Siebel Security Hardening Guide > Overview of Security Threats, Recommendations, and Standards >

About This Guide


This guide provides recommendations for safeguarding your Siebel CRM deployment from internal (intranet) and external (Internet) security threats. The most important reason for securing an application is to protect the confidentiality, integrity, and availability of an organization's critical information. However, to protect your Siebel Business Applications data, you must secure both your Siebel Business Applications and the computing environment in which they run.

Siebel Security Hardening Guide (this book) and Siebel Security Guide provide the information you need to protect your Siebel Business Applications deployment:

  • Siebel Security Guide describes the Siebel security architecture and security concepts. It outlines the security controls provided by Siebel Business Applications, and gives detailed procedural information on how to implement these controls to secure your application.
  • This guide, Siebel Security Hardening Guide, describes how to harden your Siebel Business Applications deployment.

    Hardening is the process of protecting your computer network and applications from internal and external security threats by minimizing the areas of security vulnerability. Examples of hardening tasks include removing unnecessary software, services and utilities, disabling unused user accounts or login IDs, and setting up intrusion-detection systems. This guide provides detailed procedural information on implementing Siebel security controls only where such information is not provided elsewhere on the Siebel Bookshelf.

NOTE:  The Siebel Bookshelf is available on Oracle Technology Network (http://www.oracle.com/technetwork/indexes/documentation/index.html) and Oracle Software Delivery Cloud. It might also be installed locally on your intranet, or on a network location.

This guide applies to Siebel CRM version 8.1 and 8.2 and is intended for Siebel administrators, security groups, and IT staff involved in securing environments for Siebel Business Applications. It is assumed that users are familiar with Siebel Business Applications, their architecture, and with the general security principles within an IT environment.

NOTE:  This guide contains recommendations for securing the infrastructure in which Siebel Business Applications operate. You are responsible for ensuring all the security procedures recommended by your operating system and database vendors have been completed to provide a secure environment for Siebel Business Applications.

Siebel Security Hardening Guide Copyright © 2013, Oracle and/or its affiliates. All rights reserved. Legal Notices.