The security of your Oracle Big Data Discovery (BDD) installation
is highly important. Lapses in security can leave your system, your data, and
your users vulnerable to exploitation and attack. Fortunately, there are a
number of ways you can keep your installation safe using BDD's own security
features as well as third party products.
This guide describes the supported methods for keeping your BDD
installation and data safe, including:
- Securing BDD through your
operating system. There are many ways to keep BDD safe at the operating
system (OS) level, like using file permissions to control access to BDD's
binaries and administration scripts. For more information, see
Operating System Level Security.
- Maintaining network
security. Firewalls, reverse proxy servers, and Kerberos can all be used to
protect BDD communications. Additionally, WebLogic Server and Jetty, which host
some of the BDD components, offer security options of their own. For more
information, see
Network Security.
- Managing access to your
data. BDD includes features for controlling what data is available to the
application and which users have access to it. For more information, see
Data Set Security.
- Controlling access to
Studio. Studio's built-in user management tools let you set access
permissions for individual users and groups of users. You can also configure
user authentication within Studio itself, or through an existing LDAP or SSO
system. For more information, see
Studio User Access.
These options can be used in conjunction with your site's own security
policies to keep your system safe. Additionally, if you're responsible for
security at your site, you should register your BDD installation with
My Oracle Support and visit the
Critical Patch Updates and Security Alerts
page.