Most hardware security is implemented through software measures.
Change all default passwords when installing a new system. Most types of equipment use default passwords, such as changeme, that are widely known and would allow unauthorized access to the equipment.
Change every password on network switches which might have multiple user accounts and passwords by default.
Limit the use of the default Administrator account (root) to a single administrator user. Always create a new Oracle ILOM account for each new user. Ensure that a unique password and a proper level of authorization privileges (operator, administrator, and so on) always are assigned to each Oracle ILOM user account.
Use a dedicated network for service processors to separate them from the general network.
Protect access to USB consoles. Devices such as system controllers, power distribution units (PDUs), and network switches can have USB connections, which can provide more powerful access than SSH connections.
Refer to the documentation that came with your software to enable any security features available for the software.
Implement port security to limit access based upon MAC addresses. Disable autotrunking on all ports.