HP-UX System Administrator's Guide: Security Management HP-UX 11i v3 (B3921-90020, September 2010)

Table Of Contents
9.6 Using the Audit Filtering Tools.............................................................................176
9.7 Using filter.conf .....................................................................................................177
9.8 Using the Audit Reporting Tools...........................................................................177
9.8.1 Examples of Using the auditdp Command...................................................179
9.9 Viewing Audit Logs...............................................................................................180
9.9.1 Examples of Using the audisp Command.....................................................181
9.10 Self-Auditing........................................................................................................181
9.11 HP-UX RBAC Auditing.......................................................................................182
9.11.1 Auditing Based on HP-UX RBAC Criteria and the /etc/rbac/aud_filter
File..........................................................................................................................182
9.11.2 Procedure for Auditing HP-UX RBAC Criteria...........................................183
A Trusted Systems......................................................................................................................185
A.1 Setting Up a Trusted System......................................................................................185
A.2 Auditing a Trusted System.........................................................................................186
A.3 Managing Trusted Passwords and System Access.....................................................186
A.3.1 Password Files....................................................................................................187
A.3.1.1 The /etc/passwd File...................................................................................188
A.3.1.2 The /tcb/files/auth/ Database......................................................................188
A.3.2 Password Selection and Generation...................................................................189
A.3.3 Password Aging.................................................................................................189
A.3.4 Password History and Password Reuse.............................................................190
A.3.5 Time-Based Access Control................................................................................190
A.3.6 Device-Based Access Control.............................................................................190
A.3.7 Manipulating the Trusted System Databases.....................................................191
A.4 Guidelines for Trusted Backup and Recovery...........................................................191
B Other Security Products...........................................................................................................193
B.1 HP-UX AAA Server (RADIUS)...................................................................................193
B.2 HP-UX Bastille............................................................................................................193
B.3 HP-UX Directory Server.............................................................................................194
B.4 HP-UX Encrypted Volume and File System (EVFS)...................................................194
B.5 HP-UX HIDS...............................................................................................................194
B.6 HP-UX IPFilter............................................................................................................195
B.7 HP-UX IPSec...............................................................................................................195
B.8 HP-UX LDAP-UX Integration....................................................................................195
B.9 HP-UX Secure Resource Partitions (SRP)...................................................................196
B.10 HP-UX Secure Shell ..................................................................................................196
B.11 HP-UX Trusted Computing Services........................................................................196
B.12 Security Patches.........................................................................................................197
Glossary...................................................................................................................................199
Table of Contents 9