82 lines
6.7 KiB
HTML
82 lines
6.7 KiB
HTML
<?xml version="1.0" encoding="UTF-8"?>
|
|
<!DOCTYPE html
|
|
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
|
|
<html lang="en-us" xml:lang="en-us">
|
|
<head>
|
|
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
|
|
<meta name="security" content="public" />
|
|
<meta name="Robots" content="index,follow" />
|
|
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
|
|
<meta name="DC.Type" content="concept" />
|
|
<meta name="DC.Title" content="Prevent and detect security exposures" />
|
|
<meta name="abstract" content="The following information is a collection of tips to help you detect potential security exposures." />
|
|
<meta name="description" content="The following information is a collection of tips to help you detect potential security exposures." />
|
|
<meta name="DC.Relation" scheme="URI" content="rzamvmonitorsec.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzamvcheckalteredobj.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzamvevaluateregexitprog.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzamvcheckschedpgm.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzamvcheckuserobj.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzamvlimituseadoptedauth.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzamvmonitorabnormaldelete.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzamvmonitorabnormaluse.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzamvmonitoraccess.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzamvmonitornewobjinstall.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzamvmonitortriggerprog.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzamvpreventadoptedauthuse.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzamvdigitalsign.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzamvarchitectmodify.htm" />
|
|
<meta name="copyright" content="(C) Copyright IBM Corporation 2006" />
|
|
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 2006" />
|
|
<meta name="DC.Format" content="XHTML" />
|
|
<meta name="DC.Identifier" content="developintrusiondetectstrat" />
|
|
<meta name="DC.Language" content="en-us" />
|
|
<!-- All rights reserved. Licensed Materials Property of IBM -->
|
|
<!-- US Government Users Restricted Rights -->
|
|
<!-- Use, duplication or disclosure restricted by -->
|
|
<!-- GSA ADP Schedule Contract with IBM Corp. -->
|
|
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
|
|
<link rel="stylesheet" type="text/css" href="./ic.css" />
|
|
<title>Prevent and detect security exposures</title>
|
|
</head>
|
|
<body id="developintrusiondetectstrat"><a name="developintrusiondetectstrat"><!-- --></a>
|
|
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
|
|
<h1 class="topictitle1">Prevent and detect security exposures</h1>
|
|
<div><p>The following information is a collection of tips to help you detect
|
|
potential security exposures.</p>
|
|
</div>
|
|
<div>
|
|
<ul class="ullinks">
|
|
<li class="ulchildlink"><strong><a href="rzamvcheckalteredobj.htm">Check for altered objects</a></strong><br />
|
|
This article describes how to use the Check Object Integrity (CHKOBJITG) command to look for objects that have been altered.</li>
|
|
<li class="ulchildlink"><strong><a href="rzamvevaluateregexitprog.htm">Evaluate registered exit programs</a></strong><br />
|
|
You can use the system registration function to register exit programs that should be run when certain events occur. To list the registration information on your system, type WRKREGINF OUTPUT(*PRINT).</li>
|
|
<li class="ulchildlink"><strong><a href="rzamvcheckschedpgm.htm">Check scheduled programs</a></strong><br />
|
|
Ensure that all scheduled programs are legitimate.</li>
|
|
<li class="ulchildlink"><strong><a href="rzamvcheckuserobj.htm">Check for user objects in protected libraries</a></strong><br />
|
|
Use object authority to control who can add programs to protected libraries. User objects other than programs can represent a security exposure when they are in system libraries.</li>
|
|
<li class="ulchildlink"><strong><a href="rzamvlimituseadoptedauth.htm">Limit the use of adopted authority</a></strong><br />
|
|
When a program runs, the program can use adopted authority to gain access to objects in two different ways:</li>
|
|
<li class="ulchildlink"><strong><a href="rzamvmonitorabnormaldelete.htm">Monitor abnormal deletions</a></strong><br />
|
|
The Print Private Authorities (PRTPVTAUT) command allows you to print a report of all the private authorities for objects of a specified type in a specified library, folder, or directory.</li>
|
|
<li class="ulchildlink"><strong><a href="rzamvmonitorabnormaluse.htm">Monitor abnormal system use</a></strong><br />
|
|
This article describes the task, monitor abnormal system use, explains why it is important, and provides step-by-step instructions.</li>
|
|
<li class="ulchildlink"><strong><a href="rzamvmonitoraccess.htm">Monitor blatant access attempts</a></strong><br />
|
|
Monitor access to output and job queues</li>
|
|
<li class="ulchildlink"><strong><a href="rzamvmonitornewobjinstall.htm">Monitor for new objects installed on the system</a></strong><br />
|
|
Prevent or restrict users' from installing their own programs</li>
|
|
<li class="ulchildlink"><strong><a href="rzamvmonitortriggerprog.htm">Monitor for use of trigger programs</a></strong><br />
|
|
This article describes the task, monitor for use of trigger programs, explains why it is important, and provides step-by-step instructions.</li>
|
|
<li class="ulchildlink"><strong><a href="rzamvpreventadoptedauthuse.htm">Prevent new programs from using adopted authority</a></strong><br />
|
|
The passing of adopted authority to programs located later in the stack provides an opportunity for a knowledgeable programmer to create a Trojan horse program.</li>
|
|
<li class="ulchildlink"><strong><a href="rzamvdigitalsign.htm">Use digital signatures to protect software integrity</a></strong><br />
|
|
Using digital signatures gives you greater control over which software can be loaded onto your system, and allows you more power to detect changes once it has been loaded.</li>
|
|
<li class="ulchildlink"><strong><a href="rzamvarchitectmodify.htm">Modify architected transaction program names</a></strong><br />
|
|
Learn the techniques used to prevent architected transaction program names from running on the system.</li>
|
|
</ul>
|
|
|
|
<div class="familylinks">
|
|
<div class="parentlink"><strong>Parent topic:</strong> <a href="rzamvmonitorsec.htm" title="This set of topics discuss various techniques for monitoring and auditing security on your system.">Monitor security</a></div>
|
|
</div>
|
|
</div>
|
|
</body>
|
|
</html> |