9 Security Information

This chapter includes important information regarding some security aspects of this environment and its configuration. Although various security considerations were taken into account when this environment was created, it is important that a thorough security review be completed before using this environment in production.

Default Settings

All installations/configurations include default settings unless noted otherwise. Any dependencies required by the included software for installation have also been installed. Be sure to check the various component configuration settings to ensure they are using the most secure values.

Securing the Software

Although some patches may be pre-installed, other software updates may be available since this image was created. It is very important that all the installed software be updated with the latest security patches available. It is recommended that the latest Database, Fusion Middleware, and operating system updates be applied before exposing this system to production users and/or sensitive data. Not taking this precaution could put your environment in risk of a security breach.

For information on the latest security updates available for Oracle software, refer to the Oracle Critical Patch Updates, Security Alerts and Bulletins web page.

SSL/TLS

When installed, the local Oracle Database and Fusion Middleware installations include a "demo" SSL/TLS certificate. This certificate should be replaced with an appropriate and current certificate. The provided demo certificate is not intended or supported for any other purpose beyond demonstrating how to configure and use SSL/TLS.

For more information about Oracle Fusion Middleware security, refer to the documentation available from the Secure the Environment page of the Oracle Fusion Middleware site.

Listener Ports

Most inbound ports are blocked by the Linux firewall. However, several ports have been opened in order to make the Fusion Middleware software easier to use. If having these ports accessible by other nodes is not desirable, the firewall settings can be changed in order to block them. The firewall-cmd command can be used to make the needed changes. Refer to the Oracle Linux Security Guide for more information.

For a list of TCP ports opened as part of the Fusion Middleware software installed in this instance, refer to Server Information.

VNC

Tiger VNC has been installed and configured to start automatically and to provide access to the Desktop as the "oracle" user.

Tunneling through an SSH connection is recommended to access using VNC. Opening the VNC ports to the public Internet is not recommended.

Refer to Troubleshooting Instances Using Instance Console Connections in the Oracle Cloud Infrastructure Documentation.