Skip to main content

Module

Mitigating security risks

Verify the version tags to ensure you are consuming the intended content or, complete the latest version.

Securing an application and ensuring that the correct security is set up is important. Correct security entails making sure that users are actually who they say they are (authentication), using proper authorization so that users can only access the cases and data that they are allowed to access, and identifying and addressing security vulnerabilities such as cross-site scripting and phishing attacks. This module examines common mistakes that can open up vulnerabilities in the system, as well as how to address these mistakes to help avoid potential risks.

After completing this module, you should be able to:

Identify security risks.
Detect and mitigate possible attacks using Content Security Policies.
Identify potential vulnerabilities with the Rule Security Analyzer.
Know how to secure a Pega Platform application in production.
Discuss security best practices.
Use security event logging.

Available in the following mission:

Security Design v3

We'd prefer it if you saw us at our best.

Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.

Close Deprecation Notice