Network Deployment (Distributed operating systems), v8.0 > Tune performance > Tune security > Tune, hardening, and maintaining security configurations


Hardening security configurations

There are several methods that you can use to protect the WAS infrastructure and applications from different forms of attack. Several different techniques can help with multiple forms of attack. Sometimes a single attack can leverage multiple forms of intrusion to achieve the end goal. For example, in the simplest case, network sniffing can be used to obtain passwords and those passwords can then be used to mount an application-level attack. The following issues are discussed in IBM WebSphere Developer Technical Journal: WAS V5 advanced security and system hardening:


Procedure


What to do next

In this release of WAS, more security hardening features of the server are enabled by default. However, if the features are not enabled after migration you can enable them yourself. See the Security hardening features enablement and migration article for more information.

For additional information about hardening security configurations, see the WAS security web page.
Enablement and migration considerations of Security hardening features
Tune, hardening, and maintaining security configurations

+

Search Tips   |   Advanced Search