Document scope and disclaimer

This topic provides recommendations to guide your secure deployment of Sterling Order Management System Software. applications. The terms “you,” “your” or “yours” refers to the end-user or customer. The terms “we,” “our” or “ours” refers to International Business Machines Corp. (IBM®).

Wherever applicable, it also documents a sample third party security configuration for use with the IBM applications. These sample configurations are not meant to be exhaustive. In some cases, there will be multiple implementation alternatives, each with its own security strengths and weaknesses. You are responsible for identifying the security options most appropriate to the risks identified in your environment.

This document assumes that you are familiar with security deployment concepts, including knowledge of how to deploy these applications securely. Specifically, you must ensure that the recommendations can be used in your corporate operational environment.

IBM strongly recommends you work with your internal or external security teams from the initial planning stages to production deployment. Most importantly, ensure that engineers knowledgeable in security are involved in designing the system, which includes the IBM applications.