5 Appendix B – Secure Deployment Checklist
The following security checklist is included to guide you on how to secure your database:
-
Install only what is required.
-
Lock and expire default user accounts.
-
Enforce password management.
-
Enable data dictionary protection.
-
Practice the principle of least privilege.
-
Grant necessary privileges only.
-
Revoke unnecessary privileges from the PUBLIC user group.
-
Restrict permissions on run-time facilities.
-
Enforce access controls effectively and authenticate clients stringently.
-
Restrict network access.
-
Apply all security patches and workarounds.
-
Use a firewall.
-
Never poke a hole through a firewall.
-
Protect the Oracle listener.
-
Monitor listener activity.
-
Monitor who accesses your systems.
-
Check network IP addresses.
-
Encrypt network traffic.
-
Harden the operating system.