As a system for running production applications, 
               		Enterprise Server will inevitably have access to some sensitive data. However, it is still worthwhile limiting the ability of 
               		Enterprise Server components and applications running in an 
               		enterprise server region to read and write data and system files which are not required for proper operation, and to prevent executing inappropriate
               programs. This can be achieved with careful use of filesystem permissions. 
               	 
            
 
            	 
            Comprehensively configuring filesystem permissions for security is difficult because filesystems are large and complex. Also,
               the operating systems under which 
               		Enterprise Server runs administer filesystem permissions by individual file and/or hierarchically, so determining which permissions to set
               where, and ensuring they are set consistently, might require considerable effort. Setting proper permissions for even some
               portions of the filesystem will reduce the attack surface and potential for exploitation. 
               	 
            
 
            	 
            Micro Focus recommends the following approach to hardening filesystem permissions: 
               	 
            
 
            	 
             
               		
               - Run 
                  		  Enterprise Server programs under user accounts created specifically for that purpose. It is useful to have multiple user accounts so that privileges
                  can be assigned differently for various components. For example, the 
                  		  Enterprise Server Common Web Administration (ESCWA) and MFDS components require additional access which is not appropriate for the processes running under an 
                  		  enterprise server region, so 
                  		  Micro Focus recommends creating one user account for 
                  		  ESCWA and MFDS and another for regions. 
                  		
               
- Determine which programs and data files 
                  		  Enterprise Server components require access to, and what level of access is required. For example, the MFDS repository files must be writable
                  by MFDS, but can be read-only for 
                  		  enterprise server region. 
                  		
               
- Where possible, group program files used by regions in a single directory tree, and data files used by regions in another
                  directory tree, to make setting and checking permissions simpler. 
                  		
               
- Grant the appropriate access to the filesystem objects identified in the previous steps to the user accounts created for use
                  by 
                  		  Enterprise Server. See the topics listed below for more information. 
                  		
               
- Deny access to other filesystem objects to the 
                  		  Enterprise Server user accounts. 
                  		
               
Some specific items to attend to: 
               	 
            
 
            	 
             
               		
               - The MFDS repository-export function takes a path specified by the user. It is important that MFDS has write access to only
                  a limited set of directories to prevent the abuse of this feature. 
                  		
               
- Region processes must not have read access to sensitive system files. They also must not have write access to 
                  		  Enterprise Server configuration files. They do generally need write access to the region "system directory" (where the log files reside). For
                  certain features, they might need write access to some other files. For example, the optional auto-registration mechanism
                  of a CICS Web Interface needs to be able to write to files in the configured certificate-information directory. 
                  		
               
- In some cases, the primary security task is not to restrict 
                  		  Enterprise Server access to a file, but to restrict other accounts' access to it. For example, the key files used with TLS should only be readable
                  by 
                  		  Enterprise Server and administrators. See 
                  		  Using and hardening TLS for more information. Typically, data files used by applications running under 
                  		  Enterprise Server should not be readable or writable by programs running under other user accounts.