Introduction to NonStop Operations Management
Contents
Introduction to NonStop Operations Management–125507
xi
9. Security Management
The Computer Room 9-9
Environmental Controls 9-10
System Cabinets 9-10
Terminals 9-10
Printers 9-10
Tape Units 9-10
Tape Library 9-10
On-Site and Off-Site Media Storage 9-10
Data Encryption 9-11
Managing Access to the System 9-11
User Groups 9-11
Access-Control Lists (ACLs) 9-12
Adding User IDs 9-12
Assigning User Aliases 9-12
Special User IDs 9-12
Guest-User IDs 9-15
Unused User IDs 9-15
Deleting Users IDs 9-15
Reusing User IDs 9-16
Managing Passwords 9-16
Requiring Strong Passwords 9-16
Setting Unexpected Initial Passwords 9-17
Enforcing Routine Password Changes 9-17
Protecting Passwords 9-17
Dial-Up Access and Security 9-17
Authorization Lists 9-18
Additional External Passwords 9-18
Callback Routine 9-18
Automatic Terminal Authentication 9-18
Periodic Password and Telephone Number Changes 9-18
What Happens if the Line Is Dropped? 9-18
Securing Network Access 9-18
Managing Network User IDs 9-18
Security Precautions 9-19
Encrypting Data Between Systems 9-19
Communication With Other Operations Groups 9-19
Securing Client/Server Environments 9-19
OSS System Security 9-20
OSS File Security 9-20