AIX Audit Program文档格式.docx

上传人:b****1 文档编号:15395914 上传时间:2022-10-30 格式:DOCX 页数:13 大小:22.26KB
下载 相关 举报
AIX Audit Program文档格式.docx_第1页
第1页 / 共13页
AIX Audit Program文档格式.docx_第2页
第2页 / 共13页
AIX Audit Program文档格式.docx_第3页
第3页 / 共13页
AIX Audit Program文档格式.docx_第4页
第4页 / 共13页
AIX Audit Program文档格式.docx_第5页
第5页 / 共13页
点击查看更多>>
下载资源
资源描述

AIX Audit Program文档格式.docx

《AIX Audit Program文档格式.docx》由会员分享,可在线阅读,更多相关《AIX Audit Program文档格式.docx(13页珍藏版)》请在冰豆网上搜索。

AIX Audit Program文档格式.docx

I.PreliminarySteps

A.Obtainanorganizationalchartofthegroupresponsiblefortheoperatingenvironment.

B.Obtainanyexistingsecurityandcontrolprocedures

C.Obtainadescriptionofthenetworkconfiguration

D.Obtainalistingofthevarioussystems(applications)supportedbytheoperatingsystem

E.ObtainajobdescriptionoftheSystemAdministrator

II.InstallationAuditSteps

A.Reviewanydesigncriteriaforsystemsecurity.

B.Determinewhethertheuseraccessiscontrolledthroughtheoperatingsystem,thedatabasemanagementsystem,ortheapplicationfront-endmenusystem.

C.Determinewhatdocumentationstandardsexistandwhethertheyarebeingfollowed.

D.DeterminewhoactsastheSecurityAdministratorfortheoperatingenvironment.

E.Determinethestandardsforpasswordmanagementandconstruction.

F.Reviewanyexistingsecurityguidelinesforusers,groups,andfunctions.

III.PhysicalSecurity

A.Reviewthenetworkconfigurationtoensurethatallnetworkcomponentsarephysicallysecured.

TheseincludeFileServers,Bridges,Routers,Hubs/Concentrators,Gateways,TerminalServers,andModems.

B.Determinewhoisresponsibleandwhatdocumentationisrequiredforconfigurationchangestothephysicalnetwork.

Aretheseprocedureseffective?

Arethechangestothenetworkdocumented?

Areusersandotherimpactedpartiesproperlynotified?

C.EnsurethatonlytheSystemAdministratororotherauthorizedpersonnelhavephysicalaccesstothefileserverconsoleasthesystemcanberebootedfromthe‘A’driveandanewrootpasswordcanbesupplied.

IV.SystemAdministration

A.IdentifyalltheSystemAdministrators.

$grep:

0:

/etc/passwd

B.Determinethateachadministratorrequiresthislevelofauthority.

C.Determinethechangecontrolproceduresoverchangestousers,programs,menus,authorities,userscripts,hardwareandsystemsoftware.

D.Determinethattheproperpersonorgroupisresponsibleformonitoringthenetworkthatsupportthefileserver.

E.Determinethattheproperpersonorgroupisresponsibleforsystemshutdownandbackups.

F.DetermineiftheSystemAdministratorissupportedbyabackuporataminimumtheiruserid/passwordarekeptinasecuredlocationincaseofanemergency.

G.Determinewhoisresponsibleformaintaininglicenseagreementsandifallagreementsarebeingmet.

V.SystemSecurity

TheSystemAdministrator’sinterfacefortheAIXsystemistheSystemManagementInterfaceTool(smit).

Youcaninvokesmitbykeyingsmitattheoperatingsystemprompt.

A.DuringtheinitialinstallationdidtheSystemAdministratorcreateauditchecksumfiles.ThesefileswillallowtheSecurityAdministratortoverifythatnochangeshavebeenmadesincetheinstallationofthesystem.

Theauditchecksumfilesshouldcontainasingle-lineentryforeachfilehavingthefollowinginformation:

(See/etc/security/sysck.cfg)

fieldcomments

aclcontainsbothbaseandextendedaccesscontrollistdataforthefile

classalogicalgrouptowhichthisfilebelongs

pathnameAbsolutepathname

ownerEthersymbolicornumericID

groupEithersymbolicornumericID

modeSymbolicrepresentationasdisplayedbythels-lcommand

sizeSizeofthefileinbytes.Majorandminornumbersarelistedfordevices

linksNumberofhardlinkstopathname

versionNumericvalue,reportedbywhat

(1).

checksumFilecontentscomputedbyachecksumalgorithm.Thisfieldreflectsthe

slightestchangetoafile,evenasinglecharacter.

symlinksIndicateswhetherthefilehassymbolicorhardlinks

programtheassociatedcheckingprogram

sourcethesourcefileforthisfile

typethetypeoffile

Producingthesefilesshouldbeasimpletask.Theresultingfilesshouldresideinasecureddirectory.

Dynamicsecurityroutinesshouldberunonaperiodicbasistoensurethatthesecriticalfileshavenotbemodifiedwithoutproperapproval.

B.Determineifthesystemisrunninginasecured(trusted)mode.

/etc/security/passwdForthepasswordfile

Atrustedenvironmentformatstheprimarypasswordfile’sencryptedpassword/etc/passwdtothe/etc/security/passwdfileandreplacesthepasswordfieldinthe/etc/passwdwithan‘!

’.

Inaddition,itforcesallusertousepasswords,createsanauditIDnumberforeachuser,setstheauditflagonforallexistingusers,andconvertstheat,batch,andcrontabfilestousethesubmitter’sauditID.

C.Determineifauditinghasbeenenabled.Usethefollowingfiletolookatdefinedauditevents:

/etc/security/audit/events

Determineifminimalsetofauditableeventsisbeingrecorded.

Auditingisenabledbyentering/etc/auditstart

FilesusedbyAudit

/etc/security/audit/configconf

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 工程科技 > 电力水利

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1