This section describes recommendations and best practices
for securing servers that run LiveCycle. This is not a comprehensive
host-hardening document for your operating system and . Instead,
this section describes a variety of security-hardening settings
that you should implement to enhance the security of LiveCycle that
is running within a corporate intranet. To ensure that the LiveCycle application
servers stay secure, however, you should also implement security monitoring,
detection, and response procedures.
This section describes hardening techniques that should be applied
during the following stages during the installation and configuration
life cycle:
Pre-installation: Use these techniques before
you install LiveCycle.
Installation: Use these techniques during the LiveCycle
installation process.
Post-installation: Use these techniques after installation
and periodically thereafter.
LiveCycle is highly customizable and can work in many different
environments. Some of the recommendations may not fit your organization's
needs.
|
|
|