The software described in this documentation is either in Extended Support or Sustaining Support. See https://www.oracle.com/us/support/library/enterprise-linux-support-policies-069172.pdf for more information.
Oracle recommends that you upgrade the software described by this documentation as soon as possible.

Chapter 7 Security

For data centers hosting enterprise applications, security is of utmost importance. In most enterprises, security is considered one of the prime factors for making platform decisions. To build a secure environment, rather than looking at security as set of commands and features available in operating systems, it is necessary that the security features be designed into the core of an operating system. Oracle Linux provides enterprise-class features that you can depend on to protect your applications by combining multiple security technologies to process and user rights as well as unmatched monitoring and auditing capabilities.

Regardless of the hosting operating system, security administrators follow simple rules to build a secure system:

  • Ensure physical security

  • Deploy stringent access controls

  • Simplify administration

  • Delegate appropriate (minimal) privileges

  • Do minimal installs

  • Ensure strong defenses

This chapter discusses some of these aspects of ensuring system security in more detail.