This appendix contains the topic:
The following security checklist includes guidelines that help secure your database:
Install only what is required.
Disable default user accounts.
Enforce password management.
Enable data dictionary protection.
Practice the principle of least privilege.
Grant necessary privileges only.
Revoke unnecessary privileges from the *PUBLIC user group.
Restrict permissions on run-time facilities.
Enforce access controls effectively and authenticate clients stringently.
Restrict network access.
Use a firewall.
Never poke a hole through a firewall.
Monitor who accesses your systems.
Check network IP addresses.
Encrypt network traffic.
Harden the operating system.