13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

2.1.2 Logical securityLogical security is related to particular IT solutions: the IT architecture andapplications, including the business processes.CommunicationNetwork communication must be protected not only on a physical level but on alogical level as well. Most of the companies’ networks are connected to publicnetworks. Therefore, applications are accessible from the outside world. Networklevel security must prevent unauthorized access.ApplicationSecuring an application is done on different levels. <strong>Security</strong> is designed from thevery beginning of the implementation, when the processes and flows aredesigned.► Securing the resourcesThis implies protecting the resources on an application level and exercisingthe security features of the runtime platform (authentication andauthorization).► Implementing the business processes securelyThe processes have to be designed in a way that no weakness in logic can befound.2.1.3 <strong>Security</strong> policy<strong>Security</strong> policies are guidelines for an organization; they can be part of a widelyaccepted standard (ISO) or implemented by a certain organization or company.Policies can define processes for different areas in an organization. <strong>Security</strong>policies focus on security related processes, for example, how to request a newpassword, how to renew a password, and so on.These guidelines are very important in implementing a robust security for thewhole system organization-wide.Chapter 2. <strong>Security</strong> fundamentals 7

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!