Skip to main content


         This documentation site is for previous versions. Visit our new documentation site for current releases.      
 

Application Security Compliance on Pega Cloud

Updated on December 12, 2023

+

This content applies to On-premises, Client-managed cloud and Pega Cloud environments

Attention: This documentation has been moved to the new documentation site:
https://docs.pega.com/bundle/migration-modernization/page/pega-cloud-migration-modernization/migrating-pega-cloud-overview.html
This documentation is no longer being maintained. It is out of date and pending deletion. Please update your bookmarks.

Security is everyone’s responsibility. Pega Cloud provides multiple layers of security and monitoring for Pega Cloud environments; however, you still need to ensure your application is secure. You are responsible for securing and managing access at the application level. Review your application and identify any use of non-compliant security standards or protocols, especially in the areas of integration and access control.

Guardrail compliance is one of the most important security requirements for Pega Platform applications. Include a review of your application’s guardrail score in your Migration Project Plan.

For more information, see:

Authentication Services for Pega Cloud

Authentication services can be customized to use information that is stored with an identity provider to determine the user's roles and privileges in Pega Platform.  Pega Cloud supports multiple providers and protocols.  For more information, see:

 

Have a question? Get answers now.

Visit the Support Center to ask questions, engage in discussions, share ideas, and help others.

Did you find this content helpful?

Want to help us improve this content?

We'd prefer it if you saw us at our best.

Pega.com is not optimized for Internet Explorer. For the optimal experience, please use:

Close Deprecation Notice
Contact us