General Aspects of Security
The main aspects to STA security are: physical, network, user access, and server access.
Physical
You must install STA on a standalone server. Your company's policy should dictate who has physical access to the server. For maximum security, the server should be in a physically secured data center, which also has a secured network that allows access only to authorized users.
Network
It is required that STA be added or configured to a customer internal firewall-protected network. This network needs SSH and SNMPv3 access to libraries for which data will be accessed.
To use the user interface, you need HTTPS access.
To enable optional log bundle forwarding to StorageTek Service Delivery Platform (SDP), a connection to the SDP host is also required within the customer internal firewall-protected network.
User Access
The STA application access is controlled by user name and password authentication. User names and passwords are set up during initial installation by the customer. Passwords must meet Oracle standard requirements.
Server Access
STA requires an OS level Oracle user for installation and run-time access.
You should limit the access to the server, especially super users (root), which could affect the STA application, functionality, and services.