VirtualBox

source: vbox/trunk/doc/manual/en_US/dita/topics/security-general.dita@ 98657

Last change on this file since 98657 was 98549, checked in by vboxsync, 2 years ago

Docs: bugref:10302. Uploading .dita user manual files we received from the doc team on 25th Jan.

  • Property svn:eol-style set to native
File size: 2.7 KB
Line 
1<?xml version='1.0' encoding='UTF-8'?>
2<!DOCTYPE topic PUBLIC "-//OASIS//DTD DITA Topic//EN" "topic.dtd">
3<topic xml:lang="en-us" id="security-general">
4 <title>General Security Principles</title>
5
6 <body>
7 <p>
8 The following principles are fundamental to using any application
9 securely.
10 </p>
11 <ul>
12 <li>
13 <p><b outputclass="bold">Keep software up to date</b>. One
14 of the principles of good security practise is to keep all
15 software versions and patches up to date. Activate the
16 Oracle VM VirtualBox update notification to get notified when a new
17 Oracle VM VirtualBox release is available. When updating
18 Oracle VM VirtualBox, do not forget to update the Guest Additions.
19 Keep the host operating system as well as the guest operating
20 system up to date.
21 </p>
22 </li>
23 <li>
24 <p><b outputclass="bold">Restrict network access to critical
25 services.</b> Use proper means, for instance a
26 firewall, to protect your computer and your guests from
27 accesses from the outside. Choosing the proper networking mode
28 for VMs helps to separate host networking from the guest and
29 vice versa.
30 </p>
31 </li>
32 <li>
33 <p><b outputclass="bold">Follow the principle of least
34 privilege.</b> The principle of least privilege states
35 that users should be given the least amount of privilege
36 necessary to perform their jobs. Always execute Oracle VM VirtualBox
37 as a regular user. We strongly discourage anyone from
38 executing Oracle VM VirtualBox with system privileges.
39 </p>
40 <p>
41 Choose restrictive permissions when creating configuration
42 files, for instance when creating /etc/default/virtualbox, see
43 <xref href="linux_install_opts.dita">Automatic Installation Options</xref>. Mode 0600 is preferred.
44 </p>
45 </li>
46 <li>
47 <p><b outputclass="bold">Monitor system activity.</b>
48 System security builds on three pillars: good security
49 protocols, proper system configuration and system monitoring.
50 Auditing and reviewing audit records address the third
51 requirement. Each component within a system has some degree of
52 monitoring capability. Follow audit advice in this document
53 and regularly monitor audit records.
54 </p>
55 </li>
56 <li>
57 <p><b outputclass="bold">Keep up to date on latest security
58 information.</b> Oracle continually improves its
59 software and documentation. Check this note yearly for
60 revisions.
61 </p>
62 </li>
63 </ul>
64 </body>
65
66</topic>
Note: See TracBrowser for help on using the repository browser.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette