Protect your data to improve system redundancy and prevent unauthorized
access.
Procedure
- Secure data using OS security. Because the cluster
configuration file contains keystore password information from RSA authentication,
it is important that you secure this file by giving read and write access to
trusted individuals or groups only.
- Take steps to secure files. SAP recommends using disk
volume encryption and storing security-related configuration on a separate
disk.
- Use third-party source control to manage your project source files and provide
redundancy. When source files are checked out of the source control system, use
Studio to browse your source folder and make changes in the
source files.
- Perform regular backups of project data, including log stores.
- Configure and monitor the log file size. Having the size set too low will result in
files automatically overwriting themselves, resulting in a loss of data; having it
set too high will eventually flood a server’s hard drive with logging data. For more
information on log file size, see the
SAP Event Stream Processor: Developer Guide.
Next Steps
You can find more information on security best practices and procedures in the
SAP Event Stream Processor: Security Guide.