Hitachi

uCosminexus Application Server Security Management Guide


4.1 Organization of this chapter

This chapter describes how to approach the design of the system and what procedures and audit methods are necessary and appropriate in order to configure and operate a secure system. The table below shows how the chapter is organized.

Table 4‒1: Organization of this chapter (Considerations in the Design of a Secure System)

Part

Title

Relevant information

Description

Overview of considerations in the design of a secure system

4.2

Considering the configuration of a secure system

4.3

Considering the users of the system

4.4

Considering the resources handled by the system

4.5

Checking the preconditions for a secure system

4.6

Analyzing expected threats

4.7

Considering countermeasures

4.8

Considering work procedures

4.9

Checking how to audit the system

4.10

Considering the security of systems that use external networks

4.11

Note: This chapter does not include information on implementation, setup, operation, or precautions.