Deployment scenario overview

How you deploy your applications in the network security zones depends upon the applications you need to install.

Answering the following questions will refer you to deployment scenarios for your applications.

  1. Do any of these applications need to capture credit card numbers?

    Your application and, as a result, your system have to comply to PCI DSS security standards if they capture, process, store or transmit credit card information. If this applies to you, you should read IBM® PCI DSS strategy. You should ensure that payment sensitive data like credit card number is kept outside of Sterling™ Order Management System Software applications. This approach simplifies PCI DSS compliance process for Sterling Order Management System Software applications, potentially keeping it out of PCI audit scope.

    This strategy relies on you, the customer, to integrate with external payment provider to capture sensitive PAN data.

  2. If you are implementing the Distributed Order Management application only, or with optional components such as Business Intelligence, Sterling Call Center, Sterling Call Center, or Sterling Store Engagement (Legacy), see Distributed Order Management with Optional Applications Deployment Scenario.

Note: These combinations are not exhaustive.