HP-UX System Administrator's Guide: Security Management HP-UX 11i v3 (B3921-90020, September 2010)

Table Of Contents
B.3 HP-UX Directory Server
A global directory service, HP-UX Directory Server (HPDS) provides an
industry-standard, centralized directory service on which to build your intranet or
extranet. Your HP-UX servers and other directory-enabled applications use the directory
server as a common, network-accessible location for storing shared data such as user
and group identification, server identification, and access control information. In
addition, you can extend the HP-UX Directory Server to support your entire enterprise
with a global directory service that enables centralized management of all enterprise
resource information.
HP-UX Directory Server includes enterprise-class features, including multi-master
replication, encryption, authentication and access control, remote administration,
on-line backup, as well as numerous other features.
For more information, see the HP-UX Directory Server documentation:
http://www.hp.com/go/hpux-security-docs
Click HP-UX Directory Server.
B.4 HP-UX Encrypted Volume and File System (EVFS)
EVFS (Encrypted Volume and File System) is an application-transparent technology
providing protection of data at rest.
With EVFS, critical files and data at rest (on disk) are stored in encrypted form on disk.
EVFS safeguards against compromised use of and unauthorized access to data due to
physical theft of storage devices. The data encryption is based on a secret-key
cryptosystem and runs as an integrated kernel service transparent to the user.
With HP-UX EVFS, disks and volumes can be configured to be used in one of two
modes - volume-level encryption (EVS) or file-level encryption (EFS).
For more information, see the HP-UX EVFS documentation:
http://www.hp.com/go/hpux-security-docs
Click HP-UX Encrypted Volume and File System Software.
B.5 HP-UX HIDS
HP-UX Host Intrusion Detection System (HIDS) enables security administrators to
proactively monitor, detect, and respond to attacks within a network, as follows:
Protects against both existing attack scenarios and against some as of yet unknown
scenarios. It seeks out patterns that might suggest security breaches or misuses by
examining information about system activity from a variety of data sources. Such
illicit activities might include: a hacker attempting to break into or disrupt your
system, subversive "insider" activities, or someone trying to spread a virus
Detects product enhances local host-level security within your network. It
automatically monitors each configured host system within the network for possible
signs of unwanted and potentially damaging intrusions. If unchecked it can lead
to the loss of availability of key systems or can compromise system integrity.
HP-UX HIDS generate alerts for many types of exploits.
194 Other Security Products