Ensure that you comply with the general security requirements
before you configure the application server security settings and
the different authentication and session security-related policies.
The following are the general security requirements for the product
deployment:
- Host the IMS Server and
its required middleware in a secured data center on the main site
and DR site.
- Harden the operating system of the IBM® HTTP
Server, WebSphere® Application
Server, and database server hosts against intrusion attacks.
- Apply strict access controls on the IBM HTTP
Server, WebSphere Application
Server, and database server hosts.
- Back up the IMS Server and WebSphere Application Server
folders.
- Store the IMS Server database
on a secure location.
- Protect each computer with firewalls, anti-virus, anti-malware
tools.
- Implement role-based access control to protect access to operations
in IMS Configuration Utility and
in AccessAdmin.