29.01.2013 Views

WebSphere Application Server V7.0: Concepts ... - IBM Redbooks

WebSphere Application Server V7.0: Concepts ... - IBM Redbooks

WebSphere Application Server V7.0: Concepts ... - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

It is the responsibility of the <strong>WebSphere</strong> <strong>Application</strong> <strong>Server</strong> infrastructure to<br />

provide all the services required by applications to run in a secured environment.<br />

It is imperative then, to have security in mind when planning for a <strong>WebSphere</strong><br />

<strong>Application</strong> <strong>Server</strong> infrastructure. In many cases you will find reusable<br />

components of a security infrastructure already in place.<br />

Consider how security will affect your infrastructure:<br />

► Understand the security policy and requirements for your future environment.<br />

► Work with a security subject matter expert to develop a security infrastructure<br />

that adheres to the requirements and integrates in the existing infrastructure.<br />

► Make sure that sufficient physical security is in place.<br />

► Make sure the application developers understand the security requirements<br />

and code the application accordingly.<br />

► Consider the user registry (or registries) you plan to use. <strong>WebSphere</strong><br />

<strong>Application</strong> <strong>Server</strong> <strong>V7.0</strong> supports multiple user registries and multiple security<br />

domains.<br />

► Make sure that the user registries are not breaking the high availability<br />

requirements. Even if the user registries you are using are out of scope of the<br />

<strong>WebSphere</strong> <strong>Application</strong> <strong>Server</strong> project, considerations for high availability<br />

need to be taken and requested. For example, make sure that your LDAP<br />

user registries are made highly available and are not a single point of failure.<br />

► Define the trust domain for your environment. All computers in the same<br />

<strong>WebSphere</strong> security domain trust each other. This trust domain can be<br />

extended, and when using SPNEGO / Kerberos, even out to the Windows<br />

desktop of the users in your enterprise.<br />

► Assess your current implementation design and ensure that every possible<br />

access to your systems is secured.<br />

► Consider the level of auditing required and how to implement it.<br />

► Consider how you will secure stored data. Think of operating system security<br />

and encryption of stored data.<br />

► Define a password policy, including considerations for handling password<br />

expirations for individual users.<br />

► Consider encryption requirements for network traffic. Encryption introduces<br />

overhead and increased resource costs, so use encryption only where<br />

appropriate.<br />

► Define the encryption (SSL) endpoints in your communications.<br />

Chapter 4. Infrastructure 103

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!