Security Management Guide (G06.29+, H06.08+, J06.03+)
Index
Security Management Guide — 522283-021
Index - 6
T
for Safeguard protected files 3-21, 7-15
SECURITY-ADMINISTRATOR security
group
capabilities of 3-4, 3-20
specifying members 3-4
SECURITY-OSS-ADMINISTRSTOR
security group 3-4
Segregation of duties 1-2, 8-2
set 4-12
SETTIME 2-23
Set-group-ID permission bit 4-12
Set-user-ID permission bit 4-12
Sharing group resources 7-9
Software
installation controls 6-17
trusted 2-7
Specifying audit pools 3-20
Specifying audit recovery actions 3-20
Specifying security groups 3-20
Spooler, controlling 2-22
STATIC-FAILED-LOGON-RESET-
TIME 6-11
Stopping processes 3-5
Subvolumes
advantages of securing 3-16
configuration for security of 3-16
CREATE authority for 3-16
critical 3-15
protection 7-15
Super ID
abilities of
2-21
and controlling applications 2-23
and system time 2-23
and TMF 2-23
concerns for the auditor 8-2
controlling 2-21
emergencies requiring 2-24
licensing ability 2-9, 2-25
operating without 2-22
passwords for 2-21, 8-2
privileges of 7-6
purpose of 2-21
recovering 2-22
tasks requiring 2-23
Super-group users
IDs
6-4
privileges 7-6
SYSnn subvolume protection 3-2
System console 6-13
System emergencies 2-24
System files
and PROGID 2-9
ownership of 2-8
purge access to 2-8
read access to 2-8
responsibility for 8-1
security of 2-8
write access to 2-8
System programs, restricting access
to 6-18
System time, setting 2-23
SYSTEM-OPERATOR security group
capabilities of 3-4, 3-20
specifying members 3-4
T
TACL
default security
7-12
security features of 2-11
TACL macros
examples of
C-1
security of files 7-19
TACLCSTM file
for automatic logoffs
5-2
security of 7-18
to run applications 5-2
Terminal protection 7-3
TMF
and the super ID
2-23
starting and stopping 2-23
Trojan horse programs