Security Issues (Magic xpi 3.x)
Once your process is clear and visible it is time to take a look at security considerations, including:
-
Access to resources – FTP sites, Servers, application servers, DBMS, and more
-
Support for Web services security
-
Need to encrypt data transformation – in a file level (XML) in the database
-
Need to identify users – from an LDAP server, using an internal mechanism
You should go back to your business process drawing and make sure all security issues are marked and highlighted in the relevant places.
If there is a need to encrypt or decrypt data you should add these steps to the relevant process or sub-process.
Tip:
|
It is a good idea to create a subroutine that handles tasks, such as the encryption and decryption of data.
|
|