Sensitive Data for P6 EPPM
Protect sensitive data in P6 EPPM, such as user names, passwords, and e-mail addresses. Use the process below to help during your security planning:
- Identify which P6 EPPM modules you will use.
- Determine which modules and interacting applications display or transmit data that your organization considers sensitive. For example, P6 displays sensitive data, such as costs and secure codes.
- Implement security measures in P6 EPPM to carefully grant users access to sensitive data. For example, use a combination of Global Profiles, Project Profiles, and OBS access to limit access to data.
- Implement security measures for applications that interact with P6 EPPM, as detailed in the documentation included with those applications. For example, follow the security guidance provided with Oracle WebLogic.
Planning Your Implementation
Day One Checklists
Which Components Do I Need?
Client and Server Requirements
Security Guidance Overview
Safe Deployment of P6 EPPM
Authentication Options for P6 EPPM
Authorization for P6 EPPM
Confidentiality for P6 EPPM
Reliability for P6 EPPM
Cookies Usage in P6 EPPM
Additional Sources for Security Guidance