By Jens Engelke
It is important to secure your IBMÂ® Business Process Manager environment.
If you are on IBM BPM V7.5.1, consult the IBM RedbooksÂ® publication IBMÂ BusinessÂ ProcessÂ ManagerÂ Security:Â ConceptsÂ andÂ Guidance, which provides information about security that concerns an organizationâ€™s business process management (BPM) program, common security holes that often occur in this field, and techniques for rectifying these holes. This book documents preferred practices and common security hardening exercises that will help you achieve a secured IBM BPM installation.
If you are on IBM BPM V8.0, see SecuringÂ IBMÂ BusinessÂ ProcessÂ ManagerÂ andÂ application.
If you are on IBM BPM V8.5, see SecuringÂ IBMÂ BusinessÂ ProcessÂ ManagerÂ andÂ applications.
If you are on IBM BPM V8.5.7, see Creating a secure environment.
To stay up-to-date with the latest security information about IBM BPM, see IBM Smarter Process Security.
Applicable releases: All