A - C - D - E - F - G - H - I - L - M - N - O - P - R - S - T - U - V - W

A

access, restricting

database server   1

network   1

Siebel application   1

Siebel File System   1

ActiveX controls, enabling   1

architecture, Siebel Security

data encryption   1

recommended topologies   1

auditing Siebel Business Applications   1

authentication

networks   1

Siebel application users   1


Back to top


C

client browsers

communication encryption   1

software updates   1

Common Criteria for Information Technology Security Evaluation   1

Common Vulnerability Scoring System   1

components, disabling   1

Critical Patch Updates   1


Back to top


D

data confidentiality, end-to-end encryption   1

Data Vault   1

database server access   1

database storage, data confidentiality   1

denial of service attacks, preventing   1

deployment guidelines   1

DoCompression parameter   1


Back to top


E

Email communications

deleting processed email   1

encrypting between email servers and Siebel Servers   1

securing   1

encryption

client browser and Web server   1

database data   1

eapps.cfg file   1

end-to-end for data confidentiality   1

network traffic   1


Back to top


F

Federal Information Processing Standard (FIPS) 140   1

files, protecting   1

firewalls

deploying   1

large Siebel CRM deployment   1

medium Siebel CRM deployment   1


Back to top


G

general security recommendations   1

guidelines for deployment   1


Back to top


H

handheld physical device security   1

high-interactivity Siebel Business Applications   1

HTTP 1.1 protocol   1


Back to top


I

Internet Protocol Security (IPsec)   1


Back to top


L

load balancers, about   1


Back to top


M

message broadcasting   1


Back to top


N

Network Address Translation, implementing   1 ,  2

network and infrastructure security recommendations   1

network security

about   1

authentication   1

encrypt network traffic   1

firewalls   1

IPsec   1

load balancers   1

Network Address Translation   1 ,  2

proxy servers   1

recommended topologies   1

routers   1

Virtual Private Networks (VPNs)   1

network topologies, recommended

about   1

large deployments   1

medium deployments   1


Back to top


O

operating systems

about   1

applying patches and updates   1

protecting files   1

protecting resources   1

required tasks   1

securing   1 ,  2

Oracle Software Security Assurance program   1


Back to top


P

passwords

hashing   1

management policies   1

Siebel application policies   1

Siebel service owner   1

syntax rules   1

patches, management   1

PCI Data Security Standard (DSS)

about   1

Siebel support for   1

physical security of client computers   1

port allocations for Siebel CRM   1

processed email, deleting   1

protecting session IDs   1

proxy servers, about   1


Back to top


R

reports, security   1

routers   1

r-services on UNIX, about   1


Back to top


S

secure coding practices   1

SecureLogin parameter   1

security

resources   1

standards   1

threats   1

security assessments

about   1

Common Vulnerability Scoring System   1

security recommendations   1

security Web sites   1

session IDs, protecting   1

Siebel Business Applications

about   1

implementing access control   1

implementing account policies   1

implementing password management policies   1

implementing user authentication   1

reports   1

securing   1

set-up requirements   1

Siebel service owner account   1

special users   1

testing   1

user authentication   1

Siebel clients

browser software   1

enabling ActiveX controls   1

encrypting communications   1

physical security   1

securing   1

security patches   1

Siebel components, disabling   1

Siebel database

about   1

auditing   1

backups   1

encrypting communications   1

protecting sensitive data in   1

restricting access   1

reviewing authorization policies   1

securing   1

user passwords   1

Siebel Document Server, securing   1

Siebel File System

excluding unsafe file types   1

restricting access   1

Siebel Handheld, security   1

Siebel mobile clients

Siebel Handheld   1

Siebel Remote   1

Siebel Wireless   1

Siebel Remote

encrypt database data   1

password management policies   1

synchronization framework   1

Siebel Reports environment, securing   1

Siebel Server

data confidentiality to database   1

encrypting communications   1

restricting access   1

r-services, deleting   1

Siebel Web server

directories   1

eapps.cfg file   1

encrypt communications   1

file permissions   1

securing user session IDs   1

Siebel Web Server Extension (SWSE), security features   1

Siebel Wireless, security   1

SISNAPI (Siebel Internet Session API)   1

special user privileges   1

standards

Common Criteria for Information Technology Security Evaluation   1 ,  2

Payment Card Industry Data Security Standard   1 ,  2

Personally Identifiable Information standard   1


Back to top


T

testing system security   1

Transparent Data Encryption   1

Transport Layer Security (TLS)

Email server and Siebel Server   1

Web client and Web server   1

Web server and Siebel Server   1


Back to top


U

unsafe file types, excluding from Siebel File System   1

user authentication, about   1

user privileges, special users   1


Back to top


V

Virtual Private Networks (VPNs)   1

vulnerabilities

denial of service attacks   1

description   1

scoring   1

session ID spoofing   1


Back to top


W

Web applications, security   1

Web servers

about   1

data confidentiality to Siebel Server   1 ,  2

deleting subdirectories   1

eapps.cfg file   1

encrypting communications   1

file permissions   1

Back to top

Siebel Security Hardening Guide Copyright © 2013, Oracle and/or its affiliates. All rights reserved. Legal Notices.