Siebel Security Hardening Guide > Securing the Siebel Database >
Reviewing Authorization Policies
Implement the following recommendations:
- Restrict access to SQL trace and log files.
In a production environment, do not run Siebel Business Applications with a high level of logging, for example, use log level 2, not 5.
- Restrict remote access to the operating system, such as through Telnet (Terminal Network), and restrict remote access diagnostics programs.
- Limit access to the data dictionary files; these files store metadata about schema definitions, visibility rules, and other items.
|