HP OpenVMS Systems Documentation

Content starts here

OpenVMS Guide to System Security

Previous Contents Index

Backup operations
    general recommendations
    performed from captive privileged account
Backup utility (BACKUP)
    general recommendations
Batch identifiers
Batch jobs
    affected by shift restrictions
    password protection and cardreaders
Batch logins
Binary output from Audit Analysis utility
Break-in alarms
Break-in attempts
    auditing #1
    auditing #2
    counteraction through dual passwords
    detecting #1
    detecting #2
    security audit report and
Break key and secure servers
BUGCHK privilege
Buses, default security elements
BYPASS privilege
    effect on control access
    overriding access controls #1
    overriding access controls #2
C2 environments
C2 security, systems
    checklist for generating
    effect of site changes on certification
    object protection and
    physical security requirements
    software not included
    SYSMAN databases
    system parameters
    system startup
Capability-based systems
Capability objects
    as protected objects
    elements of
    reestablishing profile
    template profile
    types of access
Captive accounts
    command procedures
    Ctrl/Y key sequence and
    disabling mail and notification of delivery
    example of production account
    locked passwords and
    when to use #1
    when to use #2
Card readers, default security elements
Case sensitivity
    in passwords and user names
$CHECK_ACCESS system service, security auditing and
$CHECK_PRIVILEGE system service, reporting privilege use
$CHKPRO system service
    role in access control
    security auditing and
/CLITABLES qualifier #1
/CLITABLES qualifier #2
Cluster environments
    building single security domain
    C2 system restrictions
    managing audit log file
    protected object databases
    protected objects
    security considerations
    security implementation
    synchronizing authorization data
    SYSMAN requirements
    system file recommendations
    system file requirements
Cluster managers and security administrators
Clusterwide intrusion detection
CMEXEC privilege
CMKRNL privilege
Command mode for Audit Analysis utility, manipulating the display
Command procedures
    access control strings in
Commands, usage restrictions
Common event flag clusters
    as protected objects
    events audited
    privilege requirements
    reestablishing security profile
    security elements of
    system modifications of templates
    template profile
    types of access to
Communications devices
    C2 system requirements
    default security elements
Compilers, restricting use with ACLs
Confidential files, security auditing and
CONNECT command, /LOGOUT qualifier
Connections, auditing of
Console terminals
    C2 system requirements
    C2 systems and
    HSC and C2 system requirements
Consoles, enabling passwords for
Control access
    acquiring #1
    acquiring #2
    acquiring #3
    common event flag clusters
    global sections
    logical name tables
    resource domains
    security class
COPY command
    /PROTECTION qualifier
    security profile assigned
Create access
    logical name tables
CREATE/PROXY command in Authorize utility
CREATE/RIGHTS command in Authorize utility
Creator ACEs
    with resource identifiers
Ctrl/B key sequence
Ctrl/Y key sequence and restricted accounts
    volatile network
    authorization #1
    authorization #2
    protected objects
    synchronizing authorization on clustered systems
    C2 system restriction
DCL commands
    SET HOST/DTE in network operations
    SET TERMINAL in network operations
DCL tables, modifications for security
DDCMP (Digital Data Communications Message Protocol)
    asynchronous driver
Debug server identifier, C2 system restriction
DECamds, software not in C2 evaluation
DECdns distributed name service, not in C2 evaluation
    C2 system restrictions
    cluster nodes and
    dynamic asynchronous connection #1
    dynamic asynchronous connection #2
    dynamic asynchronous connection #3
    dynamic asynchronous connection #4
    INBOUND parameter #1
    INBOUND parameter #2
    installing dynamic asynchronous connection #1
    installing dynamic asynchronous connection #2
    network objects #1
    network objects #2
    nonprivileged user name
    receive password #1
    receive password #2
    receive passwords
    transmit password
    transmit passwords
DECnet-Plus for OpenVMS, full names not in C2 evaluation
DECwindows screens, clearing #1
DECwindows screens, clearing #2
DECwindows screens, clearing #3
DECwindows software, not in C2 evaluation
Default attribute for ACEs
Default ownership
    for directories
    for files
    for protected objects #1
    for protected objects #2
Default protection
    Alpha system files
    for directories
    for files
    for processes #1
    for processes #2
    for VAX system files
Default Protection ACEs #1
Default Protection ACEs #2
Default Protection ACEs #3
Default Protection ACEs #4
    generating default file protection #1
    generating default file protection #2
Delete access
    common event flag clusters
    granting through protection codes
    logical name tables
        through ACLs
        through protection codes
DELETE command, /ERASE qualifier
DETACH privilege
    access requirements
    as protected objects
    controlling access through ACLs
    default security elements
    events audited
    modifying security profiles of
    privilege requirements
    profile storage
    protecting BACKUP save sets
    reusing in C2 systems
    security elements of
    spooled, access requirements
    template security profiles
    terminal configuration
DIAGNOSE privilege
Dialup identifiers
Dialup lines
    connection security
    controlling access to
    using for dynamic asynchronous connection
    using in a public area
Dialup logins
    breaking connections
    controlling retries
    access control through ACLs
    access requirements #1
    access requirements #2
    assigning a security profile
    controlling access to files #1
    controlling access to files #2
    events audited
        by resource identifier
        changing access to files
        setting default
    setting default file protection
    setting file protection
DIRECTORY command, /SECURITY qualifier
Disconnected job messages
Disk quotas
    as restriction for users
    charging to identifiers
Disk scavenging
    preventing #1
    preventing #2
Disk space
    charging to identifier
    requirements for security audit log file
    usage and charging
Disk volumes
    controlling access
    accessing deleted data
    changing message transfer rate
    default security elements
    erase-on-allocate #1
    erase-on-allocate #2
    erasing #1
    erasing #2
    erasure patterns #1
    erasure patterns #2
    high-water marking #1
    high-water marking #2
    managing security profiles
    protecting after file deletion
DISMOUNT command, alarms
DOWNGRADE privilege
DSE (data security erase)
Dual passwords
Dynamic asynchronous connections
    automatic switching of terminal line
    connection example
    manual switching of terminal line
    passwords for
    procedure for establishing
    switching of terminal line
    terminating the link
Dynamic attribute for identifiers

Previous Next Contents Index