A Secure Deployment Checklist

The following security checklist contains guidelines to help you secure the Oracle Communications Solution Test Automation Platform (STAP) and its components.

  • Configure and deploy only the pre-built integration options you need.
  • Enforce strong password management.
  • Restrict and control user privileges.
  • Restrict network access by doing the following:
    • Use firewalls.
    • Never leave an unnecessary opening in a firewall.
    • Monitor who accesses your systems.
    • Secure the JDBC network connection between the application server and the database physically by using a subnet dedicated to this communication and ensure that the network is not accessible to ordinary users, because network traffic is not encrypted.
    • Install the operating system in a secure location that is difficult for a hacker to access.
    • Apply all security patches and workarounds.
    • Encrypt sensitive information.
    • Contact Oracle support if you discover a vulnerability in any Oracle product.