- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- System Security Policy
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-22-2003 09:39 PM
01-22-2003 09:39 PM
I am currently making a System Security Policy to our HP-UX server. What thing that may I consider? other than converting it to trusted system, use password aging, etc.
Thanks in advance
Joseph
Solved! Go to Solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-22-2003 10:32 PM
01-22-2003 10:32 PM
SolutionYou should also look at the /var/adm/inetd.sec file which is an access control file for indernet daemons like
login, telnet, ftp, shell, rcp etc..
You should conside that as to whom to give access to.
Also look at the /etc/ftpd/ftpusers in 11.X and /etc/ftpusers in 10.X
this if for ftp access to users.
Rajeev
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-22-2003 10:34 PM
01-22-2003 10:34 PM
Re: System Security Policy
You should also look at the /var/adm/inetd.sec file which is an access control file for indernet daemons like
login, telnet, ftp, shell, rcp etc..
You should conside that as to whom to give access to.
Also look at the /etc/ftpd/ftpusers in 11.X and /etc/ftpusers in 10.X
this if for ftp access to users.
Rajeev
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-22-2003 10:36 PM
01-22-2003 10:36 PM
Re: System Security Policy
You should also look at the /var/adm/inetd.sec file which is an access control file for indernet daemons like
login, telnet, ftp, shell, rcp etc..
You should conside that as to whom to give access to.
Also look at the /etc/ftpd/ftpusers in 11.X and /etc/ftpusers in 10.X
this if for ftp access to users.
Rajeev
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-22-2003 10:36 PM
01-22-2003 10:36 PM
Re: System Security Policy
- File and directory permission/ownership.
- Console access policy (for example .. only root can log on to console).
- Root access policy (for example .. only system administrator have access to root).
- Security audit software (for example .. we use Medusa to give us weekly and monthly security reports).
- Audit trail on log files (for example .. how frequent you examine your system log files).
- File transfer policy.
- Root account log tools (for example .. sudo).
Hope this helps a bit ..
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-22-2003 10:36 PM
01-22-2003 10:36 PM
Re: System Security Policy
You should also look at the /var/adm/inetd.sec file which is an access control file for indernet daemons like
login, telnet, ftp, shell, rcp etc..
You should conside that as to whom to give access to.
Also look at the /etc/ftpd/ftpusers in 11.X and /etc/ftpusers in 10.X
this if for ftp access to users.
Rajeev
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-22-2003 10:39 PM
01-22-2003 10:39 PM
Re: System Security Policy
You should also look at the /var/adm/inetd.sec file which is an access control file for indernet daemons like
login, telnet, ftp, shell, rcp etc..
You should conside that as to whom to give access to.
Also look at the /etc/ftpd/ftpusers in 11.X and /etc/ftpusers in 10.X
this if for ftp access to users.
Rajeev
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-22-2003 10:47 PM
01-22-2003 10:47 PM
Re: System Security Policy
Setting up the system as a bastion server.
See here: http://people.hp.se/stevesk/bastion11.html
Installing bastille, see here: http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=B6849AA
Setting your system as trusted with password aging and utilsing the security policies provided. 'sam' is a good place to start. Isolate your console.
Also this posting, see the comments from Bill Hassell.
http://forums.itrc.hp.com/cm/QuestionAnswer/1,11866,0x4499e7e60861d511abcd0090277a778c,00.htm
Installing sudo: See here:http://hpux.connect.org.uk/hppd/hpux/Sysadmin/sudo-1.6.6/
Installing SSH: See here: http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=T1471AA
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-24-2003 03:14 AM
01-24-2003 03:14 AM
Re: System Security Policy
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-24-2003 05:00 AM
01-24-2003 05:00 AM
Re: System Security Policy
Note that warnings in email and login greetings are worthless as a practical policy although it makes the lawyers feel warm and fuzzy. A policy is just paper unless the systems are monitored (see IDS/9000 and Bastille) and actions taken.
Bill Hassell, sysadmin
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-24-2003 05:43 AM
01-24-2003 05:43 AM
Re: System Security Policy
get security_patch_check and make it your ogranizational policy to use it, and follow its recommendations on a regular basis.
http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProducts.pl?group_type=search&group_name=security_patch_check&search_free=1&search_trial=1&search_buy=1
You should get and install a version of crack 5.0 on a non-production server. Copy your /etc/passwd files once a month and run analysis. Any passwords that get guessed, force password change and make the supervisor aware.
You should run lastb last analysis on all your logs on a regular basis. That should be policy and you write the script and your operations department reviews the output on a weekly basis.
You should consider download and install of the saint utility on a non-production server. It can be used to probe unix boxes and NT/Microsoft boxes and report security vulnerabilities. It should be operational policy that during a maintenance window, production servers are checked in this way.
You should consider taking two courses at HP Education. Practical Unix and Network Security and Internet Security. Almost nobody takes the Internet course but its one of the best courses HP offers.
Lastly, you should make your system a trusted system. This enables password shadowing, automatic expiration of unused accounts, and a great audit log for tracking down issues.
P
Owner of ISN Corporation
http://isnamerica.com
http://hpuxconsulting.com
Sponsor: http://hpux.ws
Twitter: http://twitter.com/hpuxlinux
Founder http://newdatacloud.com
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-29-2003 09:40 AM
01-29-2003 09:40 AM
Re: System Security Policy
A couple of things to consider. I don't beleive these were mentioned above, but you may want to look into using SSH and TCPWrappers.
Regards,
Greg