WIN1, Step 5. Post-Requisite Actions and Other Considerations
Step |
Activity |
How to Do It |
ü |
Security considerations |
Consider setting some important files as read-only for security reasons. For example, deployed system XML definition files should be set to read-only to prevent end-users from accidentally editing the content of the file.
|
|
|
Backup and Recovery strategy |
You should have a regular backup and recovery strategy in place for your target system. |
|
|
Maintenance strategy |
You should devise a strategy for deploying modifications you make to your VLF applications. |
|
|