Take additional measures to safeguard your data to provide redundancy and prevent
unauthorized access.
Event Stream Processor keeps configuration information, server logs, and persistent
logs in a file system. Sybase recommends you:
- Secure data and files using OS security. Because the cluster configuration file
contains keystore password information, it is important that you secure this file by
giving read and write access to trusted individuals or groups only.
- Take appropriate measures to secure these files. Sybase recommends using disk
volume encryption and storing security-related configuration information on a
separate disk
- For additional security and data redundancy, you can use third-party source control
to manage your source files. Use the third-party tools to check your source code in
and out, and use the ESP Studio to browse your source folder and make updates and
changes in the source files that are checked out.