Show TOC

Safeguarding Your DataLocate this document in the navigation structure

Protect your data to improve system redundancy and prevent unauthorized access.

Procedure

  • Secure data using OS security. Because the cluster configuration file contains keystore password information from RSA authentication, it is important that you secure this file by giving read and write access to trusted individuals or groups only.
  • Take steps to secure files. SAP recommends using disk volume encryption and storing security-related configuration on a separate disk.
  • Use third-party source control to manage your project source files and provide redundancy. When source files are checked out of the source control system, use Studio to browse your source folder and make changes in the source files.
  • Perform regular backups of project data, including log stores.
  • Configure and monitor the log file size. Having the size set too low will result in files automatically overwriting themselves, resulting in a loss of data; having it set too high will eventually flood a server’s hard drive with logging data. For more information on log file size, see the SAP Event Stream Processor: Developer Guide.

Next Steps

You can find more information on security best practices and procedures in the SAP Event Stream Processor: Security Guide.