Index
A C D E F G H I J L M N O P R S T U V W
A
- access, restricting
-
- database server, 5.1
- network, 3.2
- Siebel application, 6.7
- Siebel File System, 4.3
- ActiveX controls, enabling, 3.7.2, 3.7.2
- architecture, Siebel Security
-
- data encryption, 3.4
- recommended topologies, 3.2
- auditing Siebel Business Applications, 7.4
- authentication
-
- networks, 3.3
- Siebel application users, 6.4, 6.4
C
- client browsers
-
- communication encryption, 3.4.1
- software updates, 3.7.6
- Common Criteria for Information Technology Security Evaluation, A.2
- Common Vulnerability Scoring System, 8.2
- components, disabling, 6.3
- Critical Patch Updates, 2.3.2
D
- data confidentiality, end-to-end encryption, 3.4
- Data Vault, 5.3
- database server access, 5.1
- database storage, data confidentiality, 5.3
- denial of service attacks, preventing, 3.1.12
- deployment guidelines, 6.2
- DoCompression parameter, 3.1.3
E
- Email communications
-
- deleting processed email, 3.12.3
- encrypting between email servers and Siebel Servers, 3.12.2
- securing, 3.12
- encryption
-
- client browser and Web server, 3.4.1
- database data, 5.3
- eapps.cfg file, 3.5.6
- end-to-end for data confidentiality, 3.4
- jndi.properties file, 3.6.3
- network traffic, 3.4
F
- Federal Information Processing Standard (FIPS) 140, A.3
- files, protecting, 4.2
- firewalls
-
- deploying, 3.1
- large Siebel CRM deployment, 3.2.2
- medium Siebel CRM deployment, 3.2.1
G
- general security recommendations, 2.3
- guidelines for deployment, 6.2
H
- high-interactivity Siebel Business Applications, 3.7.2
- HTTP 1.1 protocol, 3.1.3
I
- Internet Protocol Security (IPsec), 3.1.11, 3.1.11
J
- jndi.properties file, encrypting, 3.6.3
L
- load balancers, about, 3.1.6
M
- message broadcasting, 6.10
- mobile physical device security, 3.10
N
- Network Address Translation, implementing, 3.1.5, 3.1.11
- network and infrastructure security recommendations, 3
- network security
-
- about, 3.1
- authentication, 3.3
- encrypt network traffic, 3.4
- firewalls, 3.1
- IPsec, 3.1.11, 3.1.11
- load balancers, 3.1.6
- Network Address Translation, 3.1.5, 3.1.11
- proxy servers, 3.1.7
- recommended topologies, 3.2
- routers, 3.1.4
- Virtual Private Networks (VPNs), 3.1.10
- network topologies, recommended
-
- about, 3.2, 3.2
- large deployments, 3.2.2
- medium deployments, 3.2.1
O
- operating systems
-
- about, 4.1
- applying patches and updates, 4.5
- protecting files, 4.2
- protecting resources, 4.2
- required tasks, 4.1
- securing, 4, 7
- Oracle Software Security Assurance program, 2.5
P
- passwords
-
- hashing, 6.5.3
- management policies, 6.4
- Siebel application policies, 6.5.1
- Siebel service owner, 4.4
- syntax rules, 6.5.2
- patches, management, 2.3.1
- PCI Data Security Standard (DSS)
-
- about, A.1
- Siebel support for, A.1
- physical security of client computers, 3.7.4
- port allocations for Siebel CRM, B.1
- processed email, deleting, 3.12.3
- protecting session IDs, 3.5.7
- proxy servers, about, 3.1.7
R
- reports, security, 3.13
- routers, 3.1.4
- r-services on UNIX, about, 3.6.2
S
- secure coding practices, 2.5
- Secure Sockets Layer, using with Siebel CRM, 2.6
- SecureLogin parameter, 3.5.8
- security
-
- resources, 2.2
- standards, 2.4
- threats, 2.2
- security assessments
-
- about, 8.1
- Common Vulnerability Scoring System, 8.2
- security recommendations, 2.3
- security Web sites, 2.2
- session IDs, protecting, 3.5.7
- Siebel Business Applications
-
- about, 6.1
- implementing access control, 6.7
- implementing user authentication, 6.4
- reports, 3.13
- securing, 6
- set-up requirements, 6.2
- Siebel service owner account, 4.4
- special users, 6.6
- testing, 8
- user authentication, 6.4
- Siebel clients
-
- browser software, 3.7.6
- enabling ActiveX controls, 3.7.2
- encrypting communications, 3.4.1
- physical security, 3.7.4
- securing, 3.7
- security patches, 3.7.7
- Siebel components, disabling, 6.3
- Siebel database
-
- about, 5
- auditing, 7.2
- backups, 5.4
- encrypting communications, 3.4.3
- protecting sensitive data in, 5.3
- restricting access, 5.1
- reviewing authorization policies, 5.2
- securing, 5
- user passwords, 6.5.3
- Siebel Document Server, securing, 3.11
- Siebel File System
-
- excluding unsafe file types, 4.3.4
- restricting access, 4.3
- Siebel mobile clients
-
- Siebel Mobile, 3.10
- Siebel Remote, 3.9
- Siebel Mobile, security, 3.10
- Siebel Open UI, about, 3.7.1
- Siebel Remote
-
- encrypt database data, 3.9.7
- password management policies, 3.9.9
- synchronization framework, 3.9.1
- Siebel Reports environment, securing, 3.13
- Siebel Server
-
- data confidentiality to database, 3.4.3
- encrypting communications, 3.4.2, 3.4.3
- restricting access, 3.6.2
- r-services, deleting, 3.6.2
- Siebel Web server
-
- directories, 3.5.3
- eapps.cfg file, 3.5.6
- encrypt communications, 3.5.5
- file permissions, 3.5.4
- securing user session IDs, 3.5.7
- Siebel Web Server Extension (SWSE), security features, 3.5.8
- SISNAPI (Siebel Internet Session API), 3.4.2
- special user privileges, 6.6
- SSL, about using with Siebel CRM, 2.6
- standards
-
- Common Criteria for Information Technology Security Evaluation, A.2, A.3
- Payment Card Industry Data Security Standard, 2.4, A.1
- Personally Identifiable Information standard, 2.4
T
- testing system security, 8.1
- Transparent Data Encryption, 5.3
- Transport Layer Security (TLS)
-
- Email server and Siebel Server, 3.12.2
- Web client and Web server, 3.4.1, 3.4.1
- Web server and Siebel Server, 3.4.2
U
- unsafe file types, excluding from Siebel File System, 4.3.4
- user authentication, about, 6.4
- user privileges, special users, 6.5.2
V
- Virtual Private Networks (VPNs), 3.1.10
- vulnerabilities
-
- denial of service attacks, 3.1.12
- description, 2.2
- scoring, 8.2
- session ID spoofing, 3.5.7
W
- Web applications, security, 6.1
- Web servers
-
- about, 3.5.7
- data confidentiality to Siebel Server, 3.4.2, 3.6.1
- deleting subdirectories, 3.5.3
- eapps.cfg file, 3.5.6
- encrypting communications, 3.4.2
- file permissions, 3.5.4