This chapter covered two powerful concepts that will enable you to add security to your WebSphere environment. They are authentication as applied to resources and data encryption:
Whenever possible, move the authentication to resources aspect out of the application. Create JASS-J2C aliases at the resource level to provide the credentials needed to access the back-end resource. This technique can be easily applied to JDBC Data Sources and to JMS Queues.
If the nature of the data exchanged with a back-end resource is sensitive, apply encryption to the channel. The preferred form is to use SSL communication. If that is not possible, research other alternatives such as VPNs.
I feel full of energy; I am not sure about you. This chapter seemed short in comparison with the previous one. Perhaps I miss having a mini project. So go get a cup of tea and let's move onto the next chapter, WebSphere default installation hardening. What do you say?