Oracle Hardening - OracleConnections2024-03-28T23:51:21Zhttp://www.oracleconnections.com/forum/topics/oracle-hardening?commentId=6612035%3AComment%3A6837&x=1&feed=yes&xn_auth=noAgain, that's not particularl…tag:www.oracleconnections.com,2013-05-31:6612035:Comment:68372013-05-31T06:16:11.126ZIssac Haycrafthttp://www.oracleconnections.com/profile/IssacHaycraft
<p>Again, that's not particularly specific. A checklist for securing your operating system would necessarily require that you tell us what operating system you're using. You haven't specified that. It would depend on the standards you are trying to meet, etc. There are dozens of ways to implement "user management". It's impossible to even contemplate a checklist without understanding how you are doing it. And that, in turn, will depend on the requirements you have.</p>
<p>There is a ton of…</p>
<p>Again, that's not particularly specific. A checklist for securing your operating system would necessarily require that you tell us what operating system you're using. You haven't specified that. It would depend on the standards you are trying to meet, etc. There are dozens of ways to implement "user management". It's impossible to even contemplate a checklist without understanding how you are doing it. And that, in turn, will depend on the requirements you have.</p>
<p>There is a ton of information in the Oracle documentation. There is a ton of information on various web sites-- Pete Finnigan's would be a good place to start</p>
<p><a href="http://www.petefinnigan.com/" target="_blank">http://www.petefinnigan.com/</a></p> Your question isn't particula…tag:www.oracleconnections.com,2013-05-31:6612035:Comment:68332013-05-31T05:59:56.093ZFelix Morethttp://www.oracleconnections.com/profile/FelixMoret
<p><em>Your question isn't particularly clear.</em></p>
<p><em>What, precisely, are you trying to do? Anything you do that improves security can be considered "hardening".</em></p>
<p>==> This is to improve the basic security to prevent user intrusion.</p>
<p><em>Have you read through the Oracle Security guide for each version of Oracle? That would be the place to start.</em></p>
<p>==> I have started looking into it.</p>
<p><em>Are you trying to meet a particular security standard? If…</em></p>
<p><em>Your question isn't particularly clear.</em></p>
<p><em>What, precisely, are you trying to do? Anything you do that improves security can be considered "hardening".</em></p>
<p>==> This is to improve the basic security to prevent user intrusion.</p>
<p><em>Have you read through the Oracle Security guide for each version of Oracle? That would be the place to start.</em></p>
<p>==> I have started looking into it.</p>
<p><em>Are you trying to meet a particular security standard? If so, what standard?</em></p>
<p>==> This need to very high standards such as FIPS</p>
<p><em>Are you trying to implement a particular bit of functionality? If so, what functionality?</em></p>
<p>I am looking at increasing the security standards for below:</p>
<p>- User Management<br/> - Installation<br/> - OS<br/> - Config Level (init.ora)</p>
<p>Help me if you already have any document which has the check list.</p> Your question isn't particula…tag:www.oracleconnections.com,2013-05-31:6612035:Comment:68302013-05-31T05:54:24.542ZIssac Haycrafthttp://www.oracleconnections.com/profile/IssacHaycraft
<p>Your question isn't particularly clear. What, precisely, are you trying to do? Anything you do that improves security can be considered "hardening".</p>
<p>Have you read through the Oracle Security guide for each version of Oracle? That would be the place to start.<br/> Are you trying to meet a particular security standard? If so, what standard?<br/> Are you trying to implement a particular bit of functionality? If so, what functionality?</p>
<p>Your question isn't particularly clear. What, precisely, are you trying to do? Anything you do that improves security can be considered "hardening".</p>
<p>Have you read through the Oracle Security guide for each version of Oracle? That would be the place to start.<br/> Are you trying to meet a particular security standard? If so, what standard?<br/> Are you trying to implement a particular bit of functionality? If so, what functionality?</p>