Securing your deployment v10

To harden your PEM deployment against attack, consider the following measures:

  1. Ensure PEM itself, your operating system, and third party libraries are regularly updated. Without the most recent security patches, your system is vulnerable to cyberattacks. Please refer to the Dependencies page to learn more about the system packages used by PEM.

  2. Ensure the Postgres instance used as the PEM server is kept up to date and apply Postgres security best practices.

  3. Secure the web server

  4. Configure the security settings of the PEM web application as appropriate.