PUP System Utility


The Peripheral Utility Program PUP utility functionality moved into SCF and no longer exists as a stand-alone product on G-series operating systems. This section applies to D-series operating systems only.

PUP manages disks and other peripheral devices such as terminals, printers, and magnetic tape units.

PUP supports the Subsystem Programmatic Interface (SPI) for event management only. Event management is provided by the Event Management Service (EMS).

PUP does not support the Subsystem Programmatic Interface (SPI) command/response interface. PUP cannot be controlled through programmatic commands. PUP event messages can only be retrieved and decoded.

RISK PUP is a powerful program. If disks and peripheral devices are configured incorrectly, both applications and system programs will be affected.

AP-PUP-ADVICE-01 PUP, or the SCF PUP subsystem commands, should only be used by knowledgeable system personnel.

Securing PUP

PUP Commands With Security Implications

This section lists only the PUP commands that pose security risks. Each of these commands can affect system performance and integrity and therefore can be issued only by a member of the SUPER Group .

ALLOWOPENS

INSERT

RENAME

ALTER

LABEL

REPLACEBOOT

CHECKSUM

REVIVE

CONSOLE

LOADMICROCODE

SETCACHE

DEMOUNT

PRIMARY

SPARE

DOWN

REBUILDDFS

STOPOPENS

EJECT UP

FORMAT

REMOVE

BP-FILE-PUP-01 PUP should be secured "UUNU".

BP-OPSYS-LICENSE-01 PUP must be LICENSED.

BP-OPSYS-OWNER-01 PUP should be owned by SUPER.SUPER.

BP-OPSYS-FILELOC-01 PUP must reside in $SYSTEM.SYSnn.

With a third party access control product:

3P-ACCESS-PUP-01 Use a third party access control product to allow the users responsible for performing commands the ability to run PUP as SUPER.SUPER.

3P-ACCESS-PUP-02 Use a third party access control product to give the use of certain PUP commands to a limited group of users only.

Without a third party access control product:

If available, use Safeguard software or a third party object security product to grant access to PUP object files to necessary personnel, and deny access to all other users.

BP-SAFE-PUP-01 Add a Safeguard Protection Record to grant appropriate access to the PUP object file.

Discovery Questions

Look here:

OPSYS-DISCOVER-01

What is the operating system level?

TACL logon

OPSYS-OWNER-01

Who owns the PUP object file?

Fileinfo

OPSYS-LICENSE-01

Is the PUP object file licensed?

Fileinfo

FILE-POLICY

Who is allowed to execute PUP on the system?

Policy

FILE-PUP-01
SAFE-PUP-01

Is the PUP object file correctly secured with the Guardian or Safeguard system?

Fileinfo Safecom

Related Topics:

Operating System

SCF




HP NonStop Server Security 2004
HP NonStop Server Security 2004
ISBN: 159059035X
EAN: N/A
Year: 2004
Pages: 157

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net