Expand TOC
HP OpenVMS Guide to System Security
Legal Notice
Preface
Security Overview
Security for the User
Security for the System Administrator
Managing the System and Its Data
Managing System Access
Controlling Access to System Data and Resources
Security Auditing
System Security Breaches
Securing a Cluster
Security in a Network Environment
Using Protected Subsystems
Advantages of Protected Subsystems
Applications for Protected Subsystems
How Protected Subsystems Work
Design Considerations
System Management Requirements
Building the Subsystem
Enabling Protected Subsystems on a Trusted Volume
Giving Users Access
Example of a Protected Subsystem
Assigning Privileges
Protection for OpenVMS System Files
Running an OpenVMS System in a C2 Environment
Alarm Messages
Glossary
Index