skip book previous and next navigation links
go up to top of book: HP OpenVMS Guide to System SecurityHP OpenVMS Guide to System Security
go to beginning of part: Security for the System AdministratorSecurity for the System Administrator
go to beginning of chapter: System Security BreachesSystem Security Breaches
go to previous page: Indications of TroubleIndications of Trouble
go to next page: Handling a Security BreachHandling a Security Breach
end of book navigation links

Routine System Surveillance  



The operating system provides a number of mechanisms thatallow systematic surveillance of the activity in your system. Thereare many mechanisms available for monitoring the system either manuallyor by user-written command procedures, for example:

Proper use of such mechanisms should help you verify settings,alert you to problems, and allow you to intervene. This sectiondescribes the most important system surveillance mechanisms--ACCOUNTINGand ANALYZE/AUDIT.

System Accounting  

You can learn what the normal pattern of resource use is bystudying reports of the Accounting utility (ACCOUNTING). To obtaina report, you run the utility image SYS$SYSTEM:ACC.EXE. The resultingdata file is SYS$MANAGER:ACCOUNTNG.DAT. Review ACCOUNTING reportsbecause they can provide early indications of problems. Check forthe following:

Security Auditing  

As the security administrator, you can have the operatingsystem report on security-related activity by enabling categoriesof events for auditing using the DCL command SET AUDIT. Using theAudit Analysis utility (ANALYZE/AUDIT), you can periodically reviewevent messages collected in the security audit log file. (See Security Auditing for a full descriptionof the process.)

The operating system can send event messages to an audit logfile or to an operator terminal. You define whether events are reportedas audits or alarms in the following way:

Because security auditing affects system performance, enableauditing only for the most important events. The following security-auditingactions are presented in order of decreasing priority and increasingsystem cost:

  1. Enable securityauditing for login failures and break-ins. This is the best wayto detect probing by outsiders (and insiders looking for accounts).All sites needing security should enable alarms for these events.
  2. Enable security auditing for logins. Auditing successfullogins from the more suspicious sources like remote and dialup usersprovides the best way to track whichaccounts are being used. An audit record is written before userslogging in to a privileged account can disguise their identity.
  3. Enable security auditing for unsuccessful file access(ACCESS=FAILURE). This technique audits all file-protection violationsand is an excellent method of catching probers.
  4. Apply ACL-based file access auditing to detect writeaccess to critical system files. The most important files to auditare shown in System Files Benefiting from ACL-Based Auditing.(Access Control Entries (ACEs) for Security Auditing presents an exampleof how to establish security entries in ACLs.) Youmay want to audit only successful access to these files to detectpenetration, or you may want to audit access failures to detectprobing as well.

    Note that some of the files in System Files Benefiting from ACL-Based Auditing are written during normal system operation. Forexample, SYSUAF.DAT is written during each login, and SYSMGR.DIRis written when the system boots.

    Table 1   System Files Benefiting from ACL-Based Auditing
    Device and Directory File Name
    SYS$SYSTEM
    AUTHORIZE.EXE

    F11BXQP.EXE

    LOGINOUT.EXE

    DCL.EXE

    JOBCTL.EXE

    SYSUAF.DAT

    NETPROXY.DAT

    RIGHTSLIST.DAT

    STARTUP.COM

    VMS$OBJECTS.DAT
    SYS$LIBRARY
    SECURESHR.EXE

    SECURESHRP.EXE
    SYS$MANAGER
    VMS$AUDIT_SERVER.DAT

    SY*.COM

    VMSIMAGES.DAT
    SYS$SYSROOT
    [000000]SYSEXE.DIR

    [000000]SYSLIB.DIR

    [000000]SYS$LDR.DIR

    [000000]SYSMGR.DIR

  5. Enable security auditing for modifications to systemparameters or the known file list (/ENABLE=(SYSGEN,INSTALL) ).
  6. Audit use of privilege to access files (either writeaccess or all forms of access). Implement the security audit withthe keywords ACCESS=(SYSPRV,BYPASS,READALL,GRPPRV). Note that thisclass of auditing can produce a large volume of output because privilegesare often used in normal system operation for such tasks as maildelivery and operator backups.

Developing an Auditing Plan providesfurther discussion of recommended sets of security events to audit.


go to previous page: Indications of TroubleIndications of Trouble
go to next page: Handling a Security BreachHandling a Security Breach