Network Deployment (Distributed operating systems), v8.0 > Tune performance > Tune security
Tune, hardening, and maintaining security configurations
After installing WAS, there are several considerations for tuning, strengthening, and maintaining the security configuration. The following topics are covered in this section:
Procedure
- Tune security configurations We can tune the security configuration to balance performance with function. We can achieve this balance following considerations for tuning general security, Common Secure Interoperability version 2 (CSIv2), LDAP authentication, web authentication, and authorization. For more information on tuning security, see Tune security configurations.
- Hardening security configurations Several methods exist that you can use to protect your infrastructure and applications from different forms of attack. For more information on hardening the security, see Hardening security configurations.
- Secure passwords in files Password encryption and encoding can add protection to passwords existing in files. For more information on encoding and encrypting passwords, see Secure passwords in files.
What to do next
For additional information about hardening security configurations, see the WAS security web page.
Related
Tune security configurations
Hardening security configurations
Secure passwords in files
Enablement and migration considerations of Security hardening features