This article describes ways you can secure your K2 applications. Use this article along with information in Securing the K2 Platform to mitigate potential security issues in your K2 environment and the applications that run in the environment.
This article is divided into three sections:
Use the approaches described in this article as a starting point to design secure solutions with K2. However, this article is not meant to be a comprehensive list of all security-related issues that may represent a risk to your infrastructure or applications; your environment may have additional or unique security requirements. Additionally, not all applications may require a high degree of security – you could use a subset or selection of these practices to apply an appropriate level of security based on the intended use of your applications. Also, there is often a balance between effort and cost versus the level of security to implement an efficient and effectively-secured application.
This article is intended for solution architects and enterprise architects. Should you require additional assistance in designing secure applications for your particular requirements, consider working with K2's Professional Services teams.
Use the following general guidelines when designing K2 applications:
Use these security guidelines when creating SmartForms.
You can apply additional security settings in your environment to further secure your K2 applications. Examples of such settings include: