User guide
Chapter 1: Security Risks
1-40
Countermeasures Against Exploitation of Information Recorded in Files
The information required for operation of the Interstage Management Console and Interstage Operation
Tool is stored in files. The contents of these files are also resources, and it is important to prevent
exploitation of them. An effective means of protecting these files is to set appropriate access
permissions for them. For Solaris OE or Linux systems, refer to Enhancing Security (Protecting
Interstage Resources) in Appendix A.
Countermeasures Against Damage to Files
There are important files, such as the environment definition file, in the Interstage Management Console
and Interstage Operation Tool environment. If information in these files is tampered with, it may disable
the Interstage Operation Tool and cause various problems. An effective countermeasure against this
threat is to set appropriate access permissions for these files. For Solaris OE or Linux systems, refer to
Enhancing Security (Protecting Interstage Resources) in Appendix A.
Periodic backups are also effective. For backup information, refer to Maintenance (Resource Backup)
in the Operator's Guide.