A Secure Deployment Checklist

The following security checklist includes guidelines that help secure the library:

  1. Enforce password management.

  2. Enforce access controls.

  3. Restrict network access.

    1. A firewall should be implemented.

    2. The firewall must not be compromised.

    3. System access should be monitored.

    4. Network IP addresses should be checked.

  4. Contact Oracle Security Products if you come across vulnerabilities in VSM GUI.