IBM Support

How easy is too easy for Secure configuration process?

Technical Blog Post


Abstract

How easy is too easy for Secure configuration process?

Body

Often I hear from industry professionals about how difficult and time consuming implementing a safe and secure environment can be.
Securing your company from outside attacks is critical in today's modern technology age and can be challenging.
Some have asked for a quick out of the box solution to avoid this daunting task.

I do understand the request because we often have a lot on our plates but little time.

But I have to ask ,If it is easy, do you trust it? If it is easy for you would it not be easy for a outside attacker.

Security is critical and much needed it takes extensive planning and knowledge of secure methodologies and implementation.
It is necessary that user credentials, databases and account information is not at risk to outside attacks.

How easy does it have to be before it is to easy?

With the right planning it can be easier than you think.

Planning a security strategy: Three core questions to ask

  1. Why are you doing this?
  2. What are you trying to secure?
  3. What will happen if you don't do this right?

http://www.ibm.com/developerworks/rational/library/09/planningasecuritystrategy/index.html?ca=dre

 

[{"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Product":{"code":"SS4PJT","label":"IBM Sterling Connect:Direct"},"Component":"","Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"","Edition":"","Line of Business":{"code":"LOB59","label":"Sustainability Software"}}]

UID

ibm11124301