Document revision date: 19 July 1999
[Compaq] [Go to the documentation home page] [How to order documentation] [Help on this site] [How to contact us]
[OpenVMS documentation]

OpenVMS Guide to System Security


Previous Contents Index

Chapter 10
10 System Security Breaches
     10.1     Forms of System Attacks
     10.2     Indications of Trouble
         10.2.1         Reports from Users
         10.2.2         Monitoring the System
     10.3     Routine System Surveillance
         10.3.1         System Accounting
         10.3.2         Security Auditing
     10.4     Handling a Security Breach
         10.4.1         Unsuccessful Intrusion Attempts
             10.4.1.1             Detecting Intrusion Attempts
             10.4.1.2             Identifying the Perpetrator
             10.4.1.3             Preventing Intrusion Attempts
         10.4.2         Successful Intrusions
             10.4.2.1             Identifying the Successful Perpetrator
             10.4.2.2             Securing the System
             10.4.2.3             Repair After a Successful Intrusion
Chapter 11
11 Securing a Cluster
     11.1     Overview of Clusters
     11.2     Building a Common Environment
         11.2.1         Required Common System Files
         11.2.2         Recommended Common System Files
         11.2.3         Synchronizing Multiple Versions of Files
     11.3     Synchronizing Authorization Data
     11.4     Managing the Audit Log File
     11.5     Protecting Objects
     11.6     Storing Profiles and Auditing Information
     11.7     Using the System Management Utility
     11.8     Managing Cluster Membership
     11.9     Using DECnet Between Cluster Nodes
Chapter 12
12 Security in a Network Environment
     12.1     Managing Network Security
         12.1.1         Requirements for Achieving Security
         12.1.2         Auditing in the Network
     12.2     Hierarchy of Access Controls
         12.2.1         Using Explicit Access Control
         12.2.2         Using Proxy Logins
         12.2.3         Using Default Application Accounts
     12.3     Proxy Access Control
         12.3.1         Special Security Measures with Proxy Access
         12.3.2         Setting Up a Proxy Database
             12.3.2.1             Enabling and Disabling Incoming Proxy Access
             12.3.2.2             Removing Proxy Access
             12.3.2.3             Procedure for Creating a Proxy Account
         12.3.3         Example of a Proxy Account
     12.4     Using DECnet Application (Object) Accounts
         12.4.1         Summary of Network Objects
         12.4.2         Configuring Network Objects Manually
         12.4.3         Removing Default DECnet Access to the System
         12.4.4         Setting Privilege Requirements for Remote Object Connections
     12.5     Specifying Routing Initialization Passwords
         12.5.1         Establishing a Dynamic Asynchronous Connection
     12.6     Sharing Files in a Network
         12.6.1         Using the Mail Utility
         12.6.2         Setting Up Accounts for Local and Remote Users
         12.6.3         Admitting Remote Users to Multiple Accounts
Chapter 13
13 Using Protected Subsystems
     13.1     Advantages of Protected Subsystems
     13.2     Applications for Protected Subsystems
     13.3     How Protected Subsystems Work
     13.4     Design Considerations
     13.5     System Management Requirements
     13.6     Building the Subsystem
     13.7     Enabling Protected Subsystems on a Trusted Volume
     13.8     Giving Users Access
     13.9     Example of a Protected Subsystem
         13.9.1         Protecting the Top-Level Directory
         13.9.2         Protecting Subsystem Directories
         13.9.3         Protecting the Images and Data Files
         13.9.4         Protecting the Printer
         13.9.5         Command Procedure for Building the Subsystem
Appendix A
Appendix A Assigning Privileges
     A.1     ACNT Privilege (Devour)
     A.2     ALLSPOOL Privilege (Devour)
     A.3     ALTPRI Privilege (System)
     A.4     AUDIT Privilege (System)
     A.5     BUGCHK Privilege (Devour)
     A.6     BYPASS Privilege (All)
     A.7     CMEXEC Privilege (All)
     A.8     CMKRNL Privilege (All)
     A.9     DIAGNOSE Privilege (Objects)
     A.10     DOWNGRADE Privilege (All)
     A.11     EXQUOTA Privilege (Devour)
     A.12     GROUP Privilege (Group)
     A.13     GRPNAM Privilege (Devour)
     A.14     GRPPRV Privilege (Group)
     A.15     IMPERSONATE Privilege (All) (Formerly DETACH)
     A.16     IMPORT Privilege (Objects)
     A.17     LOG_IO Privilege (All)
     A.18     MOUNT Privilege (Normal)
     A.19     NETMBX Privilege (Normal)
     A.20     OPER Privilege (System)
     A.21     PFNMAP Privilege (All)
     A.22     PHY_IO Privilege (All)
     A.23     PRMCEB Privilege (Devour)
     A.24     PRMGBL Privilege (Devour)
     A.25     PRMMBX Privilege (Devour)
     A.26     PSWAPM Privilege (System)
     A.27     READALL Privilege (Objects)
     A.28     SECURITY Privilege (System)
     A.29     SETPRV Privilege (All)
     A.30     SHARE Privilege (All)
     A.31     SHMEM Privilege (Devour)
     A.32     SYSGBL Privilege (Files)
     A.33     SYSLCK Privilege (System)
     A.34     SYSNAM Privilege (All)
     A.35     SYSPRV Privilege (All)
     A.36     TMPMBX Privilege (Normal)
     A.37     UPGRADE Privilege (All)
     A.38     VOLPRO Privilege (Objects)
     A.39     WORLD Privilege (System)


Previous Next Contents Index

  [Go to the documentation home page] [How to order documentation] [Help on this site] [How to contact us]  
  privacy and legal statement  
6346PRO_CONTENTS_003.HTML