Oracle Server x9 2l Security Guide
Oracle Server x9 2l Security Guide
F23501-02
June 2022
Oracle Server X9-2L Security Guide,
F23501-02
1 Basic Security
Access 1-1
Authentication 1-1
Authorization 1-2
Accounting and Auditing 1-2
iii
Using This Documentation
Feedback
Provide feedback about this documentation at https://www.oracle.com/goto/
docfeedback.
iv
1
Basic Security
This document provides general security guidelines to help you protect your Oracle server,
server network interfaces, and connected network switches. Contact your IT Security Officer
for additional security requirements that pertain to your system and specific environment.
There are basic security principles that you should adhere to when using all hardware and
software. This section covers the four basic security principles:
• Access
• Authentication
• Authorization
• Accounting and Auditing
Access
Access refers to physical access to hardware, or physical or virtual access to software.
• Use physical and software controls to protect your hardware and data from intrusion.
• Change all default passwords after installing a new system. Most types of equipment use
default passwords that are widely known and could allow unauthorized access to
hardware or software.
• Refer to the documentation that came with your software to enable the software security
features.
• Install servers and related equipment in a locked, restricted access room.
• If equipment is installed in a rack with a locking door, keep the door locked except when
you have to service components in the rack.
• Restrict access to USB ports and consoles. Devices with USB connections that can
provide direct access to the system include system controllers, power distribution units
(PDUs), and network switches.
• Restrict the capability to restart the system over the network.
• Restrict access to hot-plug or hot-swap devices because they can be easily removed.
• Store spare field-replaceable units (FRUs) and customer-replaceable units (CRUs) in a
locked cabinet. Restrict access to the locked cabinet to authorized personnel.
Authentication
Authentication is how a user is identified, typically through confidential information such as
user name and password. Authentication ensures that users of hardware or software are who
they say they are.
• Set up authentication features, such as a password system, in your platform operating
systems to ensure that users are who they say they are.
1-1
Chapter 1
Authorization
• For user accounts: use access control lists where appropriate; set time-outs for
extended sessions; set privilege levels for users.
• Ensure that your personnel use employee badges properly to enter the computer
room.
Authorization
Authorization allows administrators to control what tasks or privileges a user may
perform or use. Personnel can only perform the tasks and use the privileges that have
been assigned to them. Authorization places restrictions on personnel who work with
hardware or software.
• Allow personnel to work only with hardware and software that they are trained and
qualified to use.
• Set up a system of Read/Write/Execute permissions to control user access to
commands, disk space, devices, and applications.
1-2
2
Using Server Configuration and Management
Tools Securely
Follow the security guidelines in these sections when using software and firmware tools to
configure and manage your server:
• Oracle ILOM Security
• Oracle Hardware Management Pack Security
Contact your IT Security Officer for additional security requirements that pertain to your
system and specific environment.
2-1
Chapter 2
Oracle Hardware Management Pack Security
In addition, certain Oracle ILOM functions, such as password reset and the
Preboot menu, are only made available using the physical serial port. Connecting
the serial port to a network using an unauthenticated terminal server removes the
need for physical access, and lowers the security associated with these functions.
• Access to the Preboot menu requires physical access to the server.
The Oracle ILOM Preboot menu is a powerful utility that provides a way to reset
Oracle ILOM to default values, and to flash firmware if Oracle ILOM were to
become unresponsive. Once Oracle ILOM has been reset, a user is then required
to either press a button on the server (the default) or type a password. The Oracle
ILOM Physical Presence property controls this behavior
(check_physical_presence=true). For maximum security when accessing
the Preboot menu, do not change the default setting (true), so that access to the
Preboot menu always requires physical access to the server.
• Refer to the Oracle ILOM documentation.
Refer to Oracle ILOM documentation to learn more about setting up passwords,
managing users, and applying security-related features, including Secure Shell
(SSH), Secure Socket Layer (SSL), and RADIUS authentication. For security
guidelines that are specific to Oracle ILOM, refer to the Oracle ILOM Security
Guide, which is part of the Oracle ILOM documentation library. You can find the
Oracle ILOM documentation at: Servers Documentation - Systems Management
2-2
Chapter 2
Oracle Hardware Management Pack Security
2-3
3
Planning a Secure Environment
Security guidelines should be in place before the arrival of the system. After arrival, security
guidelines should be periodically reviewed and adjusted to stay current with the security
requirements of your organization.
Use the information in these sections before and during the installation and configuration of a
server and related equipment:
• Password Protection
• Operating System Security Guidelines
• Network Switches and Ports
• VLAN Security
• InfiniBand Security
Contact your IT Security Officer for additional security requirements that pertain to your
system and specific environment.
Password Protection
Passwords are an important aspect of security since poorly chosen passwords could result in
unauthorized access to company resources. Implementing password management best
practices ensures that users adhere to a set of guidelines for creating and protecting their
passwords. Typical components of a password policy should define:
• Password length and strength
• Password duration
• Common password practice
For details about minimum password requirements, go to the Oracle ILOM 5.1
documentation, and refer to "Managing Password Policy Restrictions for Local Users" in the
Oracle ILOM Administrator's Guide for Configuration and Maintenance Firmware Release
5.1.x. at Servers Documentation - Systems Management.
Enforce the following standard practices for creating strong, complex passwords:
• Do not create a password that contains the user name, employee name, or family names.
• Do not select passwords that are easy to guess.
• Do not create passwords that contain a consecutive string of numbers such as 12345.
• Do not create passwords that contain a word or string that is easily discovered by a
simple Internet search.
• Do not allow users to reuse the same password across multiple systems.
• Do not allow users to reuse previous passwords.
Change passwords on a regular basis. This helps to prevent malicious activity and ensures
that passwords adhere to current password policies.
3-1
Chapter 3
Operating System Security Guidelines
For information on operating systems from other vendors, such as Red Hat Enterprise
Linux, Microsoft Windows Server, and VMware ESXi, refer to the vendor’s
documentation.
3-2
Chapter 3
VLAN Security
– MAC Learning – Uses the knowledge about each switch port's direct connections so
that the network switch can set security based on current connections.
VLAN Security
Virtual local area networks (VLANs) share bandwidth on a network and require additional
security measures. For additional security measures, follow these guidelines:
• Separate sensitive clusters of systems from the rest of the network when using VLANs.
This decreases the likelihood that users will gain access to information on those clients
and servers.
• Assign a unique native VLAN number to trunk ports.
• Limit the VLANs that can be transported over a trunk to only those that are strictly
required.
• Disable VLAN Trunking Protocol (VTP), if possible. Otherwise, set the following for VTP:
management domain, password, and pruning. Then set VTP into transparent mode.
• Use static VLAN configurations, when possible.
• Disable unused switch ports and assign them an unused VLAN number.
InfiniBand Security
To increase security when InfiniBand is used, follow these guidelines:
• Keep InfiniBand hosts secure. An InfiniBand fabric is only as secure as its least secure
InfiniBand host.
• Note that partitioning does not protect an InfiniBand fabric. Partitioning only offers
InfiniBand traffic isolation between virtual machines on a host.
3-3
4
Maintaining a Secure Environment
After the initial installation and setup, use Oracle hardware and software security features to
continue controlling hardware and tracking system assets.
Use the information in these sections to maintain a secure environment:
• Power Control
• Asset Tracking
• Updates for Software and Firmware
• Network Security
• Data Protection and Security
• Log Maintenance
Contact your IT Security Officer for additional security requirements that pertain to your
system and specific environment.
Power Control
You can use software to turn on and off power to some Oracle systems. The power
distribution units (PDUs) for some system cabinets can be enabled and disabled remotely.
Authorization for these commands is typically set up during system configuration and is
usually limited to system administrators and service personnel.
Refer to your system or cabinet documentation for further information.
Asset Tracking
Use serial numbers to track inventory. Oracle embeds serial numbers in firmware, on option
cards, and system motherboards. You can read these serial numbers through local area
network (LAN) connections.
You can also use wireless radio frequency identification (RFID) readers to further simplify
asset tracking. An Oracle white paper, How to Track Your Oracle Sun System Assets by
Using RFID, is available at:
How to Track Your Oracle Sun System Assets by Using RFID
4-1
Chapter 4
Network Security
Network Security
After the networks are configured based on security principles, regular review and
maintenance are needed.
To secure local and remote access to your systems, follow these guidelines:
• Limit remote configuration to specific IP addresses using SSH instead of Telnet.
Telnet passes user names and passwords in clear text, potentially allowing
everyone on the local area network (LAN) segment to see login credentials. Set a
strong password for SSH.
• Use version 3 of Simple Network Management Protocol (SNMP) to provide secure
transmissions. Earlier versions of SNMP are not secure and transmit
authentication data in unencrypted text. SNMPv3 uses encryption to provide a
secure channel as well as individual user names and passwords.
• Change the default SNMP community string to a strong community string if
SNMPv1 or SNMPv2 is necessary. Some products have PUBLIC set as the
default SNMP community string. Attackers can query a community to draw a very
complete network map and possibly modify management information base (MIB)
values.
• Always log out after using the system controller if the system controller uses a
browser interface.
• Enable necessary network services and configure these services securely. Disable
unnecessary network services, such as Transmission Control Protocol (TCP) or
Hypertext Transfer Protocol (HTTP).
• Use LDAP security measures when using LDAP to access the system.
• Create a banner message that appears at login to state that unauthorized access
is prohibited. You can inform users of any important policies or rules. The banner
can be used to warn users of special access restrictions for a given system, or to
remind users of password policies and appropriate use.
• Use access control lists to apply restrictions, where appropriate.
• Set time-outs for extended sessions and set privilege levels.
• Use these network services in very secure environments as they are secured by
certificates and other forms of strong encryption to protect the channel:
– Active Directory
– LDAP/SSL (Lightweight Directory Access Protocol/Secure Socket Layer)
• Use these network services on private, secure networks where there are no
suspected malicious users:
– RADIUS (Remote Authentication Dial In User Service)
4-2
Chapter 4
Data Protection and Security
Caution:
Disk-wiping software might not be able to delete some data on modern hard drives,
especially solid state drives (SSDs), due to the way that they manage data access.
To find security information for Oracle operating systems, refer to the operating system
documentation at: Operating Systems Documentation
Log Maintenance
Inspect and maintain your log files on a regular schedule. Use these methods to secure log
files:
• Enable logging and send system logs to a dedicated secure log host.
4-3
Chapter 4
Log Maintenance
4-4