skip book previous and next navigation links
go up to top of book: HP OpenVMS Guide to System SecurityHP OpenVMS Guide to System Security
go to beginning of part: Security for the System AdministratorSecurity for the System Administrator
go to previous page: Handling a Security BreachHandling a Security Breach
go to next page: Overview of ClustersOverview of Clusters
end of book navigation links

11Securing a Cluster  



This chapter describes concerns for security administratorsof clustered systems. Clustered systems referto those systems using hardware and software that permit sharingof disks, resources, and a common operating system among variouscomputers. Clusters of VAX processors are said to be joined in anOpenVMS cluster environment; whereas clusters including both Alphaprocessors and VAX processors are said to be joined in an OpenVMSCluster environment. To properly secure your cluster, you shouldbe familiar with the information in the HP OpenVMS ClusterSystems Manual.

The HP OpenVMS Cluster Systems Manual describesthe tasks of the cluster manager. The cluster manager's job is thesame as that of any system manager, but the cluster manager hasto implement changes across many nodes. The security administratorfor a cluster generally requires the same training and skills asa cluster manager, and at some cluster sites, the same person servesin the role of security administrator as well as cluster manager.At other sites, there may be one or more security administratorsin addition to a cluster management team.

When a siteseparates the security administrator function from the cluster managementfunction, coordination, cooperation, and communication between thesefunctions becomes vital. As in previous chapters, this chapter usesthe title of security administrator to refer to individuals whohave the responsibility for system security, regardless of whatother responsibilities they hold.

skip links to sections within this chapter.
Overview of Clusters
Building a Common Environment
Synchronizing Authorization Data
Managing the Audit Log File
Protecting Objects
Storing Profiles and Auditing Information
Clusterwide Intrusion Detection
Using the System Management Utility
Managing Cluster Membership
Using DECnet Between Cluster Nodes
end of content navigation links


go to previous page: Handling a Security BreachHandling a Security Breach
go to next page: Overview of ClustersOverview of Clusters