Chapter 15



Applications and their data need to be secure. This chapter describes steps that can be taken to help ensure that an application and its data are as secure as possible. Some steps are putting users into appropriate security groups, removing users leave the organization, limiting access to the server, applying the concept of least privilege, not sharing accounts, requiring strong passwords, controlling the admin account, applying patches, turning off unused features, and closing unused ports.

Key Words

security; authentication; LDAP; SSO; terminated users; security groups; VPN; shared accounts; test accounts; passwords; National Vulnerability Database; ACL; log files; encryption; firewalls; ports; SSL; HTTPS; hacking; ...

Get Application Administrators Handbook now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.