Securing Your PeopleSoft Application Environment: An Oracle Red Paper
来源:互联网 发布:macbook强制卸载软件 编辑:程序博客网 时间:2024/06/05 20:01
Whether you are a PeopleSoft technical user, installers, system administrator, or a PeopleSoft developer, security is of vital importance to you and your organization. PeopleSoft has many different layers of security that must be addressed to ensure the security of your company data and resources.
Oracle has a great red paper that gives you the best guidelines on how to address the security of your implementation, including network infrastructure considerations, hardening of the PeopleSoft Internet
Architecture and Portal, and other system-hardening configuration recommendations.
The red paper contains some "real-life" solutions and recommendations that have been implemented in the field by others. So, I highly recommend that youdownload the red paper and review it. Here is a high level break down of the contents.
• Chapter 1, “Introduction,” introduces the red paper.
• Chapter 2, “Security Model,” discusses required reading and gives a conceptual overview of security issues. Individuals and groups who may be tasked with setting security policy as well as ensuring compliance and adherence to industry best practices should find this section useful.
• Chapter 3, “Securing Network Infrastructure,” discusses different approaches to network infrastructure security. Network and security administrators (or other individuals tasked with network security) will find useful guidelines in this section for securing the supporting network of a PeopleSoft environment.
• Chapter 4, “Securing PeopleSoft Internet Architecture,” gives practical solutions for Pure Internet Architecture (PIA) security. It is a practical guide to providing security solutions and recommended settings for providing and maintaining PIA security. System and Security Administrators should find this information useful.
• Chapter 5, “PeopleTools Security Hardening,” discusses hardening of PeopleTools Security. System administrators should find valuable information in this section about how to address hardening and improving PeopleTools Security.
• Chapter 6, “Securing Customized PeopleSoft Applications,” gives some guidelines securing a customized pplication. Developers, system administrators, and business analysts can find guidance and recommendations for good security practices when customizing applications in this section.
Download the Red paper Here
- Securing Your PeopleSoft Application Environment: An Oracle Red Paper
- Securing an ASP.Net application...
- New Red Paper Available on Crafting a Great User Experience for PeopleSoft
- Securing Your Web Browser
- Securing your Android apps
- BUG Hunting:PeopleSoft-Application Designer登陆失败 oracle-01017
- PeopleSoft笔记 - Application Designer
- PeopleSoft笔记 - Application Engine
- Building an application for a non semihosting environment
- An application for Apple Watch to control your Tesla Car
- Understand Your Project Costs in an Engineer-to-Order Manufacturing Environment
- ASP.NET MVC2 Securing our application
- The server has encountered an error while loading an application during the processing of your reque
- The server has encountered an error while loading an application during the processing of your reque
- your security settings have blocked an application signed with an expired or
- Setting Up Your Environment
- Eclipse_Manage your Eclipse environment
- Google’s Android as an application environment for DTV decoder system 文章简单记录
- WM9712 触摸屏驱动纪要和修改
- QT操作Excel
- Struts1.x 总结 (转)
- 进程间通信
- C:两个数直接交换,不用第三个临时变量
- Securing Your PeopleSoft Application Environment: An Oracle Red Paper
- 世界最伟大的数学家之欧拉
- Android应用程序组件Content Provider的共享数据更新通知机制分析
- windows下qt开发环境搭建
- Android的Task和Activity相关
- 记录之new运算符的实现细节 --- From 《Essential C# 4.0》
- Set Processing vs Row Processing
- Hibernate一对多(双向)
- git 使用