HP NonStop Server Security (eBook)
656 Seiten
Elsevier Science (Verlag)
978-0-08-049149-3 (ISBN)
This handbook familiarizes auditors and those responsible for security configuration and monitoring with the aspects of the HP NonStop server operating system that make the NonStop Server unique, the security risks these aspects create, and the best ways to mitigate these risks.
?Addresses the lack of security standards for the NonStop server
?Provides information robust enough to train more security-knowledgeable staff
?The ideal accompaniment to any new HP NonStop system"
Since the last publication of the Ernst and Young book on Tandem security in the early 90's, there has been no such book on the subject. We've taken on the task of supplying a new Handbook whose content provides current, generic information about securing HP NonStop servers. Emphasis is placed on explaining security risks and best practices relevant to NonStop environments, and how to deploy native security tools (Guardian and Safeguard). All third party vendors who supply security solutions relevant to NonStop servers are listed, along with contact information for each vendor. The Handbook is a source for critical information to NonStop professionals and NonStop security administrators in particular. However, it is written in such a way as to also be extremely useful to readers new to the NonStop platform and to information security. This handbook familiarizes auditors and those responsible for security configuration and monitoring with the aspects of the HP NonStop server operating system that make the NonStop Server unique, the security risks these aspects create, and the best ways to mitigate these risks.*Addresses the lack of security standards for the NonStop server*Provides information robust enough to train more security-knowledgeable staff *The ideal accompaniment to any new HP NonStop system
Front Cover 1
HP NonStop™ Server Security 4
Copyright Page 5
Contents 8
Foreword 34
Preface 36
Introduction 38
About This Handbook 39
Applying the Security 42
Chapter 1. Security Basics 46
Importance of Corporate Security Policies and Standards 46
Information Security 48
Controlling Access to Systems and Resources 52
Compliance Monitoring and Documentation 55
Chapter 2. The HP NonStop Server Architecture and Environment 58
Understanding the Architecture 58
HP NonStop Networking 60
Guardian Personality 71
Configuring the Safeguard Subsystem 79
Chapter 3. Authentication User Administration
User Administration 126
Privileged IDs 129
Personal Userids 139
Managing Userids In the Guardian System 142
Managing Userids With the Safeguard Subsystem 143
Auditing Users 151
Password Administration 155
Password-Related Logon Controls 157
Chapter 4. Authentication, Granting Access to the HP NonStop Server 170
Guardian Authentication 172
OSS Authentication 177
Safeguard-Controlled Terminals 177
Granting Access to the Remote Nodes 181
CMON 182
Chapter 5. Authorization—Object Security 188
Defining User Access to System Resources 188
Guardian Process Security 189
Securing Processes With the Safeguard Subsystem 198
Device Security 208
The File Subsystem 215
Securing Diskfiles In the Guardian Environment 218
Securing Disk Files With the Safeguard Subsystem 220
Chapter 6. Gazette A to Z 242
ADDUSER User Program 242
AUDSERV System Program 245
AXCEL User Program 246
BACKCOPY System Utility 247
BACKUP User Program 248
Binder Subsystem 250
BUSCMD System Utility 256
$CMON System Program 257
Compilers 260
COUP System Utility 270
CROSSREF User Program 272
*CSTM Customization Files 274
Data Build User Program 286
DATA Loader/MP User Program 288
DCOM System Utility 289
Data Definition Language (DDL) Subsystem 290
DEFAULT User Program 293
DELUSER User Program 295
Disk Processes 298
DISKGEN System Utility 299
Distributed Name Service (DNS) Subsystem 300
DIVER System Utility 304
DSAP User Program 305
DSM/SCM Subsystem 307
DSM/TC Subsystem 312
ECHO User Program 318
EDIT User Program 319
EMS Subsystem 321
EMSA Subsystem 327
ENABLE User Program 330
ENFORM Subsystem 332
ERROR User Program 339
Expand Subsystem 340
FINGER System Utility 343
File Transfer Protocols 345
FUP System Utility 355
INSPECT Subsystem 362
Libraries, SRLs and Common Routines 367
Licensed Files 372
LISTNER System Utility 381
LOGIN System Program 384
LOGON User Program 385
MEASURE Subsystem 386
Native Link Editor (NLD) User Program 392
Native Object File Tool (NOFT) User Program 393
NETBATCH Subsystem 394
NSKCOM System Utility 399
Operating System 401
PAK/UNPAK User Programs 409
Password User Program 411
Pathway Subsystem 416
PCFORMAT User Program 424
PEEK System Utility 426
PING User Program 426
PROGID’d Files 427
PUP System Utility 434
NonStop RDF Subsystem 436
RESTORE User Program 448
RPASSWRD User Program 452
Safeguard Subsystem 453
Subsystem Control Facility (SCF) 459
Subsystem Control Point (SCP) 465
SEEVIEW User Program 468
SORT Subsystem 471
Subsystem Programmatic Interface (SPI) 474
Spooler Subsystem 477
Storage Management Foundation (SMF) Software 486
NonStop SQL Subsystem 492
SWID System Utility 504
SYSGENR System Utility 506
System Configuration Files 507
System Processes 516
System Startup Files 520
System Utilities 522
TACL Subsystem 530
TAPECOM System Utility 539
Telnet Subsystem 542
TGAL User Program 543
NonStop TMF Subsystem 544
TRACER (TRACE ROUTE) System Utility 556
USERS User Program 557
VIEWPOINT Application 558
VIEWSYS User Program 559
Virtual Hometerm Subsystem (VHS) 560
Chapter 7. Securing Applications 566
Understanding Application Development 566
Securing the Production Applications 571
Sanitizing Test Data 589
DEFINEs, ASSIGNs, PARAMs 590
Application Management and Support 593
A Gathering The Audit Information 598
B HP NonStop File Codes 632
C Third Party HP NonStop Server Security Vendors 634
About the Authors 636
Index 638
Erscheint lt. Verlag | 17.10.2003 |
---|---|
Sprache | englisch |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Weitere Themen ► Hardware | |
ISBN-10 | 0-08-049149-9 / 0080491499 |
ISBN-13 | 978-0-08-049149-3 / 9780080491493 |
Haben Sie eine Frage zum Produkt? |
Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine
Geräteliste und zusätzliche Hinweise
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich