Application security introduction

This topic presents steps that you need to implement or configure to secure the Sterling™ Order Management System Software applications.

The Sterling Order Management System Software applications rely on the following security controls:
  • Authentication
  • Authorization
  • Configuration
  • Logging