1 | <?xml version='1.0' encoding='UTF-8'?>
|
---|
2 | <!DOCTYPE topic PUBLIC "-//OASIS//DTD DITA Topic//EN" "topic.dtd">
|
---|
3 | <topic xml:lang="en-us" id="security-general">
|
---|
4 | <title>General Security Principles</title>
|
---|
5 |
|
---|
6 | <body>
|
---|
7 | <p>
|
---|
8 | The following principles are fundamental to using any application
|
---|
9 | securely.
|
---|
10 | </p>
|
---|
11 | <ul>
|
---|
12 | <li>
|
---|
13 | <p><b outputclass="bold">Keep software up-to-date</b>. One of the principles of good
|
---|
14 | security practise is to keep all software versions and patches up-to-date. Activate the
|
---|
15 | <ph conkeyref="vbox-conkeyref-phrases/product-name"/> update notification to get
|
---|
16 | notified when a new <ph conkeyref="vbox-conkeyref-phrases/product-name"/> release is
|
---|
17 | available. When updating <ph conkeyref="vbox-conkeyref-phrases/product-name"/>, do not
|
---|
18 | forget to update the Guest Additions. Keep the host operating system as well as the guest
|
---|
19 | operating system up-to-date. </p>
|
---|
20 | </li>
|
---|
21 | <li>
|
---|
22 | <p><b outputclass="bold">Restrict network access to critical
|
---|
23 | services.</b> Use proper means, for instance a
|
---|
24 | firewall, to protect your computer and your guests from
|
---|
25 | accesses from the outside. Choosing the proper networking mode
|
---|
26 | for VMs helps to separate host networking from the guest and
|
---|
27 | vice versa.
|
---|
28 | </p>
|
---|
29 | </li>
|
---|
30 | <li>
|
---|
31 | <p><b outputclass="bold">Follow the principle of least
|
---|
32 | privilege.</b> The principle of least privilege states
|
---|
33 | that users should be given the least amount of privilege
|
---|
34 | necessary to perform their jobs. Always execute <ph conkeyref="vbox-conkeyref-phrases/product-name"/>
|
---|
35 | as a regular user. We strongly discourage anyone from
|
---|
36 | executing <ph conkeyref="vbox-conkeyref-phrases/product-name"/> with system privileges.
|
---|
37 | </p>
|
---|
38 | <p>
|
---|
39 | Choose restrictive permissions when creating configuration
|
---|
40 | files, for instance when creating /etc/default/virtualbox, see
|
---|
41 | <xref href="linux_install_opts.dita">Automatic Installation Options</xref>. Mode 0600 is preferred.
|
---|
42 | </p>
|
---|
43 | </li>
|
---|
44 | <li>
|
---|
45 | <p><b outputclass="bold">Monitor system activity.</b>
|
---|
46 | System security builds on three pillars: good security
|
---|
47 | protocols, proper system configuration and system monitoring.
|
---|
48 | Auditing and reviewing audit records address the third
|
---|
49 | requirement. Each component within a system has some degree of
|
---|
50 | monitoring capability. Follow audit advice in this document
|
---|
51 | and regularly monitor audit records.
|
---|
52 | </p>
|
---|
53 | </li>
|
---|
54 | <li>
|
---|
55 | <p><b outputclass="bold">Keep up-to-date on latest security information.</b> Oracle
|
---|
56 | continually improves its software and documentation. Check this note yearly for revisions. </p>
|
---|
57 | </li>
|
---|
58 | </ul>
|
---|
59 | </body>
|
---|
60 |
|
---|
61 | </topic>
|
---|