Security Management Guide (G06.24+, H06.03+)

Index
Security Management Guide522283-008
Index-6
T
set 4-10
SETTIME 2-20
Set-group-ID permission bit 4-10
Set-user-ID permission bit 4-9
Sharing group resources 5-9
Software
installation controls 7-13
trusted 2-8
Specifying audit pools 3-21
Specifying audit recovery actions 3-21
Specifying security groups 3-21
Spooler, controlling 2-20
Stopping processes 3-5
Subvolumes
advantages of securing 3-16
configuration for security of 3-16
CREATE authority for 3-16
critical 3-15
protection 5-15
Super ID
abilities of 2-18
and controlling applications 2-21
and system time 2-20
and TMF 2-20
concerns for the auditor 8-2
controlling 2-19
emergencies requiring 2-22
licensing ability 2-9, 2-23
operating without 2-19
passwords for 2-19, 8-2
privileges of 5-6
purpose of 2-18
recovering 2-19
tasks requiring 2-21
Super-group users
IDs 7-4
privileges 5-6
SYSnn subvolume protection 3-2
System console 7-10
System emergencies 2-22
System files
and PROGID 2-10
ownership of 2-9
purge access to 2-9
read access to 2-9
responsibility for 8-1
security of 2-9
write access to 2-9
System programs, restricting access
to 7-14
System time, setting 2-20
SYSTEM-OPERATOR security group
capabilities of 3-4, 3-21
specifying members 3-4
T
TACL
default security 5-12
macros
examples of C-1
security of files 5-19
security features of 2-11
TACLCSTM file
for automatic logoffs 6-2
security of 5-18
to run applications 6-1
Terminal protection 5-3
TMF
and the super ID 2-20
starting and stopping 2-20
Trojan horse programs
defined 5-17
detection of 5-17
Trusted software 2-8
U
umask command 4-7, 5-22
User aliases 3-10, 7-4