Protect
your
data
to improve system redundancy and prevent unauthorized access.
Sybase recommends
that
you:
- Secure data using OS security. Because the cluster configuration
file contains keystore password information from RSA authentication, it is important
that you secure this file by giving read and write access to trusted individuals or
groups only.
- Take steps to secure files. Sybase recommends using disk volume
encryption and storing security-related configuration on a separate disk.
- Use third-party source control to manage your
project
source
files
and provide
redundancy.
When
source
files
are checked out
of the source control system, use
ESP
Studio to browse your source folder and make changes in the source files.
- Perform regular backups of project data, including log stores.