Measures for Configuration Manager
2-27
Measures for Configuration Manager
This section explains the security measures for the Configuration Manager.
Illegal Access to Resource Files
The Configuration Manager uses the following files.
• Business configuration management function repository (Note 1)
(Note 1) This is the folder that is set in “Repository Environment Settings” of the Interstage Management
Console [Configuration Management] tab.
It is possible that these files may be exposed to the threat of illegal access by a person (or machine)
with malicious intent.
One measure to reduce this threat is to prevent access by general users. To achieve this, it is
recommended that settings are made for these files so that only a user with administrator authority can
access them (in Solaris OE/Linux systems, this is a super user, and in Windows(R) systems it is the
Administrator).
Commentaires sur ces manuels