A Secure Deployment Checklist
The following security checklist contains guidelines to help you secure the Oracle Communications Solution Test Automation Platform (STAP) and its components.
- Configure and deploy only the pre-built integration options you need.
- Enforce strong password management.
- Restrict and control user privileges.
- Restrict network access by doing the following:
- Use firewalls.
- Never leave an unnecessary opening in a firewall.
- Monitor who accesses your systems.
- Secure the JDBC network connection between the application server and the database physically by using a subnet dedicated to this communication and ensure that the network is not accessible to ordinary users, because network traffic is not encrypted.
- Install the operating system in a secure location that is difficult for a hacker to access.
- Apply all security patches and workarounds.
- Encrypt sensitive information.
- Contact Oracle support if you discover a vulnerability in any Oracle product.