... typical usage of SBM . ... ■ Logging into SBM ... Creating users in SBM Application Administrator ... White Paper Solutions Business Manager 11.4 Web Application Security ... ... No issues found SBM actively monitors for ... ... No issues found SBM uses industry best ... ... No issues found SBM actively monitors for ... grained configuration for allowed content. ... A4 Broken Access Control No issues found ... ... to ensure proper permissions to data. ... No issues found SBM provides a configuration ... A6 Sensitive Data Exposure No issues found Sensitive data stored by SBM is stored securely at rest and, if configured to do so, in transit to the server.
Beginning in SBM 11.4 , there is a scheduling engine which allows you to schedule various tasks to run on a specific date/time, daily, weekly, monthly, or yearly. There is also an "Advanced" option. With this option, you must write your own cron expression to specify the schedule.
A4 Insecure Direct Object References No issues found All access of objects inside of SBM go through a centralized access control to verify the user's permission . A5 Security Misconfiguration No issues found
A4 Insecure Direct Object References No issues found All access of objects inside of SBM go through a centralized access control to verify the user's permission . A5 Security Misconfiguration No issues found
A3 Cross Site Scripting (XSS) No issues found SBM actively monitors for XSS attacks and provides fine- grained configuration for allowed content. A4 Broken Access Control No issues found All access of objects inside of SBM go through a centralized access control to verify the user’s permission . All data requests are validated at the client and server levels to ensure proper permissions to data.
This document is for versions of SBM prior to 11.4. SBM 11.4 lets you set Tomcat memory allocation in the Tomcat Server section of the SBM Configurator.