<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Security Audit on OpenVMS in Operating System - OpenVMS</title>
    <link>https://community.hpe.com/t5/operating-system-openvms/security-audit-on-openvms/m-p/3534081#M49136</link>
    <description>Bob,&lt;BR /&gt;&lt;BR /&gt;You are completely correct in the matching of business case with system configuration.  A thorough security policy should always be used as a guide to system setup.&lt;BR /&gt;&lt;BR /&gt;My task is to find a tool that automates the checking of common issues in OpenVMS the same way that Security Expressions does for AIX/Linux.&lt;BR /&gt;&lt;BR /&gt;I would expect the tool to be specific enough to not check an OpenVMS system for sendmail type configurations.  My familiarity is with linux and Solaris making this task more challenging.  Hence my post to this forum.&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;BR /&gt;EW</description>
    <pubDate>Fri, 29 Apr 2005 08:53:24 GMT</pubDate>
    <dc:creator>Ed Welsh</dc:creator>
    <dc:date>2005-04-29T08:53:24Z</dc:date>
    <item>
      <title>Security Audit on OpenVMS</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/security-audit-on-openvms/m-p/3534076#M49131</link>
      <description>Hi all,&lt;BR /&gt;&lt;BR /&gt;I am researching products such as Pedestal-Security Expressions&amp;lt;&amp;gt;  for semi-automated security audit of various systems.&lt;BR /&gt;&lt;BR /&gt;For those that are not interested in wading through the marketing bull: Security Expressions use a remote login via ssh/telnet to audit supported systems.  Essentially, it has a batch of scripts that check for security problems by logging in remotely and running the sh scripts and then builds a nice report out of the findings.&lt;BR /&gt;&lt;BR /&gt;Security Expressions does not have a module for OpenVMS and I need to find a tool similar in nature to use on OpenVMS.&lt;BR /&gt;&lt;BR /&gt;Any suggestions?&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;BR /&gt;EW</description>
      <pubDate>Thu, 28 Apr 2005 09:00:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/security-audit-on-openvms/m-p/3534076#M49131</guid>
      <dc:creator>Ed Welsh</dc:creator>
      <dc:date>2005-04-28T09:00:16Z</dc:date>
    </item>
    <item>
      <title>Re: Security Audit on OpenVMS</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/security-audit-on-openvms/m-p/3534077#M49132</link>
      <description>&lt;A href="http://www.windowsitpro.com/Windows/Article/ArticleID/209/209.html" target="_blank"&gt;http://www.windowsitpro.com/Windows/Article/ArticleID/209/209.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;was once used by audit over here.&lt;BR /&gt;&lt;BR /&gt;Wim</description>
      <pubDate>Thu, 28 Apr 2005 09:13:36 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/security-audit-on-openvms/m-p/3534077#M49132</guid>
      <dc:creator>Wim Van den Wyngaert</dc:creator>
      <dc:date>2005-04-28T09:13:36Z</dc:date>
    </item>
    <item>
      <title>Re: Security Audit on OpenVMS</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/security-audit-on-openvms/m-p/3534078#M49133</link>
      <description>Here are my findings/notes from 1998 (or was it 97).&lt;BR /&gt;&lt;BR /&gt;Wim</description>
      <pubDate>Thu, 28 Apr 2005 09:20:33 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/security-audit-on-openvms/m-p/3534078#M49133</guid>
      <dc:creator>Wim Van den Wyngaert</dc:creator>
      <dc:date>2005-04-28T09:20:33Z</dc:date>
    </item>
    <item>
      <title>Re: Security Audit on OpenVMS</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/security-audit-on-openvms/m-p/3534079#M49134</link>
      <description>I've not tried it but there is &lt;BR /&gt;&lt;A href="http://www.pointsecure.com/products/pointaudit.asp" target="_blank"&gt;http://www.pointsecure.com/products/pointaudit.asp&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;HP sell a security sevice.&lt;BR /&gt;&lt;BR /&gt;CA ePCM has some support for a few versions of VMS.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 29 Apr 2005 03:39:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/security-audit-on-openvms/m-p/3534079#M49134</guid>
      <dc:creator>Ian Miller.</dc:creator>
      <dc:date>2005-04-29T03:39:37Z</dc:date>
    </item>
    <item>
      <title>Re: Security Audit on OpenVMS</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/security-audit-on-openvms/m-p/3534080#M49135</link>
      <description>Ed,&lt;BR /&gt;&lt;BR /&gt;Many products in the *XIX world check for a list of vulnerabilities. Unfortunately (or fortunately, depending on one's perspective I suppose), many of these problems are specific to *XIX implementations. OpenVMS systems have a fairly different potential set of problems, so I would be VERY surprised if the sh scripts written for a *XIX were of any real use on an OpenVMS platform (e.g., *XIX systems typically use sendmail, which has had numerous vulnerabilities, see the applicable CERT warnings available through &lt;A href="http://www.cert.org)." target="_blank"&gt;http://www.cert.org).&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;That said, the checklists in the back of the Guide to System Security are a good place to start a security audit. The Pointsecure products are certainly a good start.&lt;BR /&gt;&lt;BR /&gt;Having been involved on both sides of security audits, the tools can only tell you the "What", documenting the "Why" is often more important when the security audit is part of the ongoing package designed to increase the integrity of corporate processes.&lt;BR /&gt;&lt;BR /&gt;- Bob Gezelter, &lt;A href="http://www.rlgsc.com" target="_blank"&gt;http://www.rlgsc.com&lt;/A&gt;</description>
      <pubDate>Fri, 29 Apr 2005 05:08:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/security-audit-on-openvms/m-p/3534080#M49135</guid>
      <dc:creator>Robert Gezelter</dc:creator>
      <dc:date>2005-04-29T05:08:04Z</dc:date>
    </item>
    <item>
      <title>Re: Security Audit on OpenVMS</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/security-audit-on-openvms/m-p/3534081#M49136</link>
      <description>Bob,&lt;BR /&gt;&lt;BR /&gt;You are completely correct in the matching of business case with system configuration.  A thorough security policy should always be used as a guide to system setup.&lt;BR /&gt;&lt;BR /&gt;My task is to find a tool that automates the checking of common issues in OpenVMS the same way that Security Expressions does for AIX/Linux.&lt;BR /&gt;&lt;BR /&gt;I would expect the tool to be specific enough to not check an OpenVMS system for sendmail type configurations.  My familiarity is with linux and Solaris making this task more challenging.  Hence my post to this forum.&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;BR /&gt;EW</description>
      <pubDate>Fri, 29 Apr 2005 08:53:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/security-audit-on-openvms/m-p/3534081#M49136</guid>
      <dc:creator>Ed Welsh</dc:creator>
      <dc:date>2005-04-29T08:53:24Z</dc:date>
    </item>
  </channel>
</rss>

