Return to first page of Collapsed TOC
.
HP
OpenVMS Guide to System Security
Legal Notice
Preface
Intended Audience
Document Structure
Related Documents
Reader's Comments
How to Order Additional Documentation
Conventions
Security Overview
Understanding System Security
Types of Computer Security Problems
Levels of Security Requirements
Building a Secure System Environment
Common Data Security Architecture (CDSA)
Secure Sockets Layer (SSL)
Kerberos
OpenVMS Security Model
Structure of a Secure Operating System
Implementation of the Reference Monitor
Summary: System Security Design
Security for the User
Using the System Responsibly
Choosing a Password for Your Account
Knowing What Type of Password to Use
Password Requirements for Different Types of Accounts
Types of Logins and Login Classes
Login Failures: When You Are Unable to Log In
Changing Your Password
Password and Account Expiration Times
Guidelines for Protecting Your Password
Network Security Considerations
Auditing Access to Your Account and Files
Logging Out Without Compromising System Security
Checklist for Contributing to System Security
Protecting Data
Contents of a User's Security Profile
Security Profile of Objects
How the System Determines If a User Can Access a Protected Object
Controlling Access with ACLs
Controlling Access with Protection Codes
Understanding Privileges and Control Access
Auditing Protected Objects
Descriptions of Object Classes
Capabilities
Common Event Flag Clusters
Devices
Files
Global Sections
Logical Name Tables
Queues
Resource Domains
Security Classes
Volumes
Security for the System Administrator
Managing the System and Its Data
Role of a Security Administrator
Site Security Policies
Tools for Setting Up a Secure System
Account Requirements for a Security Administrator
Training the New User
Logging a User's Session
Ongoing Tasks to Maintain a Secure System
Managing System Access
Defining Times and Conditions for System Access
Assigning Appropriate Accounts to Users
Using Passwords to Control System Access
Enabling External Authentication
Controlling the Login Process
Controlling Access to System Data and Resources
Designing User Groups
Naming Individual Users in ACLs
Defining Sharing of Rights
Conditionalizing Identifiers for Different Users
Designing ACLs
Populating the Rights Database
Giving Users Privileges
Setting Default Protection and Ownership
Added Protection for System Data and Resources
Security Auditing
Overview of the Auditing Process
Reporting Security-Relevant Events
Developing an Auditing Plan
Methods of Capturing Event Messages
Analyzing a Log File
Managing the Auditing Subsystem
System Security Breaches
Forms of System Attacks
Indications of Trouble
Routine System Surveillance
Handling a Security Breach
Securing a Cluster
Overview of Clusters
Building a Common Environment
Synchronizing Authorization Data
Managing the Audit Log File
Protecting Objects
Storing Profiles and Auditing Information
Clusterwide Intrusion Detection
Using the System Management Utility
Managing Cluster Membership
Using DECnet Between Cluster Nodes
Security in a Network Environment
Managing Network Security
Hierarchy of Access Controls
Proxy Access Control
Using DECnet Application (Object) Accounts
Specifying Routing Initialization Passwords
Sharing Files in a Network
Using Protected Subsystems
Advantages of Protected Subsystems
Applications for Protected Subsystems
How Protected Subsystems Work
Design Considerations
System Management Requirements
Building the Subsystem
Enabling Protected Subsystems on a Trusted Volume
Giving Users Access
Example of a Protected Subsystem
Assigning Privileges
ACNT Privilege (Devour)
ALLSPOOL Privilege (Devour)
ALTPRI Privilege (System)
AUDIT Privilege (System)
BUGCHK Privilege (Devour)
BYPASS Privilege (All)
CMEXEC Privilege (All)
CMKRNL Privilege (All)
DIAGNOSE Privilege (Objects)
DOWNGRADE Privilege (All)
EXQUOTA Privilege (Devour)
GROUP Privilege (Group)
GRPNAM Privilege (Devour)
GRPPRV Privilege (Group)
IMPERSONATE Privilege (All) (Formerly DETACH)
IMPORT Privilege (Objects)
LOG_IO Privilege (All)
MOUNT Privilege (Normal)
NETMBX Privilege (Normal)
OPER Privilege (System)
PFNMAP Privilege (All)
PHY_IO Privilege (All)
PRMCEB Privilege (Devour)
PRMGBL Privilege (Devour)
PRMMBX Privilege (Devour)
PSWAPM Privilege (System)
READALL Privilege (Objects)
SECURITY Privilege (System)
SETPRV Privilege (All)
SHARE Privilege (All)
SHMEM Privilege (Devour)
SYSGBL Privilege (Files)
SYSLCK Privilege (System)
SYSNAM Privilege (All)
SYSPRV Privilege (All)
TMPMBX Privilege (Normal)
UPGRADE Privilege (All)
VOLPRO Privilege (Objects)
WORLD Privilege (System)
Protection for OpenVMS System Files
Standard Ownership and Protection
Listing of OpenVMS System Files
Running an OpenVMS System in a C2 Environment
Introduction to C2 Systems
Trusted Computing Base (TCB) for C2 Systems
Checklist for Generating a C2 System
Alarm Messages
Glossary
Index