Security Configuration

The documentation for setting up and configuring Archer includes instructions for a secure configuration.

For companies that require a review of specific security options for features, the following table provides a list of feature areas that have specific security settings (this list may not contain all settings; it is meant only to be used as a general reference).

For an overview of a secure deployment, see Secure Deployment and Usage Settings.

The following table describes the feature areas and their reference information.

Feature Area

Reference Information

Authentication

Authorization

User Access Control

Network Security

Data Security

Cryptography

Auditing and Logging

Auditing and Logging

Physical Security

Physical Security Controls Recommendations

Serviceability

Maintaining Security

Additional Security Considerations