Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Content layer
id582226966


Content column
id582226980



On this page:

Content block
id582226963
Table of Contents
maxLevel4
minLevel2

Scripts

The following are the script files used in this hardening guide:

harden_cassandra_ports.sh

twc.java.security

upgrade_tomcat_webapp.sh

upgrade_jdk_webapp.sh

Content block
id582226970

The default shipping configuration of Teamwork Cloud is not a hardened configuration. When hardening an installation, some variables can render the installation inoperative, such as incompatibility of the supported ciphers in a certificate and the supported ciphers in the hardened configuration. Furthermore, the default configurations assume that the deployment is behind a secure infrastructure, and therefore required ports are globally allowed.

Since some of Teamwork Cloud's infrastructure relies on available components, newly discovered vulnerabilities need to be mitigated during the life-cycle of the installation.

The sections below cover potentially exploitable vulnerabilities of the different components, as well as various steps to mitigate them depending on the policies of the deploying organization.

Children Display