Skip to main content

Securing Your Instance

Because security requires actions within an instance and in an instance’s larger environment, InterSystems IRIS provides both guidance and tools to help secure an instance. These include:

  • A checklist of topics to review as you prepare to deploy InterSystems IRIS.

  • A guide and tools for securing an instance using its built-in features.

  • A checklist for hardening security for an instance at the operating-system level and by managing its processes.

Security management is protected by various resources and requires various privileges depending on how you administer security:

  • To administer security in general, use the %SecurityAdministrator role.

  • To use the APIs provided by various security classes, you must have the both %DB_IRISSYS:R and %Admin_Secure:U privileges.

This reference includes the following sections:

FeedbackOpens in a new tab