Security Checklist for Server Deployment

To determine which Oracle ILOM security practices might be best when planning the deployment of a new server, system administrators should consult the list of security tasks recommended in the following Table 3-1.

Table 3-1 Checklist - Configuring Oracle ILOM Security at Server Deployment

Security Task Applicable Firmware Version(s) For details, see:

_

Establish a secure dedicated management connection to Oracle ILOM.

All firmware versions

_

Decide whether FIPS 140-2 security compliance is required at or after deployment; or, not at all.

Firmware versions 3.2.4 and later

_

Set Password Policy for All Local User Accounts

Firmware version 3.2.5 and later

_

Modify the default password provided for the preconfigured Administrator root account.

All firmware versions

_

Decide whether the preconfigured Oracle ILOM services and their open network ports are applicable for your target environment.

All firmware versions

_

Configure user access to Oracle ILOM.

All firmware versions

_

Decide whether access to the host operating system should be locked upon exiting a remote KVMS session.

Firmware versions 3.0.4 and later

_

Decide whether to limit other SP users from viewing remote KVMS sessions launched from the SP.

Firmware versions 3.2.4 and later

_

_

Decide whether to display a security banner message at user login or immediately following user login.

Firmware versions 3.0.8 and later

_

Ensure that the proper security properties are set for all Oracle ILOM user interfaces.

All firmware versions

_

For ASR Client configurations, choose to keep the preinstalled SSL Certificate or upload a user-specified SSL Certificate.

Firmware versions 4.0.x and later.

_

Ensure that the servicetagprotocol is properly configured to use HTTPS and a passphrase.

Firmware versions 4.0.x and later.