29.01.2013 Views

WebSphere Application Server V7.0: Concepts ... - IBM Redbooks

WebSphere Application Server V7.0: Concepts ... - IBM Redbooks

WebSphere Application Server V7.0: Concepts ... - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Security policy<br />

A security policy is a guideline for an organization that describes the processes<br />

needed to implement a robust security environment.<br />

There are a number of key principles of a security policy:<br />

► Identify key assets<br />

Identify critical areas of business and those assets that host them. By<br />

identifying those key assets, you can adopt methods that are best for the<br />

environment and create an effective security policy.<br />

► Identify vulnerabilities<br />

Complete a comprehensive assessment of the environment to identify all the<br />

threats and vulnerabilities. Examine each and every area of the environment<br />

to find any way the system can be compromised. It is important to be<br />

thorough. Remember to examine the two types of security: physical and<br />

logical. This can be a resource-intensive activity but it is crucial to the security<br />

of the environment.<br />

► Identify acceptable risk<br />

After completing a vulnerability assessment, the acceptable risk must be<br />

determined. In many instances, this will be a cost issue. To completely secure<br />

an environment would be extremely expensive, so compromises have to be<br />

made to complete the security policy. In most cases, the most cost effective<br />

method to meet the required security level will be used. For example, in a<br />

system that contains mission-critical data for a company, the most advanced<br />

technology available is necessary. However, on a test system with no external<br />

access, the appropriate security level can be met with simpler elements.<br />

► Use layered security model<br />

In complex systems, it is important to have multiple layers of security to<br />

ensure the overall safety of the environment. A layered security model plans<br />

for expected risk and minimizes the impact. It also ensures that all<br />

components are protected, from the user to the back-end data systems, and<br />

that a failure in any one component does not impact the whole environment.<br />

Security configuration<br />

After creating the security policy, you must implement it. Implement steps to<br />

configure the physical and logical security as recommended in the security<br />

policy.<br />

382 <strong>WebSphere</strong> <strong>Application</strong> <strong>Server</strong> <strong>V7.0</strong>: <strong>Concepts</strong>, Planning, and Design

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!