The main aspects to STA security are: physical, network, user access, and server access.
STA must be installed on a standalone server within an organization's data center. Physical access to the server would be dictated by the customer company policy.
It is required that STA be added or configured to a customer internal firewall-protected network. This network needs SSH and SNMPv3 access to libraries for which data will be accessed.
To use the user interface, you need HTTPS access.
To enable optional log bundle forwarding to StorageTek Service Delivery Platform (SDP), a connection to the SDP host is also required within the customer internal firewall-protected network.
The STA application access is controlled by user name and password authentication. User names and passwords are set up during initial installation by the customer. Passwords must meet Oracle standard requirements.
STA requires an OS level Oracle user for installation and runtime access.
You should limit the access to the server, especially super users (root), which could affect the STA application, functionality, and services.