- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- security - best practices
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО12-30-2010 08:30 AM
тАО12-30-2010 08:30 AM
we re moving from an 11.11 pa-risc dome to an 11.31 itanium dome. i want to impliment tighter security (/etc/default/security, ftpusers) that im not using currently. is there any best practice type documents, etc that are out there and that u all have experienced as practical?
thx in advance
Solved! Go to Solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО12-30-2010 08:55 AM
тАО12-30-2010 08:55 AM
SolutionBastille.
As part of the installation you can select one of four successively more secure configurations with Bastille during or following installation of the operating system. See page-29 here:
http://bizsupport.austin.hp.com/bc/docs/support/SupportManual/c02281370/c02281370.pdf
Regards!
...JRF...
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО12-30-2010 09:57 AM
тАО12-30-2010 09:57 AM
Re: security - best practices
Most of the general security practices are common between unix platforms. Any good security book will give you the details on those.
One area I tend to push admins and users alike is in the use of secure shell (ssh), particularly as it relates to direct root access.
I've written the same document for a couple of different clients now that suggests ssh, using public key authentication (pka), is a better method of accessing root that the standard admin login/sudo combination.
That document, finally made more general, is available at http://www.olearycomputers.com/ll/sudo_v_ssh-pka.html
A generalized ssh users' guide is available at http://www.olearycomputers.com/ll/ssh_guide.html
Hope that helps.
Doug O'Leary
------
Senior UNIX Admin
O'Leary Computers Inc
linkedin: http://www.linkedin.com/dkoleary
Resume: http://www.olearycomputers.com/resume.html
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО12-30-2010 03:32 PM
тАО12-30-2010 03:32 PM
Re: security - best practices
After you run bastille it will bring up a GUI where you answer about 30 questions and it will lockdown the system based on your answers. THe nice thing is you can keep that confuration or undo the configuration.
if you keep the configuration then you can take the config file to another system and run bastille with that config and the other system will be "locked down" the same exact way. (assuming same OS version).
Bottom line: create a bastille config on 1 system then use that config for all of them.
THere is also a feature called bastille_drift to see if anyone made changes so the system does not match the bastille configuration. This is neat.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО01-07-2011 06:12 AM
тАО01-07-2011 06:12 AM
Re: security - best practices
http://cisecurity.org/en-us/?route=downloads.browse.category.benchmarks.os.unix.hpux
They also have a scoring tool and utility/script for checking file permits.
http://cisecurity.org/en-us/?route=downloads.browse.category.tools.unix
Best regards,
Don