Security Considerations in P6 EPPM

For any company that deals with sensitive data, keeping it secure is crucial to success. While hosting P6 EPPM data on the Oracle Cloud provides security measures, it cannot do everything. For example, it cannot prevent phishing attempts or other attacks that exploit gaps in its users' security awareness. That is why it is important for everyone who works with P6 EPPM, whether hosted on-premises or on the Oracle Cloud, to understand what they can do to keep data secure.

Security is everyone's business. This chapter is for anyone who uses, manages, or is just interested in P6 EPPM. If you are a security expert or administrator, this is a good place to start. It should help you see the big security picture and understand the most important guidelines related to security in P6 EPPM.

For further information on configuring your on-premises P6 EPPM environment securely, see the P6 EPPM Security Guide for On-Premises.

Related Topics

Some Security Basics

Authentication: How Users Sign On

Authorization: What Users Can Access

Endpoint Security

Privacy and Personal Information

Data Export and Integration with Other Applications

Security for Developers - Web Services Security

Establishing Security Contacts

About the P6 EPPM Application Administration Guide

Managing Personal Information in P6 EPPM

Implementation Strategy

Implementation Process

P6 Setup Tasks

Administering P6 Professional for Cloud

P6 Team Member Setup Tasks

P6 Integration API Setup Tasks for On-Premises

P6 EPPM Web Services Setup Tasks

Primavera Risk Analysis Setup Tasks

Overview of Eventing

Oracle BPM Setup Tasks

Copyright



Legal Notices | Your Privacy Rights
Copyright © 1999, 2020

Last Published Monday, September 27, 2021