Description
The
output are implemented portal secutity configurations and mechanism to defend
external or internal portal attacks. This could include the implementation of
·
intrusion
dedection mechanisms
·
portal
monitoring environment
·
portal
administration authorizations
·
portal
content authorizations
·
password
policy
·
portal
session settings (e.g. expiration time)
It
might also be required to integrate external security and monitoring tools.
Process
Refer to
the Reference tab below for information on method of output creation.
Additional
Information
none