Securing Your PeopleSoft Application Environment: An Oracle Red Paper

 

Whether you are a PeopleSoft technical user, installers, system administrator, or a PeopleSoft developer, security is of vital importance to you and your organization.  PeopleSoft has many different layers of security that must be addressed to ensure the security of your company data and resources.

Oracle has a great red paper that gives you the best guidelines on how to address the security of your implementation, including network infrastructure considerations, hardening of the PeopleSoft Internet
Architecture and Portal, and other system-hardening configuration recommendations.

 

The red paper contains some "real-life" solutions and recommendations that have been implemented in the field by others.  So, I highly recommend that you download the red paper and review it.  Here is a high level break down of the contents.

• Chapter 1, “Introduction,” introduces the red paper.

• Chapter 2, “Security Model,” discusses required reading and gives a conceptual overview of security issues. Individuals and groups who may be tasked with setting security policy as well as ensuring compliance and adherence to industry best practices should find this section useful.


• Chapter 3, “Securing Network Infrastructure,” discusses different approaches to network infrastructure security. Network and security administrators (or other individuals tasked with network security) will find useful guidelines in this section for securing the supporting network of a PeopleSoft environment.


• Chapter 4, “Securing PeopleSoft Internet Architecture,” gives practical solutions for Pure Internet Architecture (PIA) security. It is a practical guide to providing security solutions and recommended settings for providing and maintaining PIA security. System and Security Administrators should find this information useful.
 
• Chapter 5, “PeopleTools Security Hardening,” discusses hardening of PeopleTools Security. System administrators should find valuable information in this section about how to address hardening and improving PeopleTools Security.


• Chapter 6, “Securing Customized PeopleSoft Applications,” gives some guidelines securing a customized  pplication. Developers, system administrators, and business analysts can find guidance and recommendations for good security practices when customizing applications in this section.

 

Download the Red paper Here

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值