Database Reference
In-Depth Information
System wide advice
Some advice applies to the entire E-Business deployment and the infrastructure in
which it operates.
Keep software up to date : One of the principles of good security practice
is to keep all software versions and patches up to date. For many reasons
including good security practice, move to the latest version of Autoconfig
and Patch Tools ( AD ).
Apply Critical Patch Updates ( CPUs ) as quickly as possible. These contain
fixes to high priority security vulnerabilities, and go through rigorous testing
before their release.
Restrict network access to critical services : Keep both the E-Business
application middle-tier and the database behind a firewall. In addition, place
a firewall between the middle-tier and the database. The firewalls provide
assurance that access to these systems is restricted to a known network route,
which can be monitored and restricted, if necessary.
Follow the principle of least privilege : The principal of least privilege states
that users should be given the least amount of privileges to perform their
jobs. Overambitious granting of responsibilities, roles, grants, and so on,
especially early on in an organization's life-cycle when people are few and
work needs to be done quickly, often leaves a system wide open for abuse.
User privileges should be reviewed periodically to determine relevance to
current job responsibilities.
Monitor system activity : System security stands on three legs that is, good
security protocols, proper system configuration, and system monitoring.
Auditing and reviewing audit records address the third requirement. Each
component within a system has some degree of monitoring capability.
Two ways to monitor the appropriateness of the system configuration and
any updates that Oracle recommends is using Applications Manager or the
Application Management Packs within Oracle Enterprise Manager.
 
Search WWH ::




Custom Search