Skip to Main Content
Application Administrators Handbook
book

Application Administrators Handbook

by Kelly C Bourne
September 2013
Intermediate to advanced content levelIntermediate to advanced
626 pages
22h 15m
English
Morgan Kaufmann
Content preview from Application Administrators Handbook
Chapter 15

Security

Abstract

Applications and their data need to be secure. This chapter describes steps that can be taken to help ensure that an application and its data are as secure as possible. Some steps are putting users into appropriate security groups, removing users leave the organization, limiting access to the server, applying the concept of least privilege, not sharing accounts, requiring strong passwords, controlling the admin account, applying patches, turning off unused features, and closing unused ports.

Key Words

security; authentication; LDAP; SSO; terminated users; security groups; VPN; shared accounts; test accounts; passwords; National Vulnerability Database; ACL; log files; encryption; firewalls; ports; SSL; HTTPS; hacking; ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Access Control, Authentication, and Public Key Infrastructure, 2nd Edition

Access Control, Authentication, and Public Key Infrastructure, 2nd Edition

Mike Chapple, Bill Ballad, Tricia Ballad, Erin Banks
The Disaster Recovery Handbook, 3rd Edition

The Disaster Recovery Handbook, 3rd Edition

Michael Wallace, Lawrence Webber

Publisher Resources

ISBN: 9780123985453