Audit logging – handler Details It is good practice to log the actions on the org.jboss.security class. This category includes all the security related...
Audit logging – Logger Details It is good practice to log the actions on the org.jboss.security class. This category includes all the security related...
Authentication Details To create a security domain for your Webservices endpoints, you can use different login modules. Solution Please consult the...
Cluster Authentication Details If a messaging cluster is used, authentication must be in place to prevent unauthorized nodes joining the cluster pool....
Deployment Scanner Details The deployment scanner scans the file system where your AS instance is running to automatically deploy any new application...
Disable stacktrace in response body Details Stacktraces in response bodies are useful for quick debugging in development and test environments. However in production, showing stracktraces...
Enable Encryption Details The ENCRYPT protocol uses a keystore in order to encrypt the communication layer of all the other protocols below...
Enable SSL Connector Details Enabling the SSL connector for the web subsystem will encrypt everything that is using that particular port Solution Configure...
file System permissions of log files Details In order to prevent modifications to your log files, you can restrict the OS permissions to only be readable/writable...
Granular log Levels Details If your application is handling sensitive data or you are regulated by any data security compliance, you may want...