Security Management Guide (G06.24+, H06.03+)

Safeguard System Security
Security Management Guide522283-008
3-21
Special Considerations
Specify Security Groups
With the Safeguard software, you can specify three security groups to designate who
can issue restricted audit commands. These three groups are the SECURITY-
ADMINISTRATOR security group, SYSTEM-OPERATOR security group and the
SECURITY-OSS-ADMINISTRATOR. The Safeguard Reference Manual describes the
capabilities of each group.
Establish Audit Pools
The audit service allows you to specify where you want audit records to be written. You
specify an audit pool, which is a subvolume that contains one or more audit files. If you
do not specify an audit pool, the system stores the audit records in the
$SYSTEM.SAFE subvolume.
Specify Recovery Actions
Determine what actions the audit service should take in case an audit file becomes full
or a disk volume containing the audit files goes down. For example, you can choose
between suspending auditing or denying any future access and authentication
requests. Your security policy should guide you in deciding which recovery actions are
appropriate.
Special Considerations
Consider the following issues when using the Safeguard software to secure your
system.
The Safeguard Bit
Disk-file labels contain a bit to indicate whether a file is protected by a Safeguard
authorization record. The bit is set to 1 when the Safeguard protection record is
created. Utilities and programs such as FUP, TACL, BACKUP, and RESTORE consult
this bit for display purposes. When the bit is set to 1, the Guardian security string
appears as four asterisks, ****.
If a disk file does not have its own authorization record but is instead protected by a
volume or subvolume authorization record, the Safeguard bit is not set to 1. Therefore,
even though the file’s Guardian security string does not indicate Safeguard protection,
the file might still have Safeguard protection at the volume or subvolume level. The
Safeguard software must be properly configured to check volume or subvolume
authorization records.
Note. In addition to audit service capabilities, members of the SECURITY-ADMINISTRATOR
security group can configure and stop the Safeguard subsystem, manage an event-exit
process, and add terminals to the Safeguard database (for authentication control). Consider
this when specifying members for this security group.