Skip Headers
Siebel CRM Siebel Security Hardening Guide
Siebel Innovation Pack 2015
E24815-01
  Go to Documentation Home
Home
Go To Table Of Contents
Contents

Previous
Previous
 
    View PDF

Index

A  C  D  E  F  G  H  I  J  L  M  N  O  P  R  S  T  U  V  W 

A

access, restricting
database server, 5.1
network, 3.2
Siebel application, 6.7
Siebel File System, 4.3
ActiveX controls, enabling, 3.7.2, 3.7.2
architecture, Siebel Security
data encryption, 3.4
recommended topologies, 3.2
auditing Siebel Business Applications, 7.4
authentication
networks, 3.3
Siebel application users, 6.4, 6.4

C

client browsers
communication encryption, 3.4.1
software updates, 3.7.6
Common Criteria for Information Technology Security Evaluation, A.2
Common Vulnerability Scoring System, 8.2
components, disabling, 6.3
Critical Patch Updates, 2.3.2

D

data confidentiality, end-to-end encryption, 3.4
Data Vault, 5.3
database server access, 5.1
database storage, data confidentiality, 5.3
denial of service attacks, preventing, 3.1.12
deployment guidelines, 6.2
DoCompression parameter, 3.1.3

E

Email communications
deleting processed email, 3.13.3
encrypting between email servers and Siebel Servers, 3.13.2
securing, 3.13
encryption
client browser and Web server, 3.4.1
database data, 5.3
eapps.cfg file, 3.5.6
end-to-end for data confidentiality, 3.4
jndi.properties file, 3.6.3
network traffic, 3.4

F

Federal Information Processing Standard (FIPS) 140, A.3
files, protecting, 4.2
firewalls
deploying, 3.1
large Siebel CRM deployment, 3.2.2
medium Siebel CRM deployment, 3.2.1

G

general security recommendations, 2.3
guidelines for deployment, 6.2

H

handheld physical device security, 3.11
high-interactivity Siebel Business Applications, 3.7.2
HTTP 1.1 protocol, 3.1.3

I

Internet Protocol Security (IPsec), 3.1.11, 3.1.11

J

jndi.properties file, encrypting, 3.6.3

L

load balancers, about, 3.1.6

M

message broadcasting, 6.10

N

Network Address Translation, implementing, 3.1.5, 3.1.11
network and infrastructure security recommendations, 3
network security
about, 3.1
authentication, 3.3
encrypt network traffic, 3.4
firewalls, 3.1
IPsec, 3.1.11, 3.1.11
load balancers, 3.1.6
Network Address Translation, 3.1.5, 3.1.11
proxy servers, 3.1.7
recommended topologies, 3.2
routers, 3.1.4
Virtual Private Networks (VPNs), 3.1.10
network topologies, recommended
about, 3.2, 3.2
large deployments, 3.2.2
medium deployments, 3.2.1

O

operating systems
about, 4.1
applying patches and updates, 4.5
protecting files, 4.2
protecting resources, 4.2
required tasks, 4.1
securing, 4, 7
Oracle Software Security Assurance program, 2.5

P

passwords
hashing, 6.5.3
management policies, 6.4
Siebel application policies, 6.5.1
Siebel service owner, 4.4
syntax rules, 6.5.2
patches, management, 2.3.1
PCI Data Security Standard (DSS)
about, A.1
Siebel support for, A.1
physical security of client computers, 3.7.4
port allocations for Siebel CRM, B.1
processed email, deleting, 3.13.3
protecting session IDs, 3.5.7
proxy servers, about, 3.1.7

R

reports, security, 3.14
routers, 3.1.4
r-services on UNIX, about, 3.6.2

S

secure coding practices, 2.5
Secure Sockets Layer, using with Siebel CRM, 2.6
SecureLogin parameter, 3.5.8
security
resources, 2.2
standards, 2.4
threats, 2.2
security assessments
about, 8.1
Common Vulnerability Scoring System, 8.2
security recommendations, 2.3
security Web sites, 2.2
session IDs, protecting, 3.5.7
Siebel Business Applications
about, 6.1
implementing access control, 6.7
implementing user authentication, 6.4
reports, 3.14
securing, 6
set-up requirements, 6.2
Siebel service owner account, 4.4
special users, 6.6
testing, 8
user authentication, 6.4
Siebel clients
browser software, 3.7.6
enabling ActiveX controls, 3.7.2
encrypting communications, 3.4.1
physical security, 3.7.4
securing, 3.7
security patches, 3.7.7
Siebel components, disabling, 6.3
Siebel database
about, 5
auditing, 7.2
backups, 5.4
encrypting communications, 3.4.3
protecting sensitive data in, 5.3
restricting access, 5.1
reviewing authorization policies, 5.2
securing, 5
user passwords, 6.5.3
Siebel Document Server, securing, 3.12
Siebel File System
excluding unsafe file types, 4.3.4
restricting access, 4.3
Siebel Handheld, security, 3.11
Siebel mobile clients
Siebel Handheld, 3.11
Siebel Remote, 3.9
Siebel Wireless, 3.10
Siebel Open UI, about, 3.7.1
Siebel Remote
encrypt database data, 3.9.7
password management policies, 3.9.9
synchronization framework, 3.9.1
Siebel Reports environment, securing, 3.14
Siebel Server
data confidentiality to database, 3.4.3
encrypting communications, 3.4.2, 3.4.3
restricting access, 3.6.2
r-services, deleting, 3.6.2
Siebel Web server
directories, 3.5.3
eapps.cfg file, 3.5.6
encrypt communications, 3.5.5
file permissions, 3.5.4
securing user session IDs, 3.5.7
Siebel Web Server Extension (SWSE), security features, 3.5.8
Siebel Wireless, security, 3.10
SISNAPI (Siebel Internet Session API), 3.4.2
special user privileges, 6.6
SSL, about using with Siebel CRM, 2.6
standards
Common Criteria for Information Technology Security Evaluation, A.2, A.3
Payment Card Industry Data Security Standard, 2.4, A.1
Personally Identifiable Information standard, 2.4

T

testing system security, 8.1
Transparent Data Encryption, 5.3
Transport Layer Security (TLS)
Email server and Siebel Server, 3.13.2
Web client and Web server, 3.4.1, 3.4.1
Web server and Siebel Server, 3.4.2

U

unsafe file types, excluding from Siebel File System, 4.3.4
user authentication, about, 6.4
user privileges, special users, 6.5.2

V

Virtual Private Networks (VPNs), 3.1.10
vulnerabilities
denial of service attacks, 3.1.12
description, 2.2
scoring, 8.2
session ID spoofing, 3.5.7

W

Web applications, security, 6.1
Web servers
about, 3.5.7
data confidentiality to Siebel Server, 3.4.2, 3.6.1
deleting subdirectories, 3.5.3
eapps.cfg file, 3.5.6
encrypting communications, 3.4.2
file permissions, 3.5.4