The chapters in this part discuss the following topics:
Role of a security administrator (Chapter 6 “Managing the System and Its Data”)
Securing the system (Chapter 7 “Managing System Access”)
Securing data and resources (Chapter 8 “Controlling Access to System Data and Resources”)
Security auditing (Chapter 9 “Security Auditing”)
Responding to security breaches (Chapter 10 “System Security Breaches”)
Creating a secure cluster (Chapter 11 “Securing a Cluster”)
Considerations for networked systems (Chapter 12 “Security in a Network Environment”)
Setup and management of protected subsystems (Chapter 13 “Using Protected Subsystems”)
This part of the manual also includes information on the following topics:
User privileges and who may need them (Appendix A “Assigning Privileges”)
Default UIC-based protection of critical system files (Appendix B “Protection for OpenVMS System Files”)
Guidelines for operating in a C2 security environment (Appendix C “Running an OpenVMS System in a C2 Environment”)
Examples of security alarm messages (Appendix D “Alarm Messages”)
Table of Contents