SlideShare a Scribd company logo
1 of 2
Download to read offline
by Ron Luman and Alex Glushchenko
The IT security story is the same across most industries: Valuable
information is sitting on storage devices spread across the corporate
intranet. Users are demanding access to that information via multiple
devices from all corners of the world. At the same time, compliance with
legislative and/or industry regulations is causing additional scrutiny
to the security of the entire solution—from the application down to the
host hardware and operating-system platform. As global businesses
and society become more dependent on software, the security of that
software becomes even more critical.
Hewlett-Packard Company (HP) understands this, and for the past 20
years has been building one of the most trustworthy and secure UNIX®
operating systems on the market. Designed for
maximum protection against both external and
internal threats, the HP-UX 11i operating system has
a comprehensive and well-integrated set of security
features aimed at proactively mitigating risk and
reducing compliance cost.
For enterprise customers who must do more with
less and respond to constantly changing business
needs, security solutions provided with the
HP-UX 11i operating system simplify the deployment
of layered security features while providing the
extra assurance of in-depth protection. These
well-integrated security features offer solid security
protection, lower the total cost of ownership, and
reduce time to implementation while increasing
business agility and easing adherence to security
compliance requirements. HP-UX 11i security
solutions are included as part of the HP-UX
operating environments and are offered to customers
at no extra charge. From securing the fundamental
HP-UX infrastructure through to advanced identity
management and data protection, the HP-UX 11i
environment has well over a dozen multi-layered
security features designed as a complete enterprise
security solution.
Platform security fundamentals
The most basic goal of operating system security is to preserve the
integrity of the system in the face of attack. The HP-UX 11i operating
system includes a number of features that assist the administrator in
locking down the platform:
HP-UX Bastille provides a graphical interface that guides an
administrator in tasks to harden the system against attack, including
locking down system ports, files, and other components.
Host IDS uses kernel-level system audit information to continuously
monitor many systems for attacks, generating alerts and, as an option,
also responding in real time.
•
•
IPFilter provides system firewall capabilities, including stateful
connection filtering to limit the “attack surface” of the platform, and
connection throttling to limit the effectiveness of denial-of-service
attacks.
Install-Time Security eases default lockdowns by offering a menu of
security profiles that may be applied as part of the operating-system
installation process.
Security Patch Check helps ensure security patch currency by
periodically connecting to HP and recommending the latest security-
relevant patches.
Execute-Protected Stack prevents common types of buffer overflow
attacks, which are a leading contributor to platform compromise.
Security containment
HP Security Containment for HP-UX 11i is a suite
of security technologies designed to dramatically
reduce the likelihood of system compromise. HP
incorporates these enhanced security features into
the mainstream HP-UX 11i operating environment
to help businesses combat increasingly complex
threats. Without requiring modification to
applications, HP Security Containment isolates
compromised applications, which are denied
unauthorized access to other applications or files
on the system.
HP-UX 11i Security Containment comprises three
core technologies that together provide a highly
secure operating environment:
Compartments provide isolation and restrict
access to application and system resources
outside of the compartment to prevent
catastrophic damage should a compartment
be penetrated. HP-UX Security Containment
accomplishes this by controlling the flow of
information between processes in different
compartments. For example, outside compart-
ments can accept and process customer-facing
data and then transfer it securely, by rule, to
inside compartments for non-public access
and processing.
Fine-Grained Privileges grant only the privileges needed for a
task and, optionally, only for the time needed to perform the task.
Applications that are “privilege-aware” are able to elevate their
privilege level during the operation and lower it after completion of
the operation.
Role-Based Access Control provides a mechanism to allow non-root
users to perform administrative tasks, effectively splitting the power of
root into a manageable set of roles. An out-of-the-box configuration
supports many common HP-UX 11i commands and, when combined
with HP OpenView Select Access, also supports multi-system access
management.
•
•
•
•
•
•
•
HP-UX 11i security: mitigating risk and
reducing the cost of compliance
“Customers keep telling us
that management, integration,
and interoperability are
key issues. IT must install,
operate, and manage an
increasingly complex array
of technical solutions. An
increasing number of security
products, appliances, and
technologies are competing
for limited budgets. What
the organization really needs
is an architectural approach
that helps to clarify how and
where to use different types
of solutions.”
(Burton Group. “VantagePoint: 2006-
2007: Information Security Trends”
by Dan Blum, April 26, 2006.
Copyright ©2006 Burton Group)
Mission-critical virtualization
The HP Virtual Server Environment (VSE) enables companies to take
advantage of consolidation and virtualization techniques to improve
server utilization while reducing operating system management
costs and increasing security levels. VSE provides a mechanism for
consolidating applications within a single operating-system image. By
combining the benefits of HP Process Resource Manager for resource
entitlement and HP Security Containment for security isolation, Secure
Resource Partitions provide a secure solution for lightweight virtualization
within VSE infrastructures.
Identity management and accountability
Standard Mode Security Enhancements offer granular account and
password policies on a system-wide or per-user basis, including the
ability to generate detailed system audits for user accountability.
HP-UX LDAP-UX client services simplify identity management by
allowing system authentication and naming services to leverage
a new or existing LDAP directory.
Kerberos server and clients offer enterprise-class Single-Sign-On (SSO)
services as well as enhanced interoperability with Windows®
ADS.
HP-UX AAA server (RADIUS) authenticates network devices and
controls access.
Red Hat Directory Server for HP-UX provides an industry-standard,
centralized directory service to store digital identity information.
Common Criteria certification
The HP-UX 11i v2 operating system running on HP 9000 or HP Integrity
platforms has been successfully evaluated against the requirements for
the EAL4 Common Criteria (ISO 15408) Assurance Level, augmented
by ALC_FLR.3 (flaw remediation), using the Controlled Access (CAPP)
and Role-Based Access Control (RBAC) Protection Profiles. EAL4+ is
sometimes used as the abbreviated form for additional assurances.
Details of the evaluation and evaluated configuration are available at
www.common criteriaportal.org/public/files/epfiles/CRP225.pdf and
www.commoncriteriaportal.org/public/files/epfiles/hp-ux11iv2.pdf.
HP-UX 11i v3 enhancements further strengthen
security and streamline compliance
HP is committed to a long-term roadmap for the HP-UX 11i operating
system that encompasses continued enhancements to its built-in security
features. The latest release of the operating system, HP-UX 11i v3,
introduces a suite of new features that proactively mitigate risk and
reduce the cost of compliance:
HP-UX Identity Management Integration for Select Access, an
HP OpenView Select tool included at no charge with the HP-UX
operating system, simplifies user management with improved
provisioning and manageability. Instead of accessing each machine
individually to update security polices, it is now possible to manage
HP-UX 11i servers on a one-to-many basis; and add policies and rules
that define user privileges and manage access rights. With this tool, it
takes just a single click to define and apply high-level security policies
that accompany a specific role within an organization. For example,
•
•
•
•
•
•
the tool automatically assigns system backup and restore rights
when an employee joins the operations team, and withdraws these
privileges when the employee leaves the team.
Encrypted Volume and File System transparently protects “data-at-rest”
against unauthorized disclosure if the data is lost or stolen, and may
also provide “safe harbor,” avoiding the need for breach disclosure
required by some state laws.
Trusted Computing Services provides software support for embedded
security hardware that is available on selected HP Integrity servers for
enhanced key protection and EVFS auto-boot support.
HP Protected Systems offers an automated mechanism to configure
and deploy more secure systems by leveraging the built-in
protection of HP-UX 11i servers, reducing the time and level of
security knowledge required by IT personnel when configuring such
mechanisms as Security Containment, which isolates processes and
resources.
HP-UX Bastille with drift reporting checks the consistency of a system’s
hardening configuration with previously applied hardening policy to
avoid risk of system changes. This data reduces system exposure to
malware, simplifies compliance maintenance, and provides visibility
into undone hardening to allow planned response without risk of
unexpected system breakage.
HP-UX AAA Server offers more flexible integration with enterprise
databases in combination with centralized, RADIUS-based user
authentication and network access logging to simplify auditing and
compliance.
Conclusion
The HP-UX 11i operating environment provides a comprehensive array of
features that automate security processes, mitigating risks and lowering
the cost of compliance. HP rigorously designs, engineers, and tests these
features through targeted development as well as collaborative projects
with open source and third-party partners. Fully integrated within the
HP-UX 11i operating system, this continually evolving suite of security
enhancements is available at no extra cost to HP-UX customers.
For further information
HP-UX 11i Security Solutions: www.hp.com/go/hpux11isecurity
Free security and manageability downloads from HP Software Depot:
http://software.hp.com
Demo in a box—Managing Security on HP-UX with Identity
Management Systems: www.hp.com/aquarius/HPUX/
IdMIDemoInABox2.html
About the authors
As an HP-UX security master technologist at Hewlett-Packard Company,
Ron Luman has architectural responsibility for HP-UX security
technologies. Alex Glushchenko is the marketing manager for HP-UX
security products at HP.
UNIX is a registered trademark of The Open Group. Microsoft and Windows are
U.S. registered trademarks of Microsoft Corporation.
•
•
•
•
•

More Related Content

What's hot

PCI Compliance White Paper
PCI Compliance White PaperPCI Compliance White Paper
PCI Compliance White PaperRaz-Lee Security
 
Arch overview
Arch overviewArch overview
Arch overviewmaojunjie
 
LogRhythm PowerTech Interact Data Sheet
LogRhythm PowerTech Interact Data SheetLogRhythm PowerTech Interact Data Sheet
LogRhythm PowerTech Interact Data Sheetjordagro
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...IBM Security
 
NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012Nicolai Henriksen
 
PCI Compliance white paper
PCI Compliance white paper PCI Compliance white paper
PCI Compliance white paper HelpSystems
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625Bloombase
 
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure EnterpriseIBM Security
 
Altiris IT Management Suite 7
Altiris IT Management Suite 7Altiris IT Management Suite 7
Altiris IT Management Suite 7Symantec
 
IBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Sverige
 
FoxT BoKS ServerControl Full Specifications Document
FoxT BoKS ServerControl Full Specifications DocumentFoxT BoKS ServerControl Full Specifications Document
FoxT BoKS ServerControl Full Specifications DocumentRyan Gallavin
 
Reducing Cost and Complexity with Industrial System Consolidation
Reducing Cost and Complexity with Industrial System ConsolidationReducing Cost and Complexity with Industrial System Consolidation
Reducing Cost and Complexity with Industrial System ConsolidationIntel IoT
 
Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327vimal Kumar Gupta
 
Dell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlDell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlAidy Tificate
 
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Systems, Inc.
 
IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Sverige
 

What's hot (20)

Apani EpiForce Security Software Brochure
Apani EpiForce Security Software BrochureApani EpiForce Security Software Brochure
Apani EpiForce Security Software Brochure
 
PCI Compliance White Paper
PCI Compliance White PaperPCI Compliance White Paper
PCI Compliance White Paper
 
Arch overview
Arch overviewArch overview
Arch overview
 
LogRhythm PowerTech Interact Data Sheet
LogRhythm PowerTech Interact Data SheetLogRhythm PowerTech Interact Data Sheet
LogRhythm PowerTech Interact Data Sheet
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
 
NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012
 
PCI Compliance white paper
PCI Compliance white paper PCI Compliance white paper
PCI Compliance white paper
 
Privileged Access Manager POC Guidelines
Privileged Access Manager  POC GuidelinesPrivileged Access Manager  POC Guidelines
Privileged Access Manager POC Guidelines
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
 
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
 
Altiris IT Management Suite 7
Altiris IT Management Suite 7Altiris IT Management Suite 7
Altiris IT Management Suite 7
 
IBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - Portfolio
 
FoxT BoKS ServerControl Full Specifications Document
FoxT BoKS ServerControl Full Specifications DocumentFoxT BoKS ServerControl Full Specifications Document
FoxT BoKS ServerControl Full Specifications Document
 
Security
SecuritySecurity
Security
 
Reducing Cost and Complexity with Industrial System Consolidation
Reducing Cost and Complexity with Industrial System ConsolidationReducing Cost and Complexity with Industrial System Consolidation
Reducing Cost and Complexity with Industrial System Consolidation
 
Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327
 
Dell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlDell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access Control
 
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and Technology
 
Other Systems & Application Software
Other Systems & Application SoftwareOther Systems & Application Software
Other Systems & Application Software
 
IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access Manager
 

Viewers also liked

Assessment of Service Tribunals (Amendment) Act 2014
Assessment of Service Tribunals (Amendment) Act 2014Assessment of Service Tribunals (Amendment) Act 2014
Assessment of Service Tribunals (Amendment) Act 2014saharsaqib
 
บัญชีรายชื่อผู้ผ่านการเลือกสรรตำแหน่งเจ้าพนักงานธุรการ
บัญชีรายชื่อผู้ผ่านการเลือกสรรตำแหน่งเจ้าพนักงานธุรการบัญชีรายชื่อผู้ผ่านการเลือกสรรตำแหน่งเจ้าพนักงานธุรการ
บัญชีรายชื่อผู้ผ่านการเลือกสรรตำแหน่งเจ้าพนักงานธุรการWeeWei Anurak
 
End of module 2 review guide best
End of module 2 review guide bestEnd of module 2 review guide best
End of module 2 review guide bestErik Tjersland
 
Oracle MPOS Overview
Oracle MPOS OverviewOracle MPOS Overview
Oracle MPOS Overviewsourabh_singh
 
Sahar Saqib - Open Memo Final Draft
Sahar Saqib - Open Memo Final DraftSahar Saqib - Open Memo Final Draft
Sahar Saqib - Open Memo Final Draftsaharsaqib
 
Организация процесса кормления лошадей на конно-спортивной базе
Организация процесса кормления лошадей на конно-спортивной базеОрганизация процесса кормления лошадей на конно-спортивной базе
Организация процесса кормления лошадей на конно-спортивной базеSixSigmaOnline
 
Appendix C - Oral Presentation PowerPoint
Appendix C - Oral Presentation PowerPointAppendix C - Oral Presentation PowerPoint
Appendix C - Oral Presentation PowerPointsaharsaqib
 
Active and Passive Solar Energy System
Active and Passive Solar Energy SystemActive and Passive Solar Energy System
Active and Passive Solar Energy SystemHammad Javaid
 

Viewers also liked (17)

Module 2 lesson 9
Module 2 lesson 9Module 2 lesson 9
Module 2 lesson 9
 
Assessment of Service Tribunals (Amendment) Act 2014
Assessment of Service Tribunals (Amendment) Act 2014Assessment of Service Tribunals (Amendment) Act 2014
Assessment of Service Tribunals (Amendment) Act 2014
 
บัญชีรายชื่อผู้ผ่านการเลือกสรรตำแหน่งเจ้าพนักงานธุรการ
บัญชีรายชื่อผู้ผ่านการเลือกสรรตำแหน่งเจ้าพนักงานธุรการบัญชีรายชื่อผู้ผ่านการเลือกสรรตำแหน่งเจ้าพนักงานธุรการ
บัญชีรายชื่อผู้ผ่านการเลือกสรรตำแหน่งเจ้าพนักงานธุรการ
 
Proyecto de informática
Proyecto de informática Proyecto de informática
Proyecto de informática
 
Esteban y salome
Esteban y salomeEsteban y salome
Esteban y salome
 
End of module 2 review guide best
End of module 2 review guide bestEnd of module 2 review guide best
End of module 2 review guide best
 
Oracle MPOS Overview
Oracle MPOS OverviewOracle MPOS Overview
Oracle MPOS Overview
 
Sahar Saqib - Open Memo Final Draft
Sahar Saqib - Open Memo Final DraftSahar Saqib - Open Memo Final Draft
Sahar Saqib - Open Memo Final Draft
 
Web 2
Web 2Web 2
Web 2
 
X d.toosh
X d.tooshX d.toosh
X d.toosh
 
Introducción al Posicionamiento en Buscadores SEO
Introducción al Posicionamiento en Buscadores SEOIntroducción al Posicionamiento en Buscadores SEO
Introducción al Posicionamiento en Buscadores SEO
 
Dave Delap _Delap
Dave Delap _DelapDave Delap _Delap
Dave Delap _Delap
 
Организация процесса кормления лошадей на конно-спортивной базе
Организация процесса кормления лошадей на конно-спортивной базеОрганизация процесса кормления лошадей на конно-спортивной базе
Организация процесса кормления лошадей на конно-спортивной базе
 
Appendix C - Oral Presentation PowerPoint
Appendix C - Oral Presentation PowerPointAppendix C - Oral Presentation PowerPoint
Appendix C - Oral Presentation PowerPoint
 
Planos
PlanosPlanos
Planos
 
Active and Passive Solar Energy System
Active and Passive Solar Energy SystemActive and Passive Solar Energy System
Active and Passive Solar Energy System
 
Vectores y propiedades
Vectores y propiedadesVectores y propiedades
Vectores y propiedades
 

Similar to 17702 HP-UX IIi SC Mag

DACHNUG50 HCL BigFix_Keynote.pdf
DACHNUG50 HCL BigFix_Keynote.pdfDACHNUG50 HCL BigFix_Keynote.pdf
DACHNUG50 HCL BigFix_Keynote.pdfDNUG e.V.
 
Infographic - Cloud Hosting and Tenancy
Infographic - Cloud Hosting and Tenancy Infographic - Cloud Hosting and Tenancy
Infographic - Cloud Hosting and Tenancy Jeff Davis
 
Introduction to Gravitational Teleport
Introduction to Gravitational TeleportIntroduction to Gravitational Teleport
Introduction to Gravitational TeleportTeleport
 
IBM SmartCloud Desktop Infrastructure: VMware View on IBM Flex System
IBM SmartCloud Desktop Infrastructure: VMware View on IBM Flex SystemIBM SmartCloud Desktop Infrastructure: VMware View on IBM Flex System
IBM SmartCloud Desktop Infrastructure: VMware View on IBM Flex SystemIBM India Smarter Computing
 
Haloteq Presentation
Haloteq PresentationHaloteq Presentation
Haloteq Presentationmhaynes2010
 
Contextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized DesktopsContextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized DesktopsIvanti
 
Encoding Enhancers Woolpack virtualization services
Encoding Enhancers   Woolpack virtualization servicesEncoding Enhancers   Woolpack virtualization services
Encoding Enhancers Woolpack virtualization servicesAditi Shrivastava
 
Managed Services - Explained
Managed Services - ExplainedManaged Services - Explained
Managed Services - ExplainedGhassan Chahine
 
HCL BigFix - DNUG Stammtisch Salzburg
HCL BigFix - DNUG Stammtisch SalzburgHCL BigFix - DNUG Stammtisch Salzburg
HCL BigFix - DNUG Stammtisch SalzburgDNUG e.V.
 
IBM Security Software Solutions
IBM Security Software Solutions IBM Security Software Solutions
IBM Security Software Solutions Thierry Matusiak
 
Foundations of Cybersecurity's.pptx
Foundations of Cybersecurity's.pptxFoundations of Cybersecurity's.pptx
Foundations of Cybersecurity's.pptxSkillUp Online
 
Hqs abatis hdf general overview
Hqs abatis hdf general overviewHqs abatis hdf general overview
Hqs abatis hdf general overviewNine23Ltd
 
DACHNUG50 HCL BigFix mobile.pdf
DACHNUG50 HCL BigFix mobile.pdfDACHNUG50 HCL BigFix mobile.pdf
DACHNUG50 HCL BigFix mobile.pdfDNUG e.V.
 
IBM SmartCloud Desktop Infrastructure: Citrix XenDesktop on IBM Flex System
IBM SmartCloud Desktop Infrastructure: Citrix XenDesktop on IBM Flex SystemIBM SmartCloud Desktop Infrastructure: Citrix XenDesktop on IBM Flex System
IBM SmartCloud Desktop Infrastructure: Citrix XenDesktop on IBM Flex SystemIBM India Smarter Computing
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討Timothy Chen
 

Similar to 17702 HP-UX IIi SC Mag (20)

CSEC630 individaul assign
CSEC630 individaul assignCSEC630 individaul assign
CSEC630 individaul assign
 
DACHNUG50 HCL BigFix_Keynote.pdf
DACHNUG50 HCL BigFix_Keynote.pdfDACHNUG50 HCL BigFix_Keynote.pdf
DACHNUG50 HCL BigFix_Keynote.pdf
 
Infographic - Cloud Hosting and Tenancy
Infographic - Cloud Hosting and Tenancy Infographic - Cloud Hosting and Tenancy
Infographic - Cloud Hosting and Tenancy
 
Introduction to Gravitational Teleport
Introduction to Gravitational TeleportIntroduction to Gravitational Teleport
Introduction to Gravitational Teleport
 
IBM SmartCloud Desktop Infrastructure: VMware View on IBM Flex System
IBM SmartCloud Desktop Infrastructure: VMware View on IBM Flex SystemIBM SmartCloud Desktop Infrastructure: VMware View on IBM Flex System
IBM SmartCloud Desktop Infrastructure: VMware View on IBM Flex System
 
unit5final
unit5finalunit5final
unit5final
 
Haloteq Presentation
Haloteq PresentationHaloteq Presentation
Haloteq Presentation
 
Security PFE
Security PFESecurity PFE
Security PFE
 
Contextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized DesktopsContextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized Desktops
 
Encoding Enhancers Woolpack virtualization services
Encoding Enhancers   Woolpack virtualization servicesEncoding Enhancers   Woolpack virtualization services
Encoding Enhancers Woolpack virtualization services
 
Managed Services - Explained
Managed Services - ExplainedManaged Services - Explained
Managed Services - Explained
 
HCL BigFix - DNUG Stammtisch Salzburg
HCL BigFix - DNUG Stammtisch SalzburgHCL BigFix - DNUG Stammtisch Salzburg
HCL BigFix - DNUG Stammtisch Salzburg
 
IBM Security Software Solutions
IBM Security Software Solutions IBM Security Software Solutions
IBM Security Software Solutions
 
MBM Security Products Matrix
MBM Security Products MatrixMBM Security Products Matrix
MBM Security Products Matrix
 
Foundations of Cybersecurity's.pptx
Foundations of Cybersecurity's.pptxFoundations of Cybersecurity's.pptx
Foundations of Cybersecurity's.pptx
 
Hqs abatis hdf general overview
Hqs abatis hdf general overviewHqs abatis hdf general overview
Hqs abatis hdf general overview
 
DACHNUG50 HCL BigFix mobile.pdf
DACHNUG50 HCL BigFix mobile.pdfDACHNUG50 HCL BigFix mobile.pdf
DACHNUG50 HCL BigFix mobile.pdf
 
4AA4-1812ENW
4AA4-1812ENW4AA4-1812ENW
4AA4-1812ENW
 
IBM SmartCloud Desktop Infrastructure: Citrix XenDesktop on IBM Flex System
IBM SmartCloud Desktop Infrastructure: Citrix XenDesktop on IBM Flex SystemIBM SmartCloud Desktop Infrastructure: Citrix XenDesktop on IBM Flex System
IBM SmartCloud Desktop Infrastructure: Citrix XenDesktop on IBM Flex System
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討
 

17702 HP-UX IIi SC Mag

  • 1. by Ron Luman and Alex Glushchenko The IT security story is the same across most industries: Valuable information is sitting on storage devices spread across the corporate intranet. Users are demanding access to that information via multiple devices from all corners of the world. At the same time, compliance with legislative and/or industry regulations is causing additional scrutiny to the security of the entire solution—from the application down to the host hardware and operating-system platform. As global businesses and society become more dependent on software, the security of that software becomes even more critical. Hewlett-Packard Company (HP) understands this, and for the past 20 years has been building one of the most trustworthy and secure UNIX® operating systems on the market. Designed for maximum protection against both external and internal threats, the HP-UX 11i operating system has a comprehensive and well-integrated set of security features aimed at proactively mitigating risk and reducing compliance cost. For enterprise customers who must do more with less and respond to constantly changing business needs, security solutions provided with the HP-UX 11i operating system simplify the deployment of layered security features while providing the extra assurance of in-depth protection. These well-integrated security features offer solid security protection, lower the total cost of ownership, and reduce time to implementation while increasing business agility and easing adherence to security compliance requirements. HP-UX 11i security solutions are included as part of the HP-UX operating environments and are offered to customers at no extra charge. From securing the fundamental HP-UX infrastructure through to advanced identity management and data protection, the HP-UX 11i environment has well over a dozen multi-layered security features designed as a complete enterprise security solution. Platform security fundamentals The most basic goal of operating system security is to preserve the integrity of the system in the face of attack. The HP-UX 11i operating system includes a number of features that assist the administrator in locking down the platform: HP-UX Bastille provides a graphical interface that guides an administrator in tasks to harden the system against attack, including locking down system ports, files, and other components. Host IDS uses kernel-level system audit information to continuously monitor many systems for attacks, generating alerts and, as an option, also responding in real time. • • IPFilter provides system firewall capabilities, including stateful connection filtering to limit the “attack surface” of the platform, and connection throttling to limit the effectiveness of denial-of-service attacks. Install-Time Security eases default lockdowns by offering a menu of security profiles that may be applied as part of the operating-system installation process. Security Patch Check helps ensure security patch currency by periodically connecting to HP and recommending the latest security- relevant patches. Execute-Protected Stack prevents common types of buffer overflow attacks, which are a leading contributor to platform compromise. Security containment HP Security Containment for HP-UX 11i is a suite of security technologies designed to dramatically reduce the likelihood of system compromise. HP incorporates these enhanced security features into the mainstream HP-UX 11i operating environment to help businesses combat increasingly complex threats. Without requiring modification to applications, HP Security Containment isolates compromised applications, which are denied unauthorized access to other applications or files on the system. HP-UX 11i Security Containment comprises three core technologies that together provide a highly secure operating environment: Compartments provide isolation and restrict access to application and system resources outside of the compartment to prevent catastrophic damage should a compartment be penetrated. HP-UX Security Containment accomplishes this by controlling the flow of information between processes in different compartments. For example, outside compart- ments can accept and process customer-facing data and then transfer it securely, by rule, to inside compartments for non-public access and processing. Fine-Grained Privileges grant only the privileges needed for a task and, optionally, only for the time needed to perform the task. Applications that are “privilege-aware” are able to elevate their privilege level during the operation and lower it after completion of the operation. Role-Based Access Control provides a mechanism to allow non-root users to perform administrative tasks, effectively splitting the power of root into a manageable set of roles. An out-of-the-box configuration supports many common HP-UX 11i commands and, when combined with HP OpenView Select Access, also supports multi-system access management. • • • • • • • HP-UX 11i security: mitigating risk and reducing the cost of compliance “Customers keep telling us that management, integration, and interoperability are key issues. IT must install, operate, and manage an increasingly complex array of technical solutions. An increasing number of security products, appliances, and technologies are competing for limited budgets. What the organization really needs is an architectural approach that helps to clarify how and where to use different types of solutions.” (Burton Group. “VantagePoint: 2006- 2007: Information Security Trends” by Dan Blum, April 26, 2006. Copyright ©2006 Burton Group)
  • 2. Mission-critical virtualization The HP Virtual Server Environment (VSE) enables companies to take advantage of consolidation and virtualization techniques to improve server utilization while reducing operating system management costs and increasing security levels. VSE provides a mechanism for consolidating applications within a single operating-system image. By combining the benefits of HP Process Resource Manager for resource entitlement and HP Security Containment for security isolation, Secure Resource Partitions provide a secure solution for lightweight virtualization within VSE infrastructures. Identity management and accountability Standard Mode Security Enhancements offer granular account and password policies on a system-wide or per-user basis, including the ability to generate detailed system audits for user accountability. HP-UX LDAP-UX client services simplify identity management by allowing system authentication and naming services to leverage a new or existing LDAP directory. Kerberos server and clients offer enterprise-class Single-Sign-On (SSO) services as well as enhanced interoperability with Windows® ADS. HP-UX AAA server (RADIUS) authenticates network devices and controls access. Red Hat Directory Server for HP-UX provides an industry-standard, centralized directory service to store digital identity information. Common Criteria certification The HP-UX 11i v2 operating system running on HP 9000 or HP Integrity platforms has been successfully evaluated against the requirements for the EAL4 Common Criteria (ISO 15408) Assurance Level, augmented by ALC_FLR.3 (flaw remediation), using the Controlled Access (CAPP) and Role-Based Access Control (RBAC) Protection Profiles. EAL4+ is sometimes used as the abbreviated form for additional assurances. Details of the evaluation and evaluated configuration are available at www.common criteriaportal.org/public/files/epfiles/CRP225.pdf and www.commoncriteriaportal.org/public/files/epfiles/hp-ux11iv2.pdf. HP-UX 11i v3 enhancements further strengthen security and streamline compliance HP is committed to a long-term roadmap for the HP-UX 11i operating system that encompasses continued enhancements to its built-in security features. The latest release of the operating system, HP-UX 11i v3, introduces a suite of new features that proactively mitigate risk and reduce the cost of compliance: HP-UX Identity Management Integration for Select Access, an HP OpenView Select tool included at no charge with the HP-UX operating system, simplifies user management with improved provisioning and manageability. Instead of accessing each machine individually to update security polices, it is now possible to manage HP-UX 11i servers on a one-to-many basis; and add policies and rules that define user privileges and manage access rights. With this tool, it takes just a single click to define and apply high-level security policies that accompany a specific role within an organization. For example, • • • • • • the tool automatically assigns system backup and restore rights when an employee joins the operations team, and withdraws these privileges when the employee leaves the team. Encrypted Volume and File System transparently protects “data-at-rest” against unauthorized disclosure if the data is lost or stolen, and may also provide “safe harbor,” avoiding the need for breach disclosure required by some state laws. Trusted Computing Services provides software support for embedded security hardware that is available on selected HP Integrity servers for enhanced key protection and EVFS auto-boot support. HP Protected Systems offers an automated mechanism to configure and deploy more secure systems by leveraging the built-in protection of HP-UX 11i servers, reducing the time and level of security knowledge required by IT personnel when configuring such mechanisms as Security Containment, which isolates processes and resources. HP-UX Bastille with drift reporting checks the consistency of a system’s hardening configuration with previously applied hardening policy to avoid risk of system changes. This data reduces system exposure to malware, simplifies compliance maintenance, and provides visibility into undone hardening to allow planned response without risk of unexpected system breakage. HP-UX AAA Server offers more flexible integration with enterprise databases in combination with centralized, RADIUS-based user authentication and network access logging to simplify auditing and compliance. Conclusion The HP-UX 11i operating environment provides a comprehensive array of features that automate security processes, mitigating risks and lowering the cost of compliance. HP rigorously designs, engineers, and tests these features through targeted development as well as collaborative projects with open source and third-party partners. Fully integrated within the HP-UX 11i operating system, this continually evolving suite of security enhancements is available at no extra cost to HP-UX customers. For further information HP-UX 11i Security Solutions: www.hp.com/go/hpux11isecurity Free security and manageability downloads from HP Software Depot: http://software.hp.com Demo in a box—Managing Security on HP-UX with Identity Management Systems: www.hp.com/aquarius/HPUX/ IdMIDemoInABox2.html About the authors As an HP-UX security master technologist at Hewlett-Packard Company, Ron Luman has architectural responsibility for HP-UX security technologies. Alex Glushchenko is the marketing manager for HP-UX security products at HP. UNIX is a registered trademark of The Open Group. Microsoft and Windows are U.S. registered trademarks of Microsoft Corporation. • • • • •