Getting Started
Initial steps to deploy and configure the software
1 minute read
The security guidelines define the activities that must be carried out to secure the DataPorts environment, ensuring that the Confidentiality, Integrity and Availability of data and services are not threatened. The objective is to define a reliable context that fits all information management methods, procedures and standards in the DataPorts environment. In order to do so, relevant and suitable security measures are identified, defined and proposed to address the relevant threats identified that may impact the DataPorts platform and environment, potentially compromising the security dimensions of data and functions. These guidelines cover the identification, prevention and protection against threats, as well as the continuous improvement of the security level by defining periodic activities like risk assessments, periodic audits and vulnerability management processes.
Initial steps to deploy and configure the software
User guides to replicate Keycloak configuration and test it