Difference between revisions of "Category:BP7 Publish operational security guidelines"
|(One intermediate revision by one user not shown)|
Latest revision as of 13:03, 22 May 2009
Security does not end when an application is completed and deployed in a production environment. Making the most out of existing network and operational security investments requires that you inform and educate those tasked with monitoring and managing the security of running systems with advice and guidance on the security requirements your application demands, and how best to make use of the capabilities you’ve built into your application.