4 Keeping Oracle Database Appliance Secure
Use the policies and procedures described in this chapter to keep Oracle Database Appliance secure.
Topics:
- Securing the Hardware
Oracle recommends that you implement the security policies described here to restrict access to the hardware. - Securing the Software
Review and implement security features and policies for your appliance software. - Configuring a Third-Party Certificate for Oracle Database Appliance
The Browser User Interface and DCS Controller use SSL-based HTTPS protocol for secure communication. Understand the implications of this added security and the options to configure SSL certificates. - Maintaining a Secure Environment
After you implement security policies and methods on your appliance, review these topics to understand how to maintain a secure environment.
Securing the Hardware
Oracle recommends that you implement the security policies described here to restrict access to the hardware.
After installation of Oracle Database Appliance, secure the hardware.
Hardware Security Methods and Procedures
-
Install Oracle Database Appliance and related equipment in a locked, restricted-access room.
-
Restrict access to hot-pluggable or hot-swappable devices because the components can be easily removed by design.
-
Limit SSH listener ports to the management and private networks.
-
Limit allowed SSH authentication mechanisms. By default, inherently insecure SSH authentication methods are disabled.
-
Mark all significant items of computer hardware, such as FRUs.
-
Record the serial numbers of the components of Oracle Database Appliance, and keep a record in a secure place. All components of Oracle Database Appliance have a serial number.
Parent topic: Keeping Oracle Database Appliance Secure
Securing the Software
Review and implement security features and policies for your appliance software.
Oracle Database Appliance Operating System and Server Security Policies
-
Change all default passwords when the system is installed at the site.
Oracle Database Appliance uses default passwords for initial installation and deployment that are widely known. A default password that is still in effect could allow unauthorized access to the equipment. Devices such as the network switches have multiple user accounts. Be sure to change all account passwords on the components in the rack.
-
Create and use Oracle Integrated Lights Out Manager (ILOM) user accounts for individual users
Using ILOM user accounts ensures a positive identification in audit trails, and results in less maintenance when administrators leave the team or company.
-
Restrict physical access to USB ports, network ports, and system consoles.
Servers and network switches have ports and console connections, which provide direct access to the system.
-
Restrict the capability to restart the system over the network.
-
Enable available database security features, as described in Oracle Database Security Guide.
Oracle Database Security Features
Oracle Database Appliance can leverage all the security features available with Oracle Databases installed on legacy platforms. Oracle Database security products and features include the following:
-
Oracle Advanced Security
-
Data Masking
-
Oracle Database Firewall
-
Oracle Database Vault
-
Oracle Label Security
-
Oracle Secure Backup
-
Oracle Total Recall
- Oracle Audit Vault. Note that Oracle Audit Vault may not be configured to run on Oracle Database Appliance directly. Instead, Oracle Database Appliance may be configured to use an instance of Oracle Audit Vault that runs on a separate server.
Using the Oracle privileged user and multi-factor access control, data classification, transparent data encryption, auditing, monitoring, and data masking, customers can deploy reliable data security solutions that do not require any changes to existing applications.
Oracle Database Appliance supports creation of TDE-enabled databases, with TDE keys stored on Oracle Database Appliance or on Oracle Key Vault. For more information, see the topic About Transparent Database Encryption (TDE) in Oracle Database Appliance in the Oracle Database Appliance Deployment and User’s Guide for your hardware model.
Parent topic: Keeping Oracle Database Appliance Secure
Configuring a Third-Party Certificate for Oracle Database Appliance
The Browser User Interface and DCS Controller use SSL-based HTTPS protocol for secure communication. Understand the implications of this added security and the options to configure SSL certificates.
The Browser User Interface provides an added layer of security using certificates and encryption, when an administrator interacts with the appliance. The use of certificates and encryption ensures that:
- Data is sent to the intended recipient, and not to any malicious third-party.
- When data is exchanged between the server and the browser, data interception cannot occur nor can the data be edited.
When you connect to the Browser User Interface through HTTPS, the DCS Controller presents your browser with a certificate to verify the identity of appliance. If the web browser finds that the certificate is not from a trusted Certificate Authority (CA), then the browser assumes it has encountered an untrusted source, and generates a security alert message. The security alert dialog boxes display because Browser User Interface security is enabled through HTTPS and SSL, but you have not secured your Web tier properly with a trusted matching certificate from a Certificate Authority. To avoid this warning, you can purchase a trusted certificate from a Certificate Authority.
To configure your certificate, create your own key and Java keystore, ensure it is signed by a Certificate Authority (CA) and then import it for use.
Note:
For Oracle Database Appliance High-Availability hardware models, run the configuration steps on both nodes.- Creating a Key and Java Keystore and Importing a Trusted Certificate
Usekeytool
, a key and certificate management utility, to create a keystore and a signing request. - Configuring the DCS Server to Use Custom Keystore
After packaging or converting your keystore into Java keystore, configure the DCS server to use your keystore. - Configuring the DCS Agent To Use a Custom Certificate
After you import the certificate into the keystore, configure the DCS agent to use the same certificate.
Parent topic: Keeping Oracle Database Appliance Secure
Creating a Key and Java Keystore and Importing a Trusted Certificate
Use keytool
, a key and certificate management utility, to
create a keystore and a signing request.
Configuring the DCS Server to Use Custom Keystore
After packaging or converting your keystore into Java keystore, configure the DCS server to use your keystore.
Maintaining a Secure Environment
After you implement security policies and methods on your appliance, review these topics to understand how to maintain a secure environment.
Topics:
- About Secure Environments
Oracle recommends that you review and update your operational and administrative access policies regularly to maintain a secure environment. - Maintaining Network Security
After the networks are configured based on the security guidelines, carry out regular review and maintenance to ensure that secure host and ILOM settings remain intact and in effect. - Updating Software and Firmware
Oracle regularly introduces security enhancements in new releases and patch sets. - Ensuring Data Security Outside of Oracle Database Appliance
Follow security practices when you back up your data to external storage.
Parent topic: Keeping Oracle Database Appliance Secure
About Secure Environments
Oracle recommends that you review and update your operational and administrative access policies regularly to maintain a secure environment.
After you implement security policies and features for your system, Oracle recommends that your organization establishes a security review policy. As part of your security policy, periodically update and review your software, hardware, and user access.
For example, check all users and administrators granted access to Oracle Database Appliance, and to its deployed services. Verify if the levels of access and privilege that you have granted to users and administrators remains appropriate.
Without regular security reviews, the level of access granted to individuals could increase unintentionally, due to role changes, or due to changes to default settings. Oracle recommends that you review access rights for operational and administrative tasks regularly. Regular reviews can help to ensure that user level of access remains aligned to the roles and responsibilities for each user.
Parent topic: Maintaining a Secure Environment
Maintaining Network Security
After the networks are configured based on the security guidelines, carry out regular review and maintenance to ensure that secure host and ILOM settings remain intact and in effect.
Follow these guidelines to ensure the security of local and remote access to the system:
-
Manage the management network switch configuration file offline, and limit access to the file to only authorized administrators.
-
Add descriptive comments for each setting in the configuration file. Consider keeping a static copy of the configuration file in a source code control system.
-
Use access control lists to apply restrictions where appropriate.
-
Set time-outs for extended sessions and set privilege levels.
-
Use authentication, authorization, and accounting (AAA) features for local and remote access to a switch.
-
Use the port mirroring capability of the switch for intrusion detection system (IDS) access.
-
Implement port security to limit access based upon a MAC address. Disable auto-trunking on all ports for any switch connected to Oracle Database Appliance.
-
Limit remote configuration to specific IP addresses using SSH.
-
Require users to use strong passwords by setting minimum password complexity rules and password expiration policies.
-
Enable logging and send logs to a dedicated secure log host.
-
Configure logging to include accurate time information, using NTP and timestamps.
-
Review logs for possible incidents and archive them in accordance with the organization's security policy.
Parent topic: Maintaining a Secure Environment
Updating Software and Firmware
Oracle regularly introduces security enhancements in new releases and patch sets.
Effective proactive patch management is a critical part of system security. Oracle recommends that you install the latest release of the software, and install all necessary security patches on the equipment.
To establish baseline security, Oracle recommends that you apply only Oracle-recommended software and security patches
Parent topic: Maintaining a Secure Environment
Ensuring Data Security Outside of Oracle Database Appliance
Follow security practices when you back up your data to external storage.
Ensure that you back up your data to external storage. Oracle recommends that you store backups in an off-site, secure location. Retain the backups according to your organizational policies and requirements.
When you dispose of old disk drives, physically destroy the drive, or completely erase all the data on the drive. Deleting the files or reformatting the disk drive removes only the address tables on the drive. The information can still be recovered from a disk drive after deleting files or reformatting the drive. If you want to retain replaced disk drives and flash drives, instead of returning them to Oracle, then you can use the Oracle Database Appliance disk retention support option.
Parent topic: Maintaining a Secure Environment