Securing Your Instance
Because security requires actions within an instance and in an instance’s larger environment, InterSystems IRIS provides both guidance and tools to help secure an instance. These include:
-
A checklist of topics to review as you prepare to deploy InterSystems IRIS.
-
A guide and tools for securing an instance using its built-in features.
-
A checklist for hardening security for an instance at the operating-system level and by managing its processes.
Security management is protected by various resources and requires various privileges depending on how you administer security:
-
To administer security in general, use the %SecurityAdministrator role.
-
To use the APIs provided by various security classes, you must have the both %DB_IRISSYS:R and %Admin_Secure:U privileges.
This reference includes the following sections: