<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SAM: Security and Auditing in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/sam-security-and-auditing/m-p/3796947#M741016</link>
    <description>I'm very new to HP-UX.  Please bear with me!&lt;BR /&gt;&lt;BR /&gt;The Security and Auditing sub-program in SAM offers many events which can be enabled for auditing.&lt;BR /&gt;&lt;BR /&gt;Is there a paper outlining the best practice on what to be enabled in a high, medium and low security environment?  Any pointers are appreciated.&lt;BR /&gt;&lt;BR /&gt;Many thanks in advance.&lt;BR /&gt;</description>
    <pubDate>Tue, 30 May 2006 11:27:20 GMT</pubDate>
    <dc:creator>A_Monk</dc:creator>
    <dc:date>2006-05-30T11:27:20Z</dc:date>
    <item>
      <title>SAM: Security and Auditing</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sam-security-and-auditing/m-p/3796947#M741016</link>
      <description>I'm very new to HP-UX.  Please bear with me!&lt;BR /&gt;&lt;BR /&gt;The Security and Auditing sub-program in SAM offers many events which can be enabled for auditing.&lt;BR /&gt;&lt;BR /&gt;Is there a paper outlining the best practice on what to be enabled in a high, medium and low security environment?  Any pointers are appreciated.&lt;BR /&gt;&lt;BR /&gt;Many thanks in advance.&lt;BR /&gt;</description>
      <pubDate>Tue, 30 May 2006 11:27:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sam-security-and-auditing/m-p/3796947#M741016</guid>
      <dc:creator>A_Monk</dc:creator>
      <dc:date>2006-05-30T11:27:20Z</dc:date>
    </item>
    <item>
      <title>Re: SAM: Security and Auditing</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sam-security-and-auditing/m-p/3796948#M741017</link>
      <description>Lots of resources available - inside and outside of the ITRC.&lt;BR /&gt;&lt;BR /&gt;Depending on how tight you need to be with security, are you a public or private company, do you have external audits to go through, etc...&lt;BR /&gt;&lt;BR /&gt;The resources cover all aspects. In the ITRC do a search on HPUX Security - check out the Bastille product.&lt;BR /&gt;&lt;BR /&gt;On google do a search for UNIX security. Lots of hits. &lt;BR /&gt;&lt;BR /&gt;There isn't 1 good resource, there are many good resources!</description>
      <pubDate>Tue, 30 May 2006 12:27:33 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sam-security-and-auditing/m-p/3796948#M741017</guid>
      <dc:creator>Rick Garland</dc:creator>
      <dc:date>2006-05-30T12:27:33Z</dc:date>
    </item>
    <item>
      <title>Re: SAM: Security and Auditing</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sam-security-and-auditing/m-p/3796949#M741018</link>
      <description>Well....first off you need to determine just how much space you can afford to assign to the audfiles. In high security envs you may need well over 8 GBs to hold the data for a reasonable period. Also just what the performance hit will be.&lt;BR /&gt;For low 512MB may suffice. &lt;BR /&gt;We employ medium level &amp;amp; use 2GB.&lt;BR /&gt;Below is a sample auditing config file for medium level - file locations redacted for obvious reasons. This is more to give you an idea of just *what* you should be auditing - mainly who's logging in &amp;amp; when as well as what they're modifying and/or deleting:&lt;BR /&gt;&lt;BR /&gt;#!/sbin/sh&lt;BR /&gt;# @(#)B.11.11_LR        &lt;BR /&gt;# Auditing configuration.  See audsys(1m), audevent(1m)&lt;BR /&gt;#&lt;BR /&gt;# AUDITING: Set to 1 to enable the auditing system.  Note: if auditing&lt;BR /&gt;#  is enabled via SAM, the AUDITING and other configuration&lt;BR /&gt;#  variables are ignored.&lt;BR /&gt;#&lt;BR /&gt;# PRI_AUDFILE: Pathname of file where audit records begin to be logged.&lt;BR /&gt;# PRI_SWITCH: switch size (maximum size in kbytes for primary audit log file)&lt;BR /&gt;# SEC_AUDFILE: file audit system switches to when primary reaches switch size&lt;BR /&gt;# SEC_SWITCH: switch size of secondary file (maximum size in kbytes for&lt;BR /&gt;#  secondary audit log file)&lt;BR /&gt;#&lt;BR /&gt;# Note:  If the system has any mounted volumes, you might want to put the&lt;BR /&gt;# primary and secondary audit log files on different volumes to take maximum&lt;BR /&gt;# advantage of audit file switching.&lt;BR /&gt;#&lt;BR /&gt;# Note:  For security, the path to the audit files must not be readable or&lt;BR /&gt;# writable except by authorized users.&lt;BR /&gt;#&lt;BR /&gt;# AUDEVENT_ARGS:&lt;BR /&gt;#               Arguments to the audevent command.  See audevent(1m)&lt;BR /&gt;#               There are three instances of AUDEVENT_ARGS. &lt;BR /&gt;#&lt;BR /&gt;#               AUDEVENT_ARGS1 describes those events that are audited&lt;BR /&gt;#               for both success and failure.&lt;BR /&gt;#&lt;BR /&gt;#               AUDEVENT_ARGS2 describes those events that are success only.&lt;BR /&gt;#&lt;BR /&gt;#               AUDEVENT_ARGS3 describes those events that are failure only.&lt;BR /&gt;#&lt;BR /&gt;#               A null string for AUDEVENT_ARGSx is assigned to arguments &lt;BR /&gt;#               that don't apply.&lt;BR /&gt;#&lt;BR /&gt;#  By default, AUDEVENT_ARGS1 is set to:&lt;BR /&gt;#   "-P -F -e moddac -e login -e admin"&lt;BR /&gt;#  which causes audevent to deal with:&lt;BR /&gt;#   1) changing discretionary access control (DAC),&lt;BR /&gt;#   2) logging in, and&lt;BR /&gt;#   3) administering the system will be audited.&lt;BR /&gt;#  While these may be a reasonable defaults on some systems,&lt;BR /&gt;#  only the security officer/administrator can determine exactly&lt;BR /&gt;#  what is needed.&lt;BR /&gt;#&lt;BR /&gt;# AUDOMON_ARGS: Arguments to the audomon daemon.  See audomon(1m)&lt;BR /&gt;#  By default, AUDOMON_ARGS is set to "-p 20 -t 1 -w 90".&lt;BR /&gt;#  The audomon daemon takes the following arguments:&lt;BR /&gt;#&lt;BR /&gt;#         fss = minimum percentage of free space left on an audit log file's&lt;BR /&gt;#  file-system before switching to the secondary audit log file&lt;BR /&gt;#  (which may reside on a separate volume/partition),&lt;BR /&gt;#  or before taking protective action if no file space is left.&lt;BR /&gt;#  (default: 20%)&lt;BR /&gt;#     sp_freq = minimum wakeup interval (in minutes), at which point&lt;BR /&gt;#  warning messages are generated on the console about&lt;BR /&gt;#  switch points.  Switch points are the maximum log file&lt;BR /&gt;#  sizes and the percentage minimum free space specified.&lt;BR /&gt;#  (default: 1  minute)&lt;BR /&gt;#     warning = percentage of audit file space used or minimum free space&lt;BR /&gt;#  used after which warning messages are sent to the console.&lt;BR /&gt;#  (default: 90 - warning messages are sent when the files&lt;BR /&gt;#  are 90% full or available free space is 90% used)&lt;BR /&gt;#&lt;BR /&gt;# Format: audomon -p fss -t sp_freq -w warning&lt;BR /&gt;#&lt;BR /&gt;AUDITING=1&lt;BR /&gt;PRI_AUDFILE=/XXXXXX/XXXXXXX/audfile1&lt;BR /&gt;PRI_SWITCH=153600&lt;BR /&gt;SEC_AUDFILE=/XXXXXX/XXXXXXX/audfile2&lt;BR /&gt;SEC_SWITCH=153600&lt;BR /&gt;AUDEVENT_ARGS1=" -P -F   -e moddac -e login -e admin -e modaccess -e delete -s execv -s execve"&lt;BR /&gt;AUDEVENT_ARGS2=" -p -f -s utssys -s mpctl -s semctl -s semop " &lt;BR /&gt;AUDEVENT_ARGS3=""&lt;BR /&gt;AUDOMON_ARGS=" -p 20 -t 1 -w 99"&lt;BR /&gt;&lt;BR /&gt;For *some* of the above syscalls there are man pages in the OS. For all others you should be able to get good descriptions on docs.hp.com. Some should be self-explanatory.&lt;BR /&gt;&lt;BR /&gt;HTH,&lt;BR /&gt;Jeff&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 30 May 2006 12:55:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sam-security-and-auditing/m-p/3796949#M741018</guid>
      <dc:creator>Jeff Schussele</dc:creator>
      <dc:date>2006-05-30T12:55:30Z</dc:date>
    </item>
    <item>
      <title>Re: SAM: Security and Auditing</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sam-security-and-auditing/m-p/3796950#M741019</link>
      <description>Where can I find a document outlining/detailing the events auditable in each sub-programs in SAM's Security and Auditing?&lt;BR /&gt;&lt;BR /&gt;Any pointers are appreciated.&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;&lt;BR /&gt;A Monk&lt;BR /&gt;</description>
      <pubDate>Tue, 30 May 2006 14:00:38 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sam-security-and-auditing/m-p/3796950#M741019</guid>
      <dc:creator>A_Monk</dc:creator>
      <dc:date>2006-05-30T14:00:38Z</dc:date>
    </item>
  </channel>
</rss>

