12.1. End-to-end security
This part of the book largely concentrates on securing WebSphere hosted applications, but the application is only one part of the e-business infrastructure which provides the services to support the publication of applications to the intended user audience.
In order to provide a secure solution, the entire infrastructure and the flow of data through the infrastructure must be examined for possible breaches. Best practices require that a complete Risk Analysis be carried out and Risk Mitigation processes implemented with the remaining risks proactively monitored and the entire system regularly audited.
Security needs to be addressed at several levels, physical access, network access, platform operating system(s), application ...
Get IBM WebSphere V5.0 Security: WebSphere Handbook Series now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.