About This Chapter
This chapter provides the information you need to protect your Siebel CRM deployment:
It describes the Siebel security architecture and security concepts.
It outlines the security controls provided by Siebel CRM.
It provides detailed procedural information on how to implement security controls to secure your application.
This chapter provides recommendations for safeguarding your Siebel CRM deployment from internal (intranet) and external (Internet) security threats. The most important reason for securing an application is to protect the confidentiality, integrity, and availability of an organization's critical information. However, to protect your Siebel data, you must secure both your Siebel Business Applications and the computing environment in which they run.
This chapter describes how to harden your Siebel CRM deployment. Hardening is the process of protecting your computer network and applications from internal and external security threats by minimizing the areas of security vulnerability. Examples of hardening tasks include removing unnecessary software, services and utilities, disabling unused user accounts or login IDs, and setting up intrusion-detection systems. This chapter provides detailed procedural information on implementing Siebel security controls only where such information is not provided elsewhere on the Siebel Bookshelf.
This chapter applies to Siebel CRM version 8.1 and 8.2 and is intended for Siebel administrators, security groups, and IT staff involved in securing environments for Siebel CRM. It is assumed that users are familiar with Siebel Business Applications, their architecture, and with the general security principles within an IT environment.