© Copyright IBM Corp. 2012. All rights reserved. vii
Preface
This IBM® Redbooks® publication provides information about security concerning an
organization’s business process management (BPM) program, about common security holes
that often occur in this field, and describes techniques for rectifying these holes. This book
documents preferred practices and common security hardening exercises that you can use to
achieve a reasonably well-secured BPM installation.
Many of the practices described in this book apply equally to generic Java Platform and
Enterprise Edition (J2EE) applications, as well as to BPM. However, it focuses on aspects
that typically do not receive adequate consideration in actual practice. Also, it addresses
equally the BPM ...