Ito Security; System Security - HP -UX B6941-90001 Administrator's Reference Manual

Management server on hp-ux
Table of Contents

Advertisement

ITO Security

The steps that an administrator needs to carry out to improve system
security involve much more than configuring software: in general terms,
the administrator needs to look at system security first and then
investigate problems that relate to network security. Finally, the
administrator needs to investigate the security implications and
possibilities that are addressed during the configuration of ITO itself.
This section covers the areas mentioned in this paragraph, namely:

System Security

Network Security
Port Security
ITO Security
System security covers the problems that need to be addressed to allow
the ITO management server and managed node to run on a "trusted"
system. Network security involves the protection of data that is
exchanged between the management server and the managed node and
is primarily DCE related. ITO security looks at the security- related
aspects of application setup and execution, operator-initiated actions,
and so on.
System Security
The following sections describe the areas that the administrator needs to
address in order to install and run ITO on an HP-UX system that is C2
compliant. For information on how to make a system C2 compliant, see
the relevant, product-specific documentation. Note that it is essential
that the underlying operating system be rendered secure first.
The section on system security covers the following areas:
General Security Guidelines in ITO
Restrictions
Chapter 10
Tuning, Troubleshooting, Security, and Maintenance
ITO Security
435

Advertisement

Table of Contents
loading

This manual is also suitable for:

Openview it

Table of Contents