03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

The following secure communications are identified in Figure 11-9:<br />

►<br />

►<br />

►<br />

HTTPS is the secure HTTP connection using SSL. Nodes, which<br />

communicate via TCP/IP using the HTTP protocol, should use secure SSL<br />

communication. The level of security depends on the options set for the<br />

connection.<br />

LDAPS is the secure LDAP connection to a directory server using SSL. Since<br />

LDAP directories store essential and sensitive applications and business<br />

information, the communication should be secured.<br />

IIOP/SSL (IIOPS) is the secure communication for IIOP connections using<br />

SSL. Two application servers are mostly communicating via IIOP, for example<br />

the EJB client and EJB container.<br />

Note: Two application servers can also communicate via HTTP with SOAP<br />

using the Web Services technology. The HTTP communication should be<br />

secured using SSL.<br />

►<br />

SSL is a transport layer security protocol which can be applied to most of the<br />

protocols in use with an e-business application. As shown in Figure 11-9,<br />

other connections without named protocols can also use SSL to secure the<br />

communication.<br />

Other communication channels between nodes can be secured on a transport<br />

layer, for example using IPSEC.<br />

System hardening<br />

In addition to protecting the nodes from being attacked from outside, systems<br />

have to be secured from inside attacks as well. Operating systems security is an<br />

essential part of every system and is provided as mandatory. System hardening<br />

is a global philosophy of system security that focuses strongly not only on<br />

detection, but also on prevention. It involves removing unnecessary services<br />

from the base operating system, restricting user access to the system, enforcing<br />

password restrictions, controlling user and group rights, and enabling system<br />

accounting.<br />

System administrators are responsibile for following the system and corporate<br />

guidelines to ensure security on every level. System security has to be<br />

maintained and set correctly. Part of system security is hardening the system and<br />

preventing attacks from inside and outside.<br />

System hardening relies on the system management guidelines and the<br />

advanced security settings and functions provided by the system.<br />

366 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!