In addition to the defenses provided by
Derby, you should take
advantage of defenses provided by your machine and intranet.
It is important to configure these defenses to protect
Derby from attacks by both
outsiders and insiders.
- Firewalls: Limit network access to the machine that runs
Derby.
- Accounts: Limit login access to the machine that runs
Derby. Centrally administer
accounts using, for instance, an LDAP server.
- Physical locks: Limit physical access to the machine that runs
Derby.
- Secure traffic: Encrypt the traffic that flows on your internal
network.
- File permissions: Restrict the file permissions granted to the
account that launches
Derby.
- Quotas: Limit the file space and CPU that an account can
consume.