Secure environment practices

These practices can help ensure a secure IBM Verify Identity Governance environment.

Table 1. Practices for a secure IBM Verify Identity Governance environment
Given sensitive data in these areas Ensure that these practices occur
Database data Restrict operating system access to database files. Limit the privileges of the operating system accounts (administrative, root-privileged, or DBA) to the least privileges needed. Change the default passwords. Enforce periodic password changes. See the security information in the database documentation for more details.
Database logs Restrict operating system access to log and trace files. Limit the privileges of the operating system accounts (administrative, root-privileged, or DBA) to the least privileges needed. Change the default passwords. Enforce periodic password changes. See the security information in the database documentation for more details.
Database backups Store database backups at safe and secure locations. Guard against leaks or exposure of sensitive and confidential information. See the security and backup information in the database documentation for more details.
LDAP data Securely handle any LDAP data that contains sensitive information. Sensitive information includes disabling anonymous read, enabling SSL, and restricting access to privileged and authorized operating system and application users. See the security information in the LDAP directory server documentation for more details.
LDAP logs Restrict access to log files in the log directory of the directory server to privileged and authorized operating system and application users. This restriction is especially important if you enable audit logging for the directory server. See the security information in the directory server documentation for more details.
LDAP backups If LDIF files contain sensitive information, store them safely and handle them securely.
IBM Verify Identity Governance logs If IVIG logs in the path/ibm/tivo../../common/CTGIM directory contain sensitive information, restrict access to them.
Directories under IM_HOME If the data, configuration, and installation logs contain sensitive information, restrict access to the directories in ISIM_HOME.
Network traffic Restrict network traffic to what is required by the deployment. If you write your own application and use an IBM Verify Identity Governance API to retrieve sensitive data, encrypt the data before you send it over the network.
WebSphere® Liberty security Enable security on WebSphere Liberty and disallow running WebSphere Liberty with a non-root account.