Digital PDFs
Documents
Guest
Register
Log In
XX-74CA8-E7
2000
4 pages
Original
0.8MB
view
download
OCR Version
0.6MB
view
download
Document:
DEC-VMS-SecurityReviewService
Order Number:
XX-74CA8-E7
Revision:
0
Pages:
4
Original Filename:
OCR Text
VMS Security Review Service Assessing Your System Security Many organizations have invested heavily in computer systems in the last decade; for most, these systems have become an essential resource — storing and processing volumes of corporate data. Financial data; product and sales data; personnel information; design, engineering, and manufacturing data. The security of this data, and of the systems storing it, is integral to the functioning of your organization. But how well are these systems and data protected? Does your organization have a computer security program? If so, is it appropriate to your busi- ness needs? If not, have you asked your MIS team to assess your current system secutity procedures and make recommendations for improvement? If you’re considering such an effort, you should look into Digital’s VMS Security Review Service, which can help your MIS team evaluate your VAX/VMS security environment. This service provides a professional, third-party evaluation of system security procedures and offers recommendations for correcting any weaknesses Features and Benefits Digital’s VMS Security Review Service offers: An on-site or remote study of your current security procedures and controls by a trained Security Consultant from Digital’s Security Expertise Center. Extensive on-line examination of your implementation of Digital’s VAX/VMS secu- rity features, using tools developed by Digital for this purpose. A report containing specific recommendations for improving system securi Greater peace of mind for your system security manager, who knows that security controls being implemented have been recommerided by a trained Security Consultant from Digital. Computer Security: The Neglected In many organizations, this process will Dimension show that in some areas security is wholly In many organizations, computer adequate, while in others it is deficient. security is often neglected due to more Identifying the deficiencies is the crit immediate day-to-day problems. Con- cal step in creating a balanced security cerns about computer security are rele- policy. And this is where Digital's VMS gated to the wish list. Security Review Service can help. But creating a formal security policy The Security Review Service will evalu- should be a high priority. The organization’s data, systems, and software are ate your current procedures, identifying deficiencies and risks in system security invaluable; its day-to-day operations and in the work environment; and it would be at risk if any of these resources will recommend corrective actions for were tampered with. The time for your improving security. MIS group to design a computer security program is now. And Digital’s Security Review Service can strengthen their effort. The security policy thus created by your MIS team will be designed specif- ically for your business requirements and your VAX computer systems. The For your MIS team, the first step will be policy will be able to utilize the range to assess just how much protection is and flexibility of the security controls needed for your systems and data. Then, in VMS. These controls provide a con- current security controls and procedures sistent security mechanism across all should be evaluated to determine their VAX and MicroVAX systems — from appropriateness. Finally, recommenda- individual workstations to the largest tions for new procedures should be multiprocessor configurations. made and then implemented. What Aspects of Security Are Analyzed? The Digital Security Consultant will organization. This will include an assess- Systems ment of security awareness among your The VMS Security Review Service is one analyze a variety of factors that can personnel and taking note of work prac- more demonstration of Digital’s commit- affect your system security. Is the role of tices that may either enhance or weaken ment to providing secure products. the system manager or system security security. into account the unique culture of your manager clearly defined? As defined, does this role provide the authority How Does the VMS Security Review needed to maintain system security at Service Work? A Digital Security Consultant will appropriate levels? Is your VMS operating system properly installed? Has each application package been installed in a way that avoids changes in VMS system file protection? contact your system management group. Together, they’ll decide whether an on-site or remote (dialup) security review would be more appropriate. Subsequently, the Consultant will install Is the login procedure adequate for several software tools on your VAX/VMS the level of security needed? Are user system(s); these tools are security moni- accounts designed with appropriate safe- toring and assessment programs devel- guards? Are system privileges extended oped by Digital to measure security on only to users needing them? our own internal VAX/VMS systems. Is disk space allocated with care? What is the system’s proxy access procedure? Are you using the VMS auditing facilities correctly? Are you auditing so often that you’re missing a real problem? After answering these questions and more, the consultant looks beyond sys- The Consultant will then proceed to assess your security procedures, including; Password implementation Disk space quota implementation File protection System audit procedure use tem security controls, and reviews your Proxy access procedure site’s policy regarding such matters as idle terminals, hardcopy terminal use, System audit use and data disposal. The security of any information-processing operation requires that both environmental security measures and operating system safeguards be implemented. VMS provides the basic mechanisms for controlling access to the system and its data; it provides tools to ensure that system access is restricted to authorized users. Environmental security measures that complement VMS controls will promote a safe, secure operation. In assessing the larger security environment, Digital’s Security Consultant will take User account implementation and use Application software installation and use DECnet installation and use Following this analysis, the Consultant will issue a report assessing current security on your system(s) and will recommend any changes that could improve your system security. Digital’s Commitment to Secure Digital is offering the VMS Security Review Service in order to let users determine if they are using all of VMS’ security features to maximum advantage. The recent publicity surrounding violations and lapses in computer security has made many companies uneasy. Digital’s response to this threat is to recommend that you have your system security evaluated professionally by a Digital Security Consultant. If the Consultant recommends more security controls, follow these recommendations. The Security Review Service helps you ‘meet your security needs with the appropriate security policy, implementation, and practice. jghts Reserved E H £ S H £ Digital believes the information in this publication to be accurate; such information is subject to change without notice. The following are trademarks of Digital Equip‘ment Corporation: the Digital logo, DECnet, MicroVAX, VAX, VMS. Printed in US.A. ED 32945 76/89 12 27 10.0 BUO Copyright 1989 Digi &
Home
Privacy and Data
Site structure and layout ©2025 Majenko Technologies