Surround SCM Security Best Practices

Use the following best practices to keep your Surround SCM and Helix ALM License Server data secure. Implementing these practices can help you avoid common mistakes that could leave your data vulnerable to theft, damage, or loss.

Best practices for securing Helix ALM data are similar. If you also use it, see the Helix ALM Security Best Practices.

Server management

Use the following information to properly manage and secure the Surround SCM Server and license server.

Web server management

Use the following information to secure the web server that hosts the license server web admin utility.

Database management

Use the following information to secure Surround SCM and license server databases.

User management

Use the following information to efficiently manage user access to Surround SCM clients and the license server admin utility.