Recommendations


With all the talk about security on the Internet and in the applications that are out there, we must not forget about keeping company "jewels" safe. Here are some recommendations that were covered in this chapter:

  • At a minimum, use the four-layer approach talked about in detail in this chapter:

    • Physical security Doors, locks, cameras, and so on.

    • Tracking source changes The build process.

    • Binary/release bits assurance The tools process.

    • IT infrastructure Company-wide policy and security.

  • Consider the .NET platform as a means of security.

  • Look into software restriction policies that are in Microsoft Windows XP and Windows Server 2003.

  • Start worrying about security before a breach occurs.



The Build Master(c) Microsoft's Software Configuration Management Best Practices
The Build Master: Microsofts Software Configuration Management Best Practices
ISBN: 0321332059
EAN: 2147483647
Year: 2006
Pages: 186

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net