About creating a security plan
This topic provides security recommendations and guidelines for running Sterling Order Management System Software. It is intended to help you create a reasonably secure implementation of the application.
Because we recognize that you may have unique business or operational requirements, Sterling Order Management System Software does not provide a specific set of instructions that you can follow to completion for creating a security plan. Typically, it is not possible to configure a system solely for security at the detriment of other engineering or business realities.
Given the complicated nature of security, it is recommended that you refer to the following documents:
- National Security Agency Central Security Service for tips on how to harden your operating system, database, and network.
- Understanding WebLogic Server Security for tips on how to secure Oracle WebLogic 12.2.1.3.
- The Rhino9 Team, The Modern Hackers Desk Reference; available at Modern Hackers Desk Reference.