O'Reilly logo

IBM WebSphere V5.0 Security: WebSphere Handbook Series by Stephen Pipes, Rao Maheshwar, David Leigh, Floyd Langley, Piotr Kisielewicz, Paul Creswick, Derek Carpenter, Peter Kovari

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

12.1. End-to-end security

This part of the book largely concentrates on securing WebSphere hosted applications, but the application is only one part of the e-business infrastructure which provides the services to support the publication of applications to the intended user audience.

In order to provide a secure solution, the entire infrastructure and the flow of data through the infrastructure must be examined for possible breaches. Best practices require that a complete Risk Analysis be carried out and Risk Mitigation processes implemented with the remaining risks proactively monitored and the entire system regularly audited.

Security needs to be addressed at several levels, physical access, network access, platform operating system(s), application ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required