Safeguard Administrator's Manual (G06.24+, H06.03+)

Table Of Contents
Installation and Management
Safeguard Administrator’s Manual523317-013
10-12
Monitoring the Safeguard Subsystem
For all these objects, list the users who should be able to read, write, or create
process names, devices, volumes, subvolumes, and disk files. For more
information on securing objects, see the Security Management Guide.
3. Create OBJECTTYPE protection records as appropriate to restrict the set of users
who can add protection records for various types of objects. It is especially
advisable to use the OBJECTTYPE PROCESS command to define a limited set of
users can who add protection records for process names. This approach prevents
general users from securing critical processes and thereby controlling those
processes. For more information regarding the OBJECTTYPE commands, see
Section 5, OBJECTTYPE Control.
4. Implement additional Safeguard controls for existing users with the SAFECOM
ALTER USER command. For example, this command requires AUDIT.BOB to
change his password every 15 days:
=ALTER USER audit.bob, PASSWORD-MUST-CHANGE EVERY 15 DAYS
The same controls can be implemented for new users with the ADD USER
command.
5. Define the SECURITY-ADMINISTRATOR and SYSTEM-OPERATOR security
groups to control the use of the audit service commands, TERMINAL commands,
ALTER SAFEGUARD command, and STOP SAFEGUARD command. For more
information about the security groups, see Section 6, Managing Security Groups.
6. Use ADD TERMINAL commands to add terminal definitions for those terminals to
be controlled by the Safeguard software. For more information about Safeguard
terminals, see Section 7, Securing Terminals.
7. If necessary, develop and install software tools to allow users who are restricted
from SAFECOM to get information that they need about their Safeguard status.
Monitoring the Safeguard Subsystem
Monitoring the Safeguard subsystem comprises checking the system console for
Safeguard status and internal error messages, and managing the Safeguard audit files
to prevent data loss.
Note. Do not secure the process name $ZSMP or the subprocess name $ZSMP.#ZSPI.
Also, you cannot secure the process name $0 with the Safeguard software.
You need not establish an access control list for Safeguard SPI commands. These
commands are subject to the same restrictions as their equivalent SAFECOM commands.
For example, if you have defined a SECURITY-ADMINISTRATOR security group, only
members of that group can execute the ALTER SAFEGUARD command and its equivalent
SPI command ALTER SUBSYSTEM.