AIX Audit Program

更新时间:2023-07-24 05:45:34 阅读: 评论:0

AIX CHECKLIST
By:    Frank W. Lyons
    President of Entellus Technology Group, Inc.
    407-774-8397
   
I.    Preliminary Steps
A. Obtain an organizational chart of the group responsible for the operating environment.
B.  Obtain any existing curity and control procedures
   
C.  Obtain a description of the network configuration
D.  Obtain a listing of the various systems (applications) supported by the operating system
小妇人英文简介
E.  Obtain a job description of the System Administrator
II.    Installation Audit Steps
A.  Review any design criteria for system curity.
B.  Determine whether the ur access is controlled through the operating system, the databa management system, or the application front-end menu system.
C.  Determine what documentation standards exist and whether they are being followed.
D.  Determine who acts as the Security Administrator for the operating environment.
E.  Determine the standards for password management and construction.
F.  Review any existing curity guidelines for urs, groups, and functions.
III.  Physical Security
A.  Review the network configuration to ensure that all network components are physicall
y cured.
      The include File Servers, Bridges, Routers, Hubs/Concentrators, Gateways, Terminal Servers, and Modems.
B.  Determine who is responsible and what documentation is required for configuration changes to the physical network. 
    Are the procedures effective?
deduct    Are the changes to the network documented?
美国电影明星法文名字    Are urs and other impacted parties properly notified?
C.  Ensure that only the System Administrator or other authorized personnel have physical access to the file rver console as the system can be rebooted from the ‘A’ drive and a new root password can be supplied.
IV.    System Administration
A.  Identify all the System Administrators.
      $grep :0:  /etc/passwd
B.  Determine that each administrator requires this level of authority.
C.  Determine the change control procedures over changes to urs, programs, menus, authorities, ur scripts, hardware and system software.
D.  Determine that the proper person or group  is responsible for monitoring the network that support the file rver.
E.  Determine that the proper person or group is responsible for system shutdown and backups.
F.  Determine if the System Administrator is supported by a backup or at a minimum their urid/password are kept in a cured location in ca of an emergency.
G.  Determine who is responsible for maintaining licen agreements and if all agreement
s are being met.
重庆礼仪V.  System Security
The System Administrator’s interface for the AIX system is the System Management Interface Tool  (smit).
You can invoke smit by keying smit at the operating system prompt.
A.  During the initial installation did the System Administrator create audit check sum files.  The files will allow the Security Administrator to verify that no changes have been made since the installation of the system.
      The audit check sum files should contain a single-line entry for each file having the following information: (See /etc/curity/sysck.cfg)
              field                          comments
              acl        contains both ba and extended access control list data for the file
              class        a logical group to which this file belongs       
              pathname                Absolute pathname
royal mail
              owner                      Ether symbolic or numeric ID
horizon是什么意思
              group                      Either symbolic or numeric ID
              mode                        Symbolic reprentation as displayed by the ls -l commandyou and me
五年级英语手抄报
              size                          Size of the file in bytes.  Major and minor numbers are listed for devices
              links                        Number of hard links to pathname
              version                    Numeric value, reported by what(1).
              checksum                File contents computed by a checksum algorithm.  This field reflects the
                                                slightest change to a file, even a single character.
              symlinks                Indicates whether the file has symbolic or hard links                               
              program        the associated checking program
汕头翻译公司

本文发布于:2023-07-24 05:45:34,感谢您对本站的认可!

本文链接:https://www.wtabcd.cn/fanwen/fan/78/1114033.html

版权声明:本站内容均来自互联网,仅供演示用,请勿用于商业和其他非法用途。如果侵犯了您的权益请与我们联系,我们将在24小时内删除。

标签:翻译   简介   美国   重庆   汕头
相关文章
留言与评论(共有 0 条评论)
   
验证码:
推荐文章
排行榜
Copyright ©2019-2022 Comsenz Inc.Powered by © 专利检索| 网站地图