5.4. Security Settings

A complete approach to security requires proactive approaches to preventing, detecting, and responding to attacks. A complete discussion of security is beyond the scope of this guide. The purpose of this section is to cover standard precautions and recommendations to help secure a Red Hat Web Application Framework installation.