Go to primary content
Agile Product Lifecycle Management Security Guide
Release 9.3.5
E52156-05
  Go To Table Of Contents
Contents

Previous
Previous
 
Next
Next
 

A Secure Deployment Checklist

Follow the secure deployment checklist provided for the Oracle Database Server, as defined in the Oracle Database Security Guide. Similarly, follow guidelines for deploying your Oracle WebLogic Server, as defined in the Oracle WebLogic Server documentation.

The following security checklist includes guidelines that help secure your Agile PLM application:

  1. Practice the principle of least privilege.

  2. Enforce access controls effectively and authenticate clients stringently.

  3. Restrict network access.

    a. Use a firewall.

    b. Never poke a hole through a firewall.

    c. Monitor who accesses your systems.

    d. Check network IP addresses.

    e. Encrypt network traffic.

    f. Harden the operating system.

  4. Apply all security patches and workarounds.

  5. Use strong passwords.

  6. Deploy WebLogic Server using SSL.

  7. Change the WebLogic administrator's username and password.

  8. Set up a proxy server.

  9. Contact the Oracle Security Support team if you come across any vulnerability in the Agile PLM application.