4 Appendix Secure Deployment Checklist
This appendix lists actions that need to be performed to create a secure system. The following is an example:
The following security checklist includes guidelines that help
secure your database:
-
Install only what is required.
-
Lock and expire default user accounts.
-
Enforce password management.
-
Practice the principle of least privilege.
-
Grant necessary privileges only.
-
Revoke unnecessary privileges from the PUBLIC user group.
-
Restrict permissions on run-time facilities.
-
-
Restrict network access.
-
Apply all security patches and workarounds.
-
Use a firewall.
-
Never poke a hole through a firewall.
-
Protect the Oracle listener.
-
Monitor listener activity.
-
Monitor who accesses your systems.
-
Check network IP addresses.
-