It is good practice to establish a thorough security policy and make sure that the policy is enforced. SGD must be configured to comply with your security policy.
SGD supports the following general principles of information security:
Minimize the attack surface. All SGD network traffic can be directed through a single port, usually port 443. This is achieved by using the SGD Gateway or by running SGD servers in firewall traversal mode.
Least privilege permissions. Application files and generated files such as password, audit, and log files are given the most restrictive permissions possible.
Secure installation. Following a default installation, SGD is configured automatically to use secure connections.
Secure connections. Transport Layer Security (TLS) or Secure Sockets Layer (SSL) are used to provide secure connections to an SGD server.
Monitor system activity. SGD includes support for logging and auditing of system activity.