This guide contains the following information:
security administrators an overview of security issues, conceptual
design features, and security features specific to OpenVMS systems.
“Understanding System Security” Chapter 1
discusses levels of security requirements and describes three sources
of security failures.
“OpenVMS Security Model” Chapter 2
introduces the reference monitor concept of security design and provides
an overview of the operating system's security features.
“Security for the User”:
security actions and features for the general user.
“Using the System Responsibly” Chapter 3
provides information for the general user about the login and logout
processes and the responsible use of passwords.
“Protecting Data” Chapter 4
and “Descriptions of Object Classes” Chapter 5 describe object protection features in detail.
“Security for the System Administrator”:
security actions and features for the security administrator.
“Managing the System and its Data” Chapter 6
describes the general tasks of a security administrator.
“Managing System Access” Chapter 7 describes methods
of controlling system access.
“Controlling Access to System Data and Resources” Chapter 8 describes methods
of controlling access to system data and resources.
“Using Encryption” Chapter 9 describes how to use encryption.
which transforms a file into unrecognizable, unintelligible data,
even if someone manages to gain access to it.
“Securing a Cluster” Chapter 10
describes security-auditing features.
“Security Auditing” Chapter 11
describes how to recognize when a system is under attack and how to
protect and defend your system.
“System Security Breaches” Chapter 12
describes security-related actions specific to clustered systems,
such as setting up common system files and synchronizing authorization
“Security in a Network Environment” Chapter 13
describes security considerations for systems using networking.
“Using Protected Subsystems” Chapter 14
describes how to set up and manage protected subsystems.
“Assigning Privileges” Appendix A provides a summary
of all the user privileges available on the operating system and describes
who may need them.
“Protection for OpenVMS System Files” Appendix B lists the protection
codes and ownership that HP provides for critical system files.
“Alarm Messages” Appendix D provides examples
of security alarm messages.
The “Glossary” provides definitions of security-related
terms introduced in this guide.