A Secure Deployment Checklist
The following security checklist lists guidelines to help you secure Oracle Application Integration Architecture (Oracle AIA) and its components.
-
Configure and deploy only the pre-built integration options you need.
-
Enforce strong password management.
-
Restrict and control user privileges.
-
Restrict network access by doing the following:
-
Use firewalls.
-
Never leave an unnecessary opening in a firewall.
-
Monitor who accesses your systems.
-
Because network traffic is not encrypted, you must physically secure the JDBC network connection between the application server to the database by using a subnet dedicated to this communication and ensure that the network is not accessible to ordinary users.
-
Install the operating system in a secure location that is difficult for a hacker to access.
-
-
Apply all security patches and workarounds.
-
Encrypt sensitive information.
-
Contact Oracle support if you discover a vulnerability in any Oracle product.