
© Copyright IBM Corp. 2012. All rights reserved. 21
Chapter 2. Installation
Proper security begins before the software gets installed. How your Business Process
Manager servers fit into your enterprise will require careful consideration, with an eye towards
security implications at each and every touch point.
How many BPM deployment environments will you have?
Are each protected by firewalls?
Which of your BPM deployment environments will be protected by DMZs?
Will they be protected by proxies or dedicated web servers?
How will you secure your network traffic?
How many certificate authorities will you trust?
How will you secure your data ...