WIN1, Step 5. Post-Requisite Actions and Other Considerations

VLF Deployment Check Lists

 

WIN1, Step 5. Post-Requisite Actions and Other Considerations

 

Step

 Activity

How to Do It

ü

Security considerations

Consider setting  some important files as read-only for security reasons.

For example, deployed system XML definition files should be set to read-only to prevent end-users from accidentally editing the content of the file.

 

 

 

 

Backup and Recovery strategy

You should have a regular backup and recovery strategy in place for your target system.

 

 

 

Maintenance strategy

You should devise a strategy for deploying modifications you make to your VLF applications.