<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: System Security Policy in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/system-security-policy/m-p/2888909#M102477</link>
    <description>Hi,&lt;BR /&gt;You should also look at the /var/adm/inetd.sec file which is an access control file for indernet daemons like&lt;BR /&gt;login, telnet, ftp, shell, rcp etc..&lt;BR /&gt;You should conside that as to whom to give access to.&lt;BR /&gt;Also look at the /etc/ftpd/ftpusers in 11.X and /etc/ftpusers in 10.X&lt;BR /&gt;this if for ftp access to users.&lt;BR /&gt;&lt;BR /&gt;Rajeev</description>
    <pubDate>Thu, 23 Jan 2003 06:36:07 GMT</pubDate>
    <dc:creator>Rajeev  Shukla</dc:creator>
    <dc:date>2003-01-23T06:36:07Z</dc:date>
    <item>
      <title>System Security Policy</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/system-security-policy/m-p/2888906#M102474</link>
      <description>Hi all&lt;BR /&gt;&lt;BR /&gt;I am currently making a System Security Policy to our HP-UX server. What thing that may I consider? other than converting it to trusted system, use password aging, etc.&lt;BR /&gt;&lt;BR /&gt;Thanks in advance&lt;BR /&gt;Joseph</description>
      <pubDate>Thu, 23 Jan 2003 05:39:46 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/system-security-policy/m-p/2888906#M102474</guid>
      <dc:creator>Joseph Bague</dc:creator>
      <dc:date>2003-01-23T05:39:46Z</dc:date>
    </item>
    <item>
      <title>Re: System Security Policy</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/system-security-policy/m-p/2888907#M102475</link>
      <description>Hi,&lt;BR /&gt;You should also look at the /var/adm/inetd.sec file which is an access control file for indernet daemons like&lt;BR /&gt;login, telnet, ftp, shell, rcp etc..&lt;BR /&gt;You should conside that as to whom to give access to.&lt;BR /&gt;Also look at the /etc/ftpd/ftpusers in 11.X and /etc/ftpusers in 10.X&lt;BR /&gt;this if for ftp access to users.&lt;BR /&gt;&lt;BR /&gt;Rajeev</description>
      <pubDate>Thu, 23 Jan 2003 06:32:45 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/system-security-policy/m-p/2888907#M102475</guid>
      <dc:creator>Rajeev  Shukla</dc:creator>
      <dc:date>2003-01-23T06:32:45Z</dc:date>
    </item>
    <item>
      <title>Re: System Security Policy</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/system-security-policy/m-p/2888908#M102476</link>
      <description>Hi,&lt;BR /&gt;You should also look at the /var/adm/inetd.sec file which is an access control file for indernet daemons like&lt;BR /&gt;login, telnet, ftp, shell, rcp etc..&lt;BR /&gt;You should conside that as to whom to give access to.&lt;BR /&gt;Also look at the /etc/ftpd/ftpusers in 11.X and /etc/ftpusers in 10.X&lt;BR /&gt;this if for ftp access to users.&lt;BR /&gt;&lt;BR /&gt;Rajeev</description>
      <pubDate>Thu, 23 Jan 2003 06:34:19 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/system-security-policy/m-p/2888908#M102476</guid>
      <dc:creator>Rajeev  Shukla</dc:creator>
      <dc:date>2003-01-23T06:34:19Z</dc:date>
    </item>
    <item>
      <title>Re: System Security Policy</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/system-security-policy/m-p/2888909#M102477</link>
      <description>Hi,&lt;BR /&gt;You should also look at the /var/adm/inetd.sec file which is an access control file for indernet daemons like&lt;BR /&gt;login, telnet, ftp, shell, rcp etc..&lt;BR /&gt;You should conside that as to whom to give access to.&lt;BR /&gt;Also look at the /etc/ftpd/ftpusers in 11.X and /etc/ftpusers in 10.X&lt;BR /&gt;this if for ftp access to users.&lt;BR /&gt;&lt;BR /&gt;Rajeev</description>
      <pubDate>Thu, 23 Jan 2003 06:36:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/system-security-policy/m-p/2888909#M102477</guid>
      <dc:creator>Rajeev  Shukla</dc:creator>
      <dc:date>2003-01-23T06:36:07Z</dc:date>
    </item>
    <item>
      <title>Re: System Security Policy</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/system-security-policy/m-p/2888910#M102478</link>
      <description>Other points I can think of are ..&lt;BR /&gt;- File and directory permission/ownership.&lt;BR /&gt;- Console access policy (for example .. only root can log on to console).&lt;BR /&gt;- Root access policy (for example .. only system administrator have access to root).&lt;BR /&gt;- Security audit software (for example .. we use Medusa to give us weekly and monthly security reports).&lt;BR /&gt;- Audit trail on log files (for example .. how frequent you examine your system log files).&lt;BR /&gt;- File transfer policy.&lt;BR /&gt;- Root account log tools (for example .. sudo).&lt;BR /&gt;Hope this helps a bit ..</description>
      <pubDate>Thu, 23 Jan 2003 06:36:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/system-security-policy/m-p/2888910#M102478</guid>
      <dc:creator>S.K. Chan</dc:creator>
      <dc:date>2003-01-23T06:36:44Z</dc:date>
    </item>
    <item>
      <title>Re: System Security Policy</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/system-security-policy/m-p/2888911#M102479</link>
      <description>Hi,&lt;BR /&gt;You should also look at the /var/adm/inetd.sec file which is an access control file for indernet daemons like&lt;BR /&gt;login, telnet, ftp, shell, rcp etc..&lt;BR /&gt;You should conside that as to whom to give access to.&lt;BR /&gt;Also look at the /etc/ftpd/ftpusers in 11.X and /etc/ftpusers in 10.X&lt;BR /&gt;this if for ftp access to users.&lt;BR /&gt;&lt;BR /&gt;Rajeev</description>
      <pubDate>Thu, 23 Jan 2003 06:36:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/system-security-policy/m-p/2888911#M102479</guid>
      <dc:creator>Rajeev  Shukla</dc:creator>
      <dc:date>2003-01-23T06:36:56Z</dc:date>
    </item>
    <item>
      <title>Re: System Security Policy</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/system-security-policy/m-p/2888912#M102480</link>
      <description>Hi,&lt;BR /&gt;You should also look at the /var/adm/inetd.sec file which is an access control file for indernet daemons like&lt;BR /&gt;login, telnet, ftp, shell, rcp etc..&lt;BR /&gt;You should conside that as to whom to give access to.&lt;BR /&gt;Also look at the /etc/ftpd/ftpusers in 11.X and /etc/ftpusers in 10.X&lt;BR /&gt;this if for ftp access to users.&lt;BR /&gt;&lt;BR /&gt;Rajeev</description>
      <pubDate>Thu, 23 Jan 2003 06:39:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/system-security-policy/m-p/2888912#M102480</guid>
      <dc:creator>Rajeev  Shukla</dc:creator>
      <dc:date>2003-01-23T06:39:07Z</dc:date>
    </item>
    <item>
      <title>Re: System Security Policy</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/system-security-policy/m-p/2888913#M102481</link>
      <description>Heres some suggestions.&lt;BR /&gt;&lt;BR /&gt;Setting up the system as a bastion server.&lt;BR /&gt;See here: &lt;A href="http://people.hp.se/stevesk/bastion11.html" target="_blank"&gt;http://people.hp.se/stevesk/bastion11.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Installing bastille, see here: &lt;A href="http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=B6849AA" target="_blank"&gt;http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=B6849AA&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Setting your system as trusted with password aging and utilsing the security policies provided. 'sam' is a good place to start. Isolate your console.&lt;BR /&gt;&lt;BR /&gt;Also this posting, see the comments from Bill Hassell.&lt;BR /&gt;&lt;A href="http://forums.itrc.hp.com/cm/QuestionAnswer/1,11866,0x4499e7e60861d511abcd0090277a778c,00.htm" target="_blank"&gt;http://forums.itrc.hp.com/cm/QuestionAnswer/1,11866,0x4499e7e60861d511abcd0090277a778c,00.htm&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Installing sudo: See here:&lt;A href="http://hpux.connect.org.uk/hppd/hpux/Sysadmin/sudo-1.6.6/" target="_blank"&gt;http://hpux.connect.org.uk/hppd/hpux/Sysadmin/sudo-1.6.6/&lt;/A&gt;&lt;BR /&gt;Installing SSH: See here: &lt;A href="http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=T1471AA" target="_blank"&gt;http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=T1471AA&lt;/A&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 23 Jan 2003 06:47:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/system-security-policy/m-p/2888913#M102481</guid>
      <dc:creator>Michael Tully</dc:creator>
      <dc:date>2003-01-23T06:47:24Z</dc:date>
    </item>
    <item>
      <title>Re: System Security Policy</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/system-security-policy/m-p/2888914#M102482</link>
      <description>Couple of other things. Don't forget the "physical security" - control of computer room access, controlling access to GSP and consoles, media management(tape and CD mounting). Also updating /etc/issue and /etc/dt/config/C/Xresources with relevant warnings about system misuse</description>
      <pubDate>Fri, 24 Jan 2003 11:14:36 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/system-security-policy/m-p/2888914#M102482</guid>
      <dc:creator>Jeff Barber</dc:creator>
      <dc:date>2003-01-24T11:14:36Z</dc:date>
    </item>
    <item>
      <title>Re: System Security Policy</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/system-security-policy/m-p/2888915#M102483</link>
      <description>And then there's the soft science part of the policy: communication and enforcement. That means that everyone in the company must be aware of the access policies, the consequences of misuse and remedies for policy violations. This requires agreement by your HR (personnel) department, your legal department and the executives.&lt;BR /&gt;&lt;BR /&gt;Note that warnings in email and login greetings are worthless as a practical policy although it makes the lawyers feel warm and fuzzy. A policy is just paper unless the systems are monitored (see IDS/9000 and Bastille) and actions taken.</description>
      <pubDate>Fri, 24 Jan 2003 13:00:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/system-security-policy/m-p/2888915#M102483</guid>
      <dc:creator>Bill Hassell</dc:creator>
      <dc:date>2003-01-24T13:00:03Z</dc:date>
    </item>
    <item>
      <title>Re: System Security Policy</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/system-security-policy/m-p/2888916#M102484</link>
      <description>Bastille, is great, get it perl 5.8 and install it.&lt;BR /&gt;&lt;BR /&gt;get security_patch_check and make it your ogranizational policy to use it, and follow its recommendations on a regular basis.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProducts.pl?group_type=search&amp;amp;group_name=security_patch_check&amp;amp;search_free=1&amp;amp;search_trial=1&amp;amp;search_buy=1" target="_blank"&gt;http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProducts.pl?group_type=search&amp;amp;group_name=security_patch_check&amp;amp;search_free=1&amp;amp;search_trial=1&amp;amp;search_buy=1&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;You should get and install a version of crack 5.0 on a non-production server.  Copy your /etc/passwd files once a month and run analysis.  Any passwords that get guessed, force password change and make the supervisor aware.&lt;BR /&gt;&lt;BR /&gt;You should run lastb last analysis on all your logs on a regular basis.  That should be policy and you write the script and your operations department reviews the output on a weekly basis.&lt;BR /&gt;&lt;BR /&gt;You should consider download and install of the saint utility on a non-production server.  It can be used to probe unix boxes and NT/Microsoft boxes and report security vulnerabilities.  It should be operational policy that during a maintenance window, production servers are checked in this way.&lt;BR /&gt;&lt;BR /&gt;You should consider taking two courses at HP Education. Practical Unix and Network Security and Internet Security.  Almost nobody takes the Internet course but its one of the best courses HP offers.&lt;BR /&gt;&lt;BR /&gt;Lastly, you should make your system a trusted system.  This enables password shadowing, automatic expiration of unused accounts, and a great audit log for tracking down issues.&lt;BR /&gt;&lt;BR /&gt;P</description>
      <pubDate>Fri, 24 Jan 2003 13:43:23 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/system-security-policy/m-p/2888916#M102484</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2003-01-24T13:43:23Z</dc:date>
    </item>
    <item>
      <title>Re: System Security Policy</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/system-security-policy/m-p/2888917#M102485</link>
      <description>Joseph,&lt;BR /&gt;&lt;BR /&gt;A couple of things to consider.  I don't beleive these were mentioned above, but you may want to look into using SSH and TCPWrappers.  &lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Greg</description>
      <pubDate>Wed, 29 Jan 2003 17:40:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/system-security-policy/m-p/2888917#M102485</guid>
      <dc:creator>Gregory Lee_1</dc:creator>
      <dc:date>2003-01-29T17:40:03Z</dc:date>
    </item>
  </channel>
</rss>

