A Secure Deployment Checklist
The following checklist provides guidelines to help you secure Oracle Communications Order and Service Management (OSM) and its components.
-
Install only the components you need.
-
Enforce strong password management.
-
Restrict and control user privileges.
-
Restrict network access by doing the following:
-
Use firewalls.
-
Never leave an unnecessary opening in a firewall.
-
Monitor who accesses your systems.
-
Encrypt network traffic.
-
Install the operating system in a secure location that is difficult for a hacker to access.
-
-
Apply all security patches and workarounds.
-
Encrypt sensitive information.
-
Contact Oracle support if you discover a vulnerability in any Oracle product.