About creating a security plan
This topic provides security recommendations and guidelines
for running Sterling Selling and
Fulfillment Foundation.
It is intended to help you create a reasonably secure implementation
of the application.
Security - planning your deployment architecture
Prior to procuring and implementing the hardware and software
that make up Sterling Selling and
Fulfillment Foundation,
you need to plan your deployment architecture.
Web security planning
It is highly recommended that a security audit is made
prior to deployment, and log files are written to several servers.
Database security
Set up separate accounts on the database server for installing
the Sterling Selling and
Fulfillment Foundation schema
and for accessing the application database.
Adding Sterling Selling and Fulfillment Foundation as a trusted web site
Set Sterling Selling and
Fulfillment Foundation to
be recognized as a trusted Web site. Otherwise, it might result in
certain popup windows such as date and time selection to display a
status bar, thereby hiding certain the action buttons.