Basic Security Considerations

The following principles are fundamental to using any hardware or software securely:

  • Keep software up to date. This includes software and drivers specific to the product as well as the latest patches available from 3rd party vendors.

  • Limit account privileges as much as possible. Users should only be given the access necessary to perform their work. User privileges should be reviewed periodically to determine relevance to current work requirements.

  • Install software securely. For example, use firewalls, secure protocols using TLS (SSL), and secure passwords. See Performing a Secure Workstation 8 Series Installation for more information.

  • Monitor system activity. Establish who should access which system components, and how often, and monitor those components.

  • Learn about and use the Workstation 8 Series security features. See Implementing Workstation 8 Series Security for more information.

  • Use secure development practices. For example, take advantage of existing database security functionality instead of creating your own application security.

  • Keep up to date on security information. Oracle regularly issues security-related patch updates and security alerts. You must install all security patches as soon as possible. See the Oracle Critical Patch Updates and Security Alerts web site: http://www.oracle.com/technetwork/topics/security/alerts-086861.html