4 Keeping the Oracle Exadata Secure
This chapter describes policies and procedures to keep Oracle Exadata secure.
- Securing the Hardware
After installation of Oracle Exadata Database Machine, the hardware should be secured. - Securing the Software
Frequently, hardware security is implemented through software measures. - Disabling SSH on Storage Servers
If required, you can lock the storage servers to block SSH access. By default, SSH is enabled on storage servers. - Configuring Data Security for Exadata Storage Servers
Data security for Oracle Exadata Storage Servers is implemented by controlling which Oracle Automatic Storage Management (Oracle ASM) clusters and Oracle Database clients can access specific grid disks on storage cells. - Maintaining a Secure Environment
After security measures are implemented, they must be maintained to keep the system secure.