Security Management Guide (G06.24+, H06.03+)

Contents
Security Management Guide522283-008
vi
7. Concerns for the System Administration
Team (continued)
7. Concerns for the System Administration Team (continued)
Operators and Privileges 7-15
Securing Network Access 7-15
Creating a Network User ID 7-16
Managing the Network User IDs 7-16
Security Precautions 7-16
Encrypting Data Between Nodes 7-17
Communicating With Other System Managers 7-17
8. Concerns for the EDP Auditor
System Files 8-1
Application Programs and Files 8-1
Utilities 8-1
The Super ID 8-2
Privileged IDs 8-2
Segregation of Duties 8-2
The User Community 8-2
Dial-Up Access 8-3
Network Security 8-3
Password Management 8-3
User Expiration 8-4
$CMON 8-4
Permissive Security 8-4
User Knowledge of File Security 8-5
CLEARONPURGE 8-5
Licensed Programs 8-5
PROGID Programs 8-5
Security Event Exits 8-6
A. Sample Policies
Sample Policy 1 A-1
Sample Policy 2 A-2
B. How Passwords are Encrypted
C. TACL Macros
Example 1. Snapshot Routine C-1
Example 2. Snapshotcheck Routine C-2
Example 3. Fapply Routine C-4
Example 4. Findone Routine C-5