The following security checklist is included to guide you on how to secure your database:
Install only what is required.
Lock and expire default user accounts.
Enforce password management.
Enable data dictionary protection.
Practice the principle of least privilege.
Grant necessary privileges only.
Revoke unnecessary privileges from the PUBLIC user group.
Restrict permissions on run-time facilities.
Enforce access controls effectively and authenticate clients stringently.
Restrict network access.
Apply all security patches and workarounds.
Use a firewall.
Never poke a hole through a firewall.
Protect the Oracle listener.
Monitor listener activity.
Monitor who accesses your systems.
Check network IP addresses.
Encrypt network traffic.
Harden the operating system.