![MACROMEDIA BREEZE 5 Installation And Configuration Manual Download Page 16](http://html2.mh-extra.com/html/macromedia/breeze-5/breeze-5_installation-and-configuration-manual_3272415016.webp)
16
Chapter 1: Before You Begin
The discussion on security is divided into the following sections:
•
Security levels
•
Solutions for a secure infrastructure
•
Best practices
•
Additional references
Security levels
When planning a security strategy, it is important to consider the various layers in a deployed
server environment, and devise a security plan for each layer. Typically, a comprehensive security
strategy incorporates the following elements:
•
Infrastructure security
•
Application-level security
•
Physical security
Infrastructure security
Infrastructure security is by far the most important, but most overlooked, aspect of securing
Breeze. It is up to your IT department or administrator to provide a secure infrastructure for
Breeze.
There are three parts to providing a secure infrastructure for Breeze:
•
Network security
•
Breeze web server
•
Database server security
The following sections describe a secure infrastructure. The security measures you implement
depend on whether your Breeze system consists of a single server running in the DMZ
(demilitarized zone) or an elaborate multiserver system running with different trusted zones.
Network security
Breeze relies on several private TCP/IP services for its communications. These services open
several ports and channels for private communication. These ports must be protected
from outside users. Breeze’s design requires the environment to provide security for these
communications. Sensitive ports should be placed behind a firewall that separates them from
non-trusted computers.
If you intend to have users access Breeze on your intranet, you should place the Breeze servers and
the Breeze database in a separate subnet, separated by a firewall. This configuration of the firewall
should take into consideration all Breeze ports and whether they are configured for inbound or
outbound traffic.
If you intend to have users access Breeze on the Internet, it is extremely important that you
separate the Breeze servers from the Internet with a firewall. If you do not take the necessary steps
to secure the Breeze servers, you are leaving your valuable information available for anyone to
steal. For more information, see “Security resources and references” on page 22.
Summary of Contents for BREEZE 5
Page 1: ...Installation and Configuration Guide...
Page 30: ...30 Chapter 1 Before You Begin...
Page 56: ...56 Chapter 3 Installing and Upgrading Breeze...
Page 100: ...100 Index...