Start by outlining who is responsible for what. Identify various good
and bad practices in their general forms (e.g. password quality).
Avoid impossible requirements that only guarantee audit failure.
Lean toward automatic complicance rather than continual pursuit and
correction: with no rlogind/remshd you won't care how many stupid
+ signs the users put in their ~/.rhosts .
--
decoy mail addresses: obtain username via 0x4f/tcp or 0x50/tcp
I found rfc 2196 to be very usefullQuote:>Does any one has a list of what policies/procedures manual should
>contain for information(data) security on Unix System?
Good luck.
Regards,
Casper
--
http://www.dsinet.org/ - Dutch Security Information Network
"Don't quote, I want to know what you have to say." -Anonymous
You might want to have a look at an excellent book on UNIX security and the
procedures and policies around it, O'Reilly's Practical Unix & Internet
Security. If you do stuff with UNIX and do stuff with security this book is
a must read, in my trying-to-be humble opinion.
Info at http://www.oreilly.com/catalog/puis3/ or, if you choose to be
convinced already and make no further judgement order it directly at
http://www.amazon.com/exec/obidos/ASIN/0596003234/qid=1046909987/sr=2...
Good luck.
Regards,
Casper
--
"Don't quote, I want to know what you have to say." -Anonymous
1. Security Policies and Procedures Vendors ?
Hi Unix security "Gurus"
We are in the process of writing policies and procedures for our computer
system security, that includes: Security policies and procedures, user account
policies and procedures, etc,.....
Does anyone have such experiences or their companies that help do this ?
Please advise.
Please e-mail to me at:
or call:
(602) 694 6426
Thank you
3. Corporate Security Policies and Procedures
5. SEcurity & Policy Editor [Win95]
7. ++!!!- Security Specialist -Policy & Planning - TORONTO !!++
8. getting chat to work with pppd
9. +++!!!- Security Specialist -Policy & Planning - TORONTO !!+++
10. Standard Operating Procedures/Policies
11. Procedures/Policies For Large Unix Sites
12. wanted: policies and procedures for quasi-central administration
13. Request for Policies and Procedures Documents