User guide
Chapter 1: Security Risks
1-38
Resources to be Protected
This section describes the resources to be protected when Multi Server Management is used.
Functions to be Protected
The following functions and procedures should be protected:
• Operations using the Interstage Management Console
Resources to be Protected
The following resources should be secured to protect the functions they provide:
Table 1-12 Resources to be Protected
Function Resource
User authentication User ID and password used for authentication
Connection to Web server (When
Interstage HTTP Server is used)
Definition file for Interstage HTTP Server
Connection to Web server
(When InfoProvider Pro is used)
Definition file for InfoProvider Pro
Interstage Operation Tool
environment setup
Definition file for the Interstage Operation Tool
Possible Security Risks to Resources
The following security threats may occur during operation of the Interstage Management Console and
Interstage Operation Tool.
Table 1-13 Possible Security Risks to Resources
Resource Possible threat
User authentication
- Exploitation of user IDs and passwords
- Decryption of user IDs and passwords
Definition file for Interstage HTTP Server
- Tampering with data recorded in the file
- Exploitation of information recorded in files
- Damage to files
Definition file for the Interstage Operation
Tool
- Tampering with data recorded in the file
- Exploitation of information recorded in files
- Damage to files