The Peripheral Utility Program PUP utility functionality moved into SCF and no longer exists as a stand-alone product on G-series operating systems. This section applies to D-series operating systems only.
PUP manages disks and other peripheral devices such as terminals, printers, and magnetic tape units.
PUP supports the Subsystem Programmatic Interface (SPI) for event management only. Event management is provided by the Event Management Service (EMS).
PUP does not support the Subsystem Programmatic Interface (SPI) command/response interface. PUP cannot be controlled through programmatic commands. PUP event messages can only be retrieved and decoded.
RISK PUP is a powerful program. If disks and peripheral devices are configured incorrectly, both applications and system programs will be affected.
AP-PUP-ADVICE-01 PUP, or the SCF PUP subsystem commands, should only be used by knowledgeable system personnel.
This section lists only the PUP commands that pose security risks. Each of these commands can affect system performance and integrity and therefore can be issued only by a member of the SUPER Group .
ALLOWOPENS
INSERT
RENAME
ALTER
LABEL
REPLACEBOOT
CHECKSUM
REVIVE
CONSOLE
LOADMICROCODE
SETCACHE
DEMOUNT
PRIMARY
SPARE
DOWN
REBUILDDFS
STOPOPENS
EJECT UP
FORMAT
REMOVE
BP-FILE-PUP-01 PUP should be secured "UUNU".
BP-OPSYS-LICENSE-01 PUP must be LICENSED.
BP-OPSYS-OWNER-01 PUP should be owned by SUPER.SUPER.
BP-OPSYS-FILELOC-01 PUP must reside in $SYSTEM.SYSnn.
With a third party access control product:
3P-ACCESS-PUP-01 Use a third party access control product to allow the users responsible for performing commands the ability to run PUP as SUPER.SUPER.
3P-ACCESS-PUP-02 Use a third party access control product to give the use of certain PUP commands to a limited group of users only.
Without a third party access control product:
If available, use Safeguard software or a third party object security product to grant access to PUP object files to necessary personnel, and deny access to all other users.
BP-SAFE-PUP-01 Add a Safeguard Protection Record to grant appropriate access to the PUP object file.
Discovery Questions | Look here: | |
---|---|---|
OPSYS-DISCOVER-01 | What is the operating system level? | TACL logon |
OPSYS-OWNER-01 | Who owns the PUP object file? | Fileinfo |
OPSYS-LICENSE-01 | Is the PUP object file licensed? | Fileinfo |
FILE-POLICY | Who is allowed to execute PUP on the system? | Policy |
FILE-PUP-01 | Is the PUP object file correctly secured with the Guardian or Safeguard system? | Fileinfo Safecom |
Related Topics:
Operating System
SCF