After the initial installation and setup, use Oracle hardware and software security features to continue controlling hardware and software assets.
Use the information in these sections to maintain a secure environment.
Contact your IT Security Officer for additional security requirements that pertain to your system and specific environment.