Hardening Guide
Introduction
The Hardening Guide provides security configuration documentation for deploying Data Security Edition in hardened environments. This section covers specialized security requirements and compliance configurations to ensure your ECA deployment meets enterprise security standards.
Security Compliance
See Also
For additional security and configuration information, refer to:
- Disaster Recovery Hardening Guide - Eyeglass hardening and STIG configuration
- ECA Installation Guide - Initial ECA deployment and setup
- Data Security Configuration - Configure data security features
- Platform Support - Supported platforms and compatibility