Best Practices

Refer to Logs in this document for information on additional recommendations with regard to securing the log files generated by the various ITBA product components, and the third-party software components such as Apache Tomcat, etc... Log files contain sensitive security information (especially when they contain debug or tracing data) and as such must be given careful consideration as to who may access them.