Enforce securityĭo not expect your users to follow security practices on their own enforce security when possible by requiring secure connections, password resets, and strong authentication methods. Limit access to the servers hosting AMĪ large part of protecting your environment is making sure only authorized people can access your servers and applications through the appropriate network, using the appropriate ports, and presenting strong-enough credentials.Įnsure users connect through SSL / TLS to the systems and audit system access periodically.įor a list of ports used in AM by default, see Ports Used. If something is not being used, disable it or uninstall it. The more features you have turned on, the more features you need to secure, patch, and audit. Do not use outdated algorithms such as RSA for generating your keys. Keep up to date on cryptographic methods and algorithmsĭifferent algorithms and methods are discovered and tested over time, and communities of experts decide which are the most secure for different uses. You should also follow similar lists from all your vendors. Knowledge of vulnerabilities spread fast across malicious users, who would not hesitate in trying to exploit them.įorgeRock maintains a list of security advisories that you should follow. Security vulnerabilities are the reason why you should keep your operating systems, web and application servers, and any other application in your environment up to date.
0 Comments
Leave a Reply. |