Go to primary content
Siebel CRM Siebel Security Guide
Siebel Innovation Pack 2017, Rev. A
E24814-01
  Go to Documentation Home
Home
Go To Table Of Contents
Contents
Go To Index
Index

Previous
Previous
 
Next
Next
    View PDF

About This Appendix

This guide provides the information you need to protect your Siebel Business Applications deployment:

This appendix provides recommendations for safeguarding your Siebel CRM deployment from internal (intranet) and external (Internet) security threats. The most important reason for securing an application is to protect the confidentiality, integrity, and availability of an organization's critical information. However, to protect your Siebel Business Applications data, you must secure both your Siebel Business Applications and the computing environment in which they run.

This appendix describes how to harden your Siebel Business Applications deployment. Hardening is the process of protecting your computer network and applications from internal and external security threats by minimizing the areas of security vulnerability. Examples of hardening tasks include removing unnecessary software, services and utilities, disabling unused user accounts or login IDs, and setting up intrusion-detection systems. This appendix provides detailed procedural information on implementing Siebel security controls only where such information is not provided elsewhere on the Siebel Bookshelf.


Note:

The Siebel Bookshelf is available on Oracle Technology Network (http://www.oracle.com/technetwork/indexes/ documentation/index.html) and Oracle Software Delivery Cloud. It might also be installed locally on your intranet, or on a network location.

This appendix applies to Siebel CRM version 8.1 and 8.2 and is intended for Siebel administrators, security groups, and IT staff involved in securing environments for Siebel Business Applications. It is assumed that users are familiar with Siebel Business Applications, their architecture, and with the general security principles within an IT environment.


Note:

This appendix contains recommendations for securing the infrastructure in which Siebel Business Applications operate. You are responsible for ensuring all the security procedures recommended by your operating system and database vendors have been completed to provide a secure environment for Siebel Business Applications.