Securing Your Instance Security Strategy Prepare for InterSystems Security Initial InterSystems Security Settings Configure User Accounts Prepare the Security Environment for Kerberos Tighten Security for an Instance Enable Auditing Change the Authentication Mechanism for an Application Limit the Number of Public Resources Restrict Access to Services Limit Remote Privileged Access Limit the Number of Privileged Users Disable the _SYSTEM User Restrict Access for UnknownUser Configure Third-Party Software Security Advisor Auditing Services Roles Users Web, Privileged Routine, and Client Applications Secure InterSystems Processes and Operating-System Resources Introduction InterSystems IRIS Processes IP Protocols Remove Unneeded InterSystems IRIS Processes External Processes Interoperability Checklist for Hardening Your Deployment Network and Firewalls Operating System Users, Passwords, Groups, Ownerships, and Permissions Encryption (Data At Rest and Data In Motion) InterSystems Security