Overview
Security Guide provides information that is relevant for all life cycle phases.
Target Audience
-
Technology consultants
-
System administrators
Why Is Security Necessary?
With the increasing use of distributed systems and the Internet for managing business data, the demands on security are also on the rise. When using a distributed system, you need to be sure that your data and processes support your business needs without allowing unauthorized access to critical information. User errors, negligence, or attempted manipulation on your system should not result in loss of information or processing time. To assist you in securing your system, we provide this Security Guide.
About this Document
The Security Guide provides an overview of the security-relevant information.
The Security Guide comprises the following main sections:
-
This section provides an overview of the technical components and communication paths.
-
User Administration and Authentication
This section provides an overview of user administration and authentication aspects.
-
This section provides an overview of the authorization concept.
-
Network and Communication Security
This section provides an overview of the communication paths used and the security mechanisms that apply. It also includes our recommendations for the network topology to restrict access at the network level.
- The section Troubleshooting, Logging and Tracing provides an overview of logging and tracing.