-
Book Overview & Buying
-
Table Of Contents
IBM WebSphere Application Server v7.0 Security
By :
It would be practically impossible for a vendor to create an OS/hardware configuration that would securely and efficiently cover all customers' needs. When at IBM, I heard co-workers sometimes exclaim how creative our customers were when it came to finding ways to either use or configure one of our products that we had not thought about. It is probably the same when in your organization systems are configured to better cope with a specific job, that job being a database server or a J2EE application server or what have you.
One of the keys to unlock the art of hardening the default installation of your underlying OS is to identify borders between the WAS ND7 environment and the OS/hardware. Finding such borders will make the task a little easier since it will help to narrow the scope of what needs to be analyzed.
![]() |
The previous diagram, in a very abstract fashion, depicts the salient borders between a WAS instance and the basic systems within the OS. So, let's take...
Change the font size
Change margin width
Change background colour
