POWER Systems
|
Vacation - great idea.
Got a conference and meet people - Great idea.
Three disks die in the heat of the basement - lousy thing to come home to.
Up again, and getting things back to normal.
|
|
AIX: Security
|
This will be a series of short articles - as a spin-off of the CIS Benchmark for AIX 7.2. That is, this started as a section for the benchmark - no recommendations intended - as a quick study for people not used to day-to-day administration or work on an AIX system.
Currently, it consists of at least 10 sub-sections - each describing one (aspect of) a security mechanism. There will be a lot of re-writing - and, likely, as not really on-topic for a security benchmark recommendation or guide - the information will need a seperate home. I cannot think of a better place than RootvgNet.
So, what are we looking at:
- Security Profile Evaluation Assurance
- AIX Security Expert
- Access Control Mechanisms
- Discretionary Access Control (inode based)
- Access Control Lists (AIXC and NFS4)
- Enhanced RBAC
- Logging Mechanisms
- Encryption
- IPSEC (IP Security)
- Trusted Executition
This is likely more to come - I can cut/paste some of the material I have already started. As I do, I'll update the list above so that it points to the new material.
|
|
AIX: Security
|
There are ways to spot differences of ssh and sshd. Here are just a few.
And I hope you find the differences easy to spot and maybe even enlightening!
|
Read more...
|
|
|
<< Start < Prev 1 2 Next > End >>
|
Results 1 - 3 of 5 |