4 Appendix Secure Deployment Checklist

This appendix lists actions that need to be performed to create a secure system. The following is an example:

The following security checklist includes guidelines that help secure your database:
  • Install only what is required.

  • Lock and expire default user accounts.

  • Enforce password management.

  • Practice the principle of least privilege.
    • Grant necessary privileges only.

    • Revoke unnecessary privileges from the PUBLIC user group.

    • Restrict permissions on run-time facilities.

  • Restrict network access.

  • Apply all security patches and workarounds.
    • Use a firewall.

    • Never poke a hole through a firewall.

    • Protect the Oracle listener.

    • Monitor listener activity.

    • Monitor who accesses your systems.

    • Check network IP addresses.