<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Security Audit Tools in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/security-audit-tools/m-p/4298606#M734483</link>
    <description>In addition to Bastille, we use the CIS benchmark tool:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.cisecurity.org/bench_hpux.html" target="_blank"&gt;http://www.cisecurity.org/bench_hpux.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;and the DISA Security Readiness Review (SRR) Evaluation Scripts:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://iase.disa.mil/stigs/SRR/unix.html" target="_blank"&gt;http://iase.disa.mil/stigs/SRR/unix.html&lt;/A&gt; &lt;BR /&gt;&lt;BR /&gt;Both take several hours to run and can be resource intensive (find commands).&lt;BR /&gt;&lt;BR /&gt;Hope this helps,</description>
    <pubDate>Thu, 06 Nov 2008 17:58:02 GMT</pubDate>
    <dc:creator>Autocross.US</dc:creator>
    <dc:date>2008-11-06T17:58:02Z</dc:date>
    <item>
      <title>Security Audit Tools</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-audit-tools/m-p/4298600#M734477</link>
      <description>Hi all,&lt;BR /&gt;&lt;BR /&gt;I would like to find out from the experts, beside Bastille, what other security tools are recommended to be used in auditing a HPUX 11i system?&lt;BR /&gt;&lt;BR /&gt;TIA.</description>
      <pubDate>Sat, 01 Nov 2008 21:49:08 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-audit-tools/m-p/4298600#M734477</guid>
      <dc:creator>swtw</dc:creator>
      <dc:date>2008-11-01T21:49:08Z</dc:date>
    </item>
    <item>
      <title>Re: Security Audit Tools</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-audit-tools/m-p/4298601#M734478</link>
      <description>Hello,&lt;BR /&gt;&lt;BR /&gt;Bastille is not much of an auditing tool.&lt;BR /&gt;It is more for tightening security.&lt;BR /&gt;&lt;BR /&gt;It seems you are asking about tools to &lt;BR /&gt;audit the setup of an HP-UX server.&lt;BR /&gt;&lt;BR /&gt;There are many. For example, you could easily&lt;BR /&gt;build a Linux-based server with&lt;BR /&gt;literally hundreds of tools:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://backtrack.unixheads.org/" target="_blank"&gt;http://backtrack.unixheads.org/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Boot off this image and all the tools are there.&lt;BR /&gt;&lt;BR /&gt;If you want to learn more about the best &lt;BR /&gt;tools just go to:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://sectools.org/" target="_blank"&gt;http://sectools.org/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;&lt;BR /&gt;VK2COT</description>
      <pubDate>Sun, 02 Nov 2008 23:32:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-audit-tools/m-p/4298601#M734478</guid>
      <dc:creator>VK2COT</dc:creator>
      <dc:date>2008-11-02T23:32:44Z</dc:date>
    </item>
    <item>
      <title>Re: Security Audit Tools</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-audit-tools/m-p/4298602#M734479</link>
      <description>&lt;BR /&gt;You can turn on auditing and use the audsys to audit either users, systemcalls.&lt;BR /&gt;&lt;BR /&gt;the audsys command is used to specify what to audit and the auddisp command is used to display audit records.&lt;BR /&gt;&lt;BR /&gt;Auditing on 11.23 does not require conversion to trusted systems if you have Trusted Migration and SMSE security loaded.</description>
      <pubDate>Mon, 03 Nov 2008 02:51:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-audit-tools/m-p/4298602#M734479</guid>
      <dc:creator>Emil Velez</dc:creator>
      <dc:date>2008-11-03T02:51:06Z</dc:date>
    </item>
    <item>
      <title>Re: Security Audit Tools</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-audit-tools/m-p/4298603#M734480</link>
      <description>Thanks for the response.&lt;BR /&gt;&lt;BR /&gt;I am actually looking for security tools that can scan UX security-related settings. &lt;BR /&gt;&lt;BR /&gt;I have use Bastille and it does perform a list of test. Does UX has any other tools beside Bastille that can perform a more comprehensive sets of test?</description>
      <pubDate>Mon, 03 Nov 2008 08:32:43 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-audit-tools/m-p/4298603#M734480</guid>
      <dc:creator>swtw</dc:creator>
      <dc:date>2008-11-03T08:32:43Z</dc:date>
    </item>
    <item>
      <title>Re: Security Audit Tools</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-audit-tools/m-p/4298604#M734481</link>
      <description>Hi there,&lt;BR /&gt;&lt;BR /&gt;Ever since Bastille 3.0, where we added auditing to Bastille, I think Bastille is the most comprehensive tool I've seen for host-based HP-UX security auditing (with respect to hardening policy).  Other general engines include cis-cat from CIS and Medusa, though those are less comprehensive, and more error prone.  SWA (Software Assistant, configured by Bastille), audits security-patch-level.&lt;BR /&gt;&lt;BR /&gt;Of course there's always off-host tools to check for vulnerabilities (vs. hardening policy) like Nessus, though the false-positive rate on those can be annoying.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;If you want real-time monitoring, some others mentioned that there are some included monitoring tools like kernel-level monitoring (audsys, configured by Bastille).  Also there's log modes for IPFilter, and you'll also find that HIDS does some decent logging.&lt;BR /&gt;&lt;BR /&gt;Is there a concern with Bastille, or were you just trying to get a sense of the "field?"  Note that Bastille's audit and lock-down scope will be significantly expanded in the next release.&lt;BR /&gt;&lt;BR /&gt;Hope that helps, &lt;BR /&gt;Robert</description>
      <pubDate>Mon, 03 Nov 2008 17:57:54 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-audit-tools/m-p/4298604#M734481</guid>
      <dc:creator>Robert Fritz</dc:creator>
      <dc:date>2008-11-03T17:57:54Z</dc:date>
    </item>
    <item>
      <title>Re: Security Audit Tools</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-audit-tools/m-p/4298605#M734482</link>
      <description>Hello,&lt;BR /&gt;&lt;BR /&gt;You got some additional good recommendations&lt;BR /&gt;in the responses.&lt;BR /&gt;&lt;BR /&gt;Note that "Security is NOT A PRODUCT BUT&lt;BR /&gt;A PROCESS".&lt;BR /&gt;&lt;BR /&gt;If you are looking at a single product to&lt;BR /&gt;resolve all your security issues, than you &lt;BR /&gt;have lost the battle already.&lt;BR /&gt;&lt;BR /&gt;For some mission-critical customers, I have&lt;BR /&gt;asked to install Symantec Enterprise Security Manager. Works fine. Costs money.&lt;BR /&gt;&lt;BR /&gt;I have also used Tripwire Enterprise.&lt;BR /&gt;Good product too.&lt;BR /&gt;&lt;BR /&gt;There are many other commercial products.&lt;BR /&gt;&lt;BR /&gt;When you test and audit any server (in this &lt;BR /&gt;case HP-UX), you "attack" it from several&lt;BR /&gt;places:&lt;BR /&gt;&lt;BR /&gt;Internal networks&lt;BR /&gt;DMZ&lt;BR /&gt;External (Internet)&lt;BR /&gt;&lt;BR /&gt;As everyone is aware, most of security&lt;BR /&gt;breaches happen inside the companies&lt;BR /&gt;(unhappy users, revenge, staff working for competitors, weird people who destroy&lt;BR /&gt;things for the sake of fun and thrill).&lt;BR /&gt;The problem is that no-one likes to talk &lt;BR /&gt;about it. And the media likes hacking&lt;BR /&gt;from external sources. That sells better&lt;BR /&gt;and looks more "powerful"...&lt;BR /&gt;&lt;BR /&gt;Cheers,&lt;BR /&gt;&lt;BR /&gt;VK2COT</description>
      <pubDate>Mon, 03 Nov 2008 21:49:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-audit-tools/m-p/4298605#M734482</guid>
      <dc:creator>VK2COT</dc:creator>
      <dc:date>2008-11-03T21:49:59Z</dc:date>
    </item>
    <item>
      <title>Re: Security Audit Tools</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-audit-tools/m-p/4298606#M734483</link>
      <description>In addition to Bastille, we use the CIS benchmark tool:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.cisecurity.org/bench_hpux.html" target="_blank"&gt;http://www.cisecurity.org/bench_hpux.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;and the DISA Security Readiness Review (SRR) Evaluation Scripts:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://iase.disa.mil/stigs/SRR/unix.html" target="_blank"&gt;http://iase.disa.mil/stigs/SRR/unix.html&lt;/A&gt; &lt;BR /&gt;&lt;BR /&gt;Both take several hours to run and can be resource intensive (find commands).&lt;BR /&gt;&lt;BR /&gt;Hope this helps,</description>
      <pubDate>Thu, 06 Nov 2008 17:58:02 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-audit-tools/m-p/4298606#M734483</guid>
      <dc:creator>Autocross.US</dc:creator>
      <dc:date>2008-11-06T17:58:02Z</dc:date>
    </item>
    <item>
      <title>Re: Security Audit Tools</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-audit-tools/m-p/4298607#M734484</link>
      <description>I wrote a tool many years ago to help our internal auditors find setuid and 777 files on a system. It's easier to use than a standard find (in my opinion). As a bonus, it still works. :). Available here:&lt;BR /&gt;&lt;A href="http://www.mayoxide.com/ncops/" target="_blank"&gt;http://www.mayoxide.com/ncops/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Checking for file permissions is good in an environment where you have many shell users you don't trust, such as a university, but if you just have a few system administrators, it's a pretty annoying security measure. &lt;BR /&gt;&lt;BR /&gt;One thing you can do, that gives a lot of return on your time investiment, is to run nessus against a system. It will find out many remotely exploitable holes.&lt;BR /&gt;&lt;BR /&gt;Good luck</description>
      <pubDate>Thu, 06 Nov 2008 18:56:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-audit-tools/m-p/4298607#M734484</guid>
      <dc:creator>Olivier Masse</dc:creator>
      <dc:date>2008-11-06T18:56:52Z</dc:date>
    </item>
  </channel>
</rss>

