HP-UX System Administrator's Guide: Security Management HP-UX 11i v3 (B3921-90020, September 2010)

Table Of Contents
The violator can then go to the client, log in as an ordinary user, and, using NFS, open
up the newly created server-side device special file and use it for devious means.
5.10.2.3 How to Safeguard NFS-Mounted Files
Following are suggestions to safeguard NFS-mounted files:
If possible, make sure that the same person administers both client and server
systems.
Maintain uniformity of user ID and group ID for server and client systems.
Routinely check the /dev files in the file systems exported from server.
Restrict who can have write access to the /etc/passwd client files.
For strictest control, audit every host that is accessible through the network.
Consider using the fstab nosuid command to protect the system against setuid
programs that can run as root and damage the system. The default mount option
is suid, which allows mounted programs with setuid permission to run with
the permissions of their owners, regardless of who starts them. Therefore, if a
program with setuid permission is owned by root, it will run with root
permissions, regardless of who starts it.
108 File System Security