VirtualBox

source: vbox/trunk/doc/manual/en_US/dita/topics/security-general.dita@ 102095

最後變更 在這個檔案從102095是 99797,由 vboxsync 提交於 22 月 前

Docs: bugref:10302. Merging changes from the docs team. Almost exclusively conkeyref related stuff.

  • 屬性 svn:eol-style 設為 native
  • 屬性 svn:keywords 設為 Id Revision
檔案大小: 2.9 KB
 
1<?xml version='1.0' encoding='UTF-8'?>
2<!DOCTYPE topic PUBLIC "-//OASIS//DTD DITA Topic//EN" "topic.dtd">
3<topic xml:lang="en-us" id="security-general">
4 <title>General Security Principles</title>
5
6 <body>
7 <p>
8 The following principles are fundamental to using any application
9 securely.
10 </p>
11 <ul>
12 <li>
13 <p><b outputclass="bold">Keep software up to date</b>. One
14 of the principles of good security practise is to keep all
15 software versions and patches up to date. Activate the
16 <ph conkeyref="vbox-conkeyref-phrases/product-name"/> update notification to get notified when a new
17 <ph conkeyref="vbox-conkeyref-phrases/product-name"/> release is available. When updating
18 <ph conkeyref="vbox-conkeyref-phrases/product-name"/>, do not forget to update the Guest Additions.
19 Keep the host operating system as well as the guest operating
20 system up to date.
21 </p>
22 </li>
23 <li>
24 <p><b outputclass="bold">Restrict network access to critical
25 services.</b> Use proper means, for instance a
26 firewall, to protect your computer and your guests from
27 accesses from the outside. Choosing the proper networking mode
28 for VMs helps to separate host networking from the guest and
29 vice versa.
30 </p>
31 </li>
32 <li>
33 <p><b outputclass="bold">Follow the principle of least
34 privilege.</b> The principle of least privilege states
35 that users should be given the least amount of privilege
36 necessary to perform their jobs. Always execute <ph conkeyref="vbox-conkeyref-phrases/product-name"/>
37 as a regular user. We strongly discourage anyone from
38 executing <ph conkeyref="vbox-conkeyref-phrases/product-name"/> with system privileges.
39 </p>
40 <p>
41 Choose restrictive permissions when creating configuration
42 files, for instance when creating /etc/default/virtualbox, see
43 <xref href="linux_install_opts.dita">Automatic Installation Options</xref>. Mode 0600 is preferred.
44 </p>
45 </li>
46 <li>
47 <p><b outputclass="bold">Monitor system activity.</b>
48 System security builds on three pillars: good security
49 protocols, proper system configuration and system monitoring.
50 Auditing and reviewing audit records address the third
51 requirement. Each component within a system has some degree of
52 monitoring capability. Follow audit advice in this document
53 and regularly monitor audit records.
54 </p>
55 </li>
56 <li>
57 <p><b outputclass="bold">Keep up to date on latest security
58 information.</b> Oracle continually improves its
59 software and documentation. Check this note yearly for
60 revisions.
61 </p>
62 </li>
63 </ul>
64 </body>
65
66</topic>
注意: 瀏覽 TracBrowser 來幫助您使用儲存庫瀏覽器

© 2025 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette