IG 7.1.2

Access

The following sections describe how to restrict non-essential access to your deployment, and reduce the amount of non-essential information that it provides.

Remove Non-Essential Features

The more features you have turned on, the more features you need to secure, patch, and audit. If something is not being used, uninstall it, disable it, or protect access to it.

Remove Non-Essential Access

Make sure that only authorized people can access your servers and applications through the appropriate network, using the appropriate ports, and presenting strong-enough credentials.

Make sure that users connect to systems through the latest versions of TLS, and audit system access periodically.

Restrict access to your monitoring data by protecting the Prometheus Scrape Endpoint and Common REST Monitoring Endpoint. For information, see Protecting the Monitoring Endpoints.

Prevent IG from scanning for changes to routes. For information, see scanInterval in Router.

Disable administration endpoints and Studio by setting the IG run mode to production. For information, see Switching From Development Mode to Production Mode.

Update Patches

Security vulnerabilities are the reason why you should keep your operating systems, web and application servers, and any other application in your environment up-to-date. Knowledge of vulnerabilities spreads fast across malicious users, who would not hesitate in trying to exploit them.

Review and follow the ForgeRock security advisories. Follow similar lists from all of your vendors.

Manage Cookies

Where possible, configure cookie properties to restrict how and where they can be used. For information, see cookie in JwtSession, and authCookie in CrossDomainSingleSignOnFilter.

Store a minimum amount of sensitive data in cookies, and only when necessary.

Change the default name of cookies to prevent them from being easily associated with an application.

Copyright © 2010-2023 ForgeRock, all rights reserved.