Security Considerations in P6 EPPM
For any company that deals with sensitive data, keeping it secure is crucial to success. While hosting P6 EPPM data on the Oracle Cloud provides security measures, it cannot do everything. For example, it cannot prevent phishing attempts or other attacks that exploit gaps in its users' security awareness. That is why it is important for everyone who works with P6 EPPM, whether hosted on-premises or on the Oracle Cloud, to understand what they can do to keep data secure.
Security is everyone's business. This chapter is for anyone who uses, manages, or is just interested in P6 EPPM. If you are a security expert or administrator, this is a good place to start. It should help you see the big security picture and understand the most important guidelines related to security in P6 EPPM.
For further information on configuring your on-premises P6 EPPM environment securely, see the P6 EPPM Security Guide for On-Premises.
Related Topics
Authentication: How Users Sign On
Authorization: What Users Can Access
Privacy and Personal Information
Data Export and Integration with Other Applications
Security for Developers - Web Services Security
Establishing Security Contacts
Title and Copyright Information
About the P6 EPPM Application Administration Guide
Managing Personal Information in P6 EPPM
Administering P6 Professional for Cloud
P6 Integration API Setup Tasks for On-Premises
P6 EPPM Web Services Setup Tasks
Primavera Risk Analysis Setup Tasks
Overview of Eventing (On Premises Only)
Last Published Tuesday, March 26, 2024