Secure Deployment Checklist
-
Install only the components you require.
-
Enable only the extensions and features you require.
-
Ensure that all default passwords have been changed.
-
Enforce user passwords to expire upon creation.
-
Enforce strong password management.
-
Ensure that users store their password securely, or not at all.
-
Ensure that users close all sessions and log out from the web browser after they are finished with their work.
-
Grant only the necessary privileges to each user.
-
Restrict network access by doing the following:
-
Use firewalls.
-
Ensure that the system is not reachable from the Internet.
-
Ensure that the system cannot reach the Internet nor resolve public DNS names.
-
Use network traffic encryption.
-
Never leave an unnecessary open ports in a firewall.
-
Harden the system by installing it in a secure location where it would be difficult for a hacker to access.
-
-
Apply all security patches and workarounds.
-
Contact Oracle Security Products if you discover vulnerability in any Oracle product.