A ASAP Secure Deployment Checklist
The following security checklist lists guidelines to help you secure Oracle Communications ASAP and its components.
Secure Deployment Checklist
- 
                        Install only the components you require. 
- 
                        Lock and expire default user accounts. 
- 
                        Enforce strong password management. 
- 
                        Restrict, control, and revisit user privileges: - 
                              Grant only the necessary privileges to each user. 
- 
                              Revoke unnecessary privileges from the PUBLIC user group. 
- 
                              Restrict permissions on run-time facilities 
 
- 
                              
- 
                        Enforce the use of access controls. 
- 
                        Require clients to authenticate. 
- 
                        Restrict network access by doing the following: - 
                              Use firewalls. 
- 
                              Never leave an unnecessary hole in a firewall. 
- 
                              Password-protect the Oracle listener against remote access. 
- 
                              Monitor listener activity. 
- 
                              Monitor who accesses your systems. 
- 
                              Restrict system access by IP addresses. 
- 
                              Encrypt network traffic. 
- 
                              Harden the operating system by installing it in a secure location where it would be difficult for a hacker to access, by ensuring that all null passwords have been changed, and by disabling remote root login. 
 
- 
                              
- 
                        Apply all security patches and workarounds. 
- 
                        Encrypt sensitive information. 
- 
                        Contact Oracle Security Products if you discover a vulnerability in any Oracle product.