File system and configuration files
Examples of the types of sensitive information that is stored on the file system are shown in the following list:
- Financial transmissions that are either being processed or being generated as part of your custom workflows and applications.
- Error and trace log files might contain personal information.
To protect the files on the file system, such as financial information that is being processed, you might
want to do the following things:
- Configure the file system to limit access to only the user IDs that are used by components that need access to the files. Depending on your requirements, these components might be components within the IBM® App Connect Enterprise workflow or for stand-alone applications.
- The intermediate files that are created as financial transmissions are processed are not encrypted. Use file system encryption if you want to protect these files.