Application security introduction
This topic presents steps that you need to implement or configure to secure the Sterling™ Order Management System Software applications.
The Sterling Order Management System Software applications
rely on the following security controls:
- Authentication
- Authorization
- Configuration
- Logging