BMC Defender Apache TLS adapter security features
General security policies
You can implement some of the following security strategy elements besides using BMC Defender Apache TLS adapter features:
- Limiting access to secure platforms—The security of BMC software depends upon employing good protection at each platform executing the software. Permit only designated users to log on to the computer executing the BMC Defender Server and on to those computers executing BMC Defender agents.
Physical security—Monitor the physical security of the hardware and platforms.
- Security awareness—Your organization should create and publish a security policy. All system users should regularly review that policy. It might be helpful to designate a data security officer to:
- Promote security awareness.
- Audit security policy compliance.
- Protect cryptographic keys and modules against unauthorized access.
Any security solution should include the preceding policies. You cannot make your systems secure only by implementing data encryption. Implementing the Enhanced Encryption software package without providing physical security might actually make systems more vulnerable than before because the Enhanced Encryption software provides an illusion that the system is fully protected when, in reality, it is not.
Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*