User guide
Chapter 1: Security Risks
1-6
Resources to be Protected
The following table lists the resources that are used when the corresponding function available for a
J2EE application is used. If high security is required, it is best to protect these resources.
Table 1-4 Resources to be Protected
Function Resource to be protected
User authentication Password used for authentication
Connection to Web server(When
InfoProvider Pro is used)
Log files for InfoProvider Pro
Access log
Error log
Access log of the extended CGI System log
Connection to Web server(When
Interstage HTTP Server is used)
Log files for Interstage HTTP Server
Access log
Error log
Invocation of Servlet and EJB IJServer log file
Container log
Container information log
Invocation of Servlet (when an
V5.0.1 or earlier version of Servlet
service is used)
Log file for JServlet environment
Log file for Servlet service
Servlet gateway log file
Activation log file of the Servlet container
Log file for standard output/error output of the Servlet container
Log file of Servlet
Log file of the Servlet container
Invocation of EJB (during
operation in old version compatible
environments)
Log file for EJB environment
Log file for standard output output of EJB application
Log file for standard error output of EJB application
Reading data from a database Log in the database
Data in the database
Writing data to a database Log in the database
Data in the database
Operating environment setup for
Web Server(When Interstage
HTTP Server is used)
Definition file for the Interstage HTTP Server
Operating environment setup for
Web Server(When InfoProvider
Pro is used)
Definition file for the InfoProvider Pro