Skip to main content

Identifying and mitigating security risks

2 Tasks

20 mins

Visible to: All users
Advanced Pega Platform 8.6 English
Verify the version tags to ensure you are consuming the intended content or, complete the latest version.

Scenario

Front Stage's Booking application is going live in the near future. Before promoting the application to production, a security review is required. Any security risks that are found require a review.

Perform a security review of Front Stage's Booking application by using the security checklist. Provide recommendations to strengthen the security of the application.

Some changes can be implemented directly in the development environment, while others are configured when the application has been promoted to the production environment. Create a list of configuration tasks that need to be carried out when the application has been promoted to other environments for changes that cannot be implemented in the development environment.

You must initiate your own Pega instance to complete this Challenge.

Initialization may take up to 5 minutes so please be patient.

Detailed Tasks

1 Tasks to perform on the development environment

  1. Disable unneeded out-of-the-box operators.
  2. Change passwords for used out-of-the-box operators.
  3. Fix any issues found by the security analyzer.
  4. Fix any security issues in the Guardrail report.
  5. Ensure that timeouts are set up at the application server level, requestor level, and Access Group level that are of an appropriate length.
  6. Ensure that the Unauthenticated Access Group has the minimum required access to rules.
  7. Add the <env name="alerts/suppressalerts" value="true" /> setting to the prconfig.xml file to ensure that sensitive property values, such as customer account numbers or Social Security numbers, do not appear in the Alert log.
  8. In each ruleset version, on the Security tab, select Lock this Version, and enter a password.
  9. In each ruleset rule, on the Security tab, select Use checkout? and enter three distinct passwords to limit the ability to add versions, update versions, and update the ruleset rule itself.
  10. Apply the correct type for all properties.
  11. Apply privileges across all the relevant rules (flow actions, reports, flows).
  12. Review the Unauthenticated access group to make sure that it has the minimum required access to rules.

2 Tasks to perform outside of the development environment

  1. Update prconfig settings.
  2. Update dynamic system settings.
  3. Remove any unnecessary resources/servlets from the web.xml, and renaming default servlets where applicable, particularly PRServlet.
  4. If using https, ensure that testing environments are available to test with SSL enabled.
  5. Ensure that the system has been set up using a JDBC connection pool approach through the application server, rather than the database being set up in the prconfig.xml.
  6. Rename and deploy the prhelp.war once per environment (potentially on its own node to avoid being able to pick up the endpoint URL from the pop-up window).
  7. Rename and redeploy the prweb.war for each node.


Available in the following mission:

If you are having problems with your training, please review the Pega Academy Support FAQs.

Did you find this content helpful?

Want to help us improve this content?

We'd prefer it if you saw us at our best.

Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.

Close Deprecation Notice