By Jens Engelke

It is important to secure your IBM® Business Process Manager environment.

If you are on IBM BPM V7.5.1, consult the IBM Redbooks® publication IBM Business Process Manager Security: Concepts and Guidance, which provides information about security that concerns an organization’s business process management (BPM) program, common security holes that often occur in this field, and techniques for rectifying these holes. This book documents preferred practices and common security hardening exercises that will help you achieve a secured IBM BPM installation.

If you are on IBM BPM V8.0, see Securing IBM Business Process Manager and application.

If you are on IBM BPM V8.5, see Securing IBM Business Process Manager and applications.

If you are on IBM BPM V8.5.5, see Application security and Creating a secure environment.

If you are on IBM BPM V8.5.6, see Application security and Creating a secure environment.

If you are on IBM BPM V8.5.7, see Creating a secure environment.

To stay up-to-date with the latest security information about IBM BPM, see IBM Smarter Process Security.

Applicable releases: All

Source:  IBM

Learn more:

One response to “Good-practice resource – Secure your IBM BPM environment”

Leave a Reply

Your email address will not be published.