Recommended Procedure for Securing ACSLS
When securing ACSLS and required infrastructure components, follow this procedure to ensure that ACSLS will continue to function after the changes are made:
- Install ACSLS.
- Verify that ACSLS is functioning correctly. Include configuring and auditing libraries, mounting and dismounting tapes, entering and ejecting tapes, and backing-up and restoring the database.
- Implement the change to increase security.
- Verify that ACSLS still functions correctly.