Ito security, System security – HP UX B6941-90001 User Manual
Page 435

Chapter 10
435
Tuning, Troubleshooting, Security, and Maintenance
ITO Security
ITO Security
The steps that an administrator needs to carry out to improve system
security involve much more than configuring software: in general terms,
the administrator needs to look at system security first and then
investigate problems that relate to network security. Finally, the
administrator needs to investigate the security implications and
possibilities that are addressed during the configuration of ITO itself.
This section covers the areas mentioned in this paragraph, namely:
System security covers the problems that need to be addressed to allow
the ITO management server and managed node to run on a “trusted”
system. Network security involves the protection of data that is
exchanged between the management server and the managed node and
is primarily DCE related. ITO security looks at the security- related
aspects of application setup and execution, operator-initiated actions,
and so on.
System Security
The following sections describe the areas that the administrator needs to
address in order to install and run ITO on an HP-UX system that is C2
compliant. For information on how to make a system C2 compliant, see
the relevant, product-specific documentation. Note that it is essential
that the underlying operating system be rendered secure first.
The section on system security covers the following areas: