the global zone to protect them from tampering.
Oracle Solaris auditing provides the ability to send audit records to remote collection points using the system log (syslog) facility. Many commercial intrusion detection and prevention services can use Oracle Solaris audit records as an additional input for analysis and reporting.
Oracle VM Server for SPARC leverages the native Oracle Solaris auditing facility to record actions and events associated with virtualization events and domain administration.
For more information, refer to the Monitoring and Maintaining Oracle Solaris Security section in the Oracle Solaris Security Guidelines at: http://docs.oracle.com/cd/E26502_01