Technical data

12
Security Considerations
This chapter outlines the security features available with the OpenVMS operating
system and suggests procedures to reduce the threat of a break-in on your system
or cluster. It also tells how to use the access control list editor (ACL editor) to
create and modify access control list entries (ACEs) on protected objects. For a
more detailed description of security management, refer to the OpenVMS Guide
to System Security.
Information Provided in This Chapter
This chapter describes the following tasks:
Task Section
Managing passwords Section 12.2
Adding to the system password dictionary Section 12.2.1
Setting up intrusion detection Section 12.3
Interpreting a user identification code (UIC) Section 12.4.1
Parsing a protection code Section 12.4.2
Creating access control lists (ACLs) Section 12.6
Using the access control list editor (ACL editor) Section 12.8
Auditing security-relevant events Section 12.9.1
This chapter explains the following concepts:
Concept Section
What security management involves Section 12.1
Aspects of password management Section 12.2
Ways to protect objects Section 12.4
Construction of access control lists (ACLs) Section 12.6
Audit log file analysis Section 12.10
For full descriptions of all these tasks and concepts, refer to the OpenVMS Guide
to System Security.
12.1 Understanding Security Management
As the person responsible for the day-to-day system management, you play an
important role in ensuring the security of your system. Therefore, you should
familiarize yourself with the security features available with the OpenVMS
operating system and implement the features needed to protect systems, users,
and files from damage caused by tampering. Effective operating system security
measures help prevent unauthorized access and theft of proprietary software,
Security Considerations 121