/
Securing an OpenMRS Implementation

Securing an OpenMRS Implementation

One critical MUST-DO for any OpenMRS Implementation: Ensure no default passwords are in use (such as “Admin123”).

This is true for everything from user login credentials in the UI, through to any database, web server, container, and/or servlets you are using in production. Even standard database and server tools often come with default passwords - ensure these are changed to unique, secure passwords.

 

This section of the wiki contains recommendations for how to secure an OpenMRS installation beyond what is provided by the application itself.

Sections contained within this Wiki area:

 

Strongly Recommended Resources

NOTE: We also recommend that OpenMRS community members, especially implementers, familiarize themselves with the following highly-recommended resources: 

 

Related content

Comprehensive Security Implementation Guide
Comprehensive Security Implementation Guide
More like this
Minimum Baseline Security Standard for OpenMRS (MBSS)
Minimum Baseline Security Standard for OpenMRS (MBSS)
More like this
OpenMRS Security 101: Policies & Vulnerability Management
OpenMRS Security 101: Policies & Vulnerability Management
Read with this
Security
Security
More like this
Security
Read with this
OpenMRS Module Release Best Practices
OpenMRS Module Release Best Practices
More like this