Table of Contents Table of Contents Title and Copyright Information Preface Audience Documentation Accessibility Related Documents Conventions 1 Overview of Oracle Database Appliance Security Basic Security Principles Survivability of Mission-Critical Workloads Defense in Depth to Secure the Operating Environment Least Privilege for Services and Users Accountability of Events and Actions 2 Security Features of Oracle Database Appliance About Oracle Database Appliance Security Features Using Isolation Policies Isolating Network Traffic Isolating Databases Controlling Access to Data Controlling Network Access Controlling Database Access About Managing Privileges and Security with SUDO Configuring a SUDO Security Policy for the DCS Stack Configuring a SUDO Security Policy for the OAK Stack Using Cryptographic Services Monitoring and Auditing of Oracle Database Appliance Using Oracle ILOM for Secure Management 3 Planning a Secure Environment Considerations for a Secure Environment Understanding User Accounts Understanding the Default Security Settings 4 Keeping Oracle Database Appliance Secure Securing the Hardware Securing the Software Maintaining a Secure Environment About Secure Environments Maintaining Network Security Updating Software and Firmware Ensuring Data Security Outside of Oracle Database Appliance Index