Securing Your PeopleSoft Application Environment: An Oracle Red Paper

来源:互联网 发布:macbook强制卸载软件 编辑:程序博客网 时间:2024/06/05 20:01
 

Whether you are a PeopleSoft technical user, installers, system administrator, or a PeopleSoft developer, security is of vital importance to you and your organization.  PeopleSoft has many different layers of security that must be addressed to ensure the security of your company data and resources.

Oracle has a great red paper that gives you the best guidelines on how to address the security of your implementation, including network infrastructure considerations, hardening of the PeopleSoft Internet
Architecture and Portal, and other system-hardening configuration recommendations.

 

The red paper contains some "real-life" solutions and recommendations that have been implemented in the field by others.  So, I highly recommend that youdownload the red paper and review it.  Here is a high level break down of the contents.

• Chapter 1, “Introduction,” introduces the red paper.

• Chapter 2, “Security Model,” discusses required reading and gives a conceptual overview of security issues. Individuals and groups who may be tasked with setting security policy as well as ensuring compliance and adherence to industry best practices should find this section useful.


• Chapter 3, “Securing Network Infrastructure,” discusses different approaches to network infrastructure security. Network and security administrators (or other individuals tasked with network security) will find useful guidelines in this section for securing the supporting network of a PeopleSoft environment.


• Chapter 4, “Securing PeopleSoft Internet Architecture,” gives practical solutions for Pure Internet Architecture (PIA) security. It is a practical guide to providing security solutions and recommended settings for providing and maintaining PIA security. System and Security Administrators should find this information useful.
 
• Chapter 5, “PeopleTools Security Hardening,” discusses hardening of PeopleTools Security. System administrators should find valuable information in this section about how to address hardening and improving PeopleTools Security.


• Chapter 6, “Securing Customized PeopleSoft Applications,” gives some guidelines securing a customized  pplication. Developers, system administrators, and business analysts can find guidance and recommendations for good security practices when customizing applications in this section.

 

Download the Red paper Here

原创粉丝点击