Chapter 15

Security

Abstract

Applications and their data need to be secure. This chapter describes steps that can be taken to help ensure that an application and its data are as secure as possible. Some steps are putting users into appropriate security groups, removing users leave the organization, limiting access to the server, applying the concept of least privilege, not sharing accounts, requiring strong passwords, controlling the admin account, applying patches, turning off unused features, and closing unused ports.

Key Words

security; authentication; LDAP; SSO; terminated users; security groups; VPN; shared accounts; test accounts; passwords; National Vulnerability Database; ACL; log files; encryption; firewalls; ports; SSL; HTTPS; hacking; ...

Get Application Administrators Handbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.