Secure Environment

To ensure secure deployment, EMS administration must meet certain criteria.

These criteria include:

  • Correct Installation: EMS is correctly installed and configured.
  • Physical Controls: The computers where EMS is installed are located in areas where physical entry is controlled to prevent unauthorized access. Only authorized administrators have access, and they cooperate in a benign environment.
  • Domain Control: The operating system, file system and network protocols ensure domain separation for EMS, to prevent unauthorized access to the server, its configuration files, LDAP servers, etc.
  • Benign Environment: Only authorized administrators have physical access or domain access, and those administrators cooperate in a benign environment.