Global Mailbox security guidelines

Few important security guidelines for working with Global Mailbox are given below. To view the overall security configuration for Global Mailbox see Security Options.
  • Global Mailbox Management Tool. The Global Mailbox Management Tool is configured with SSL by default and uses a self-signed certificate. To replace the default certificate with your own certificate, see Securing communications with SSL.
  • NIST or FIPS compliance. The IBM® WebSphere® Application Server Liberty profile provides the framework for Secure Sockets Layer (SSL) in Global Mailbox. To configure a Liberty profile to run in Strict NIST 800-131a compliance mode, see Setting up a Liberty profile to run in SP800-131a. For configuring Global Mailbox to be NIST compliant, see Securing with SSL.
  • Securing the connection to Apache Cassandra. Secure the communications between Global Mailbox and Cassandra servers with SSL by creating a keystore and truststore with encryption keys and authentication. After SSL is implemented, only trusted resources are connected. For information, see Securing Apache Cassandra SSL connections.
  • Securing the connection to Sterling B2B Integrator and Sterling File Gateway. SSL connections between Global Mailbox and Sterling B2B Integrator are enabled by default and are set during installation.
  • Firewall considerations. Ensure that your software and firewalls are configured correctly so that communication is not blocked. For more information, see Firewall Considerations.
  • Sensitive configuration properties. The master passphrase that is created during installation and is enabled by default secures access to sensitive properties by encryption. For more information, see Securing passwords.
  • Data Encryption. Data in storage is not encrypted by default during installation. To enable encryption of data in storage, see Provisioning storage.