Reviewing Operating System Security Common Practices

Secure operating systems are an important basis for general system security.

Ensure that your operating system deployment is in compliance with common security practices as described in your operating system vendor security guide.

Ensure that you meet the hardware and software requirements so that you can use strong authentication (Kerberos, PKI) with Oracle Database.