BSM Security Auditing for Solaris Servers
ثبت نشده
چکیده
Although Solaris servers might be inside the firewall and relatively secure, there are still chances for a hacker to break in, or chances for an ordinary user to attempt malicious activities. Therefore, security efforts have to be made to detect intruders and to prevent unauthorized actions. One of the security utilities for Solaris servers is called BSM (Basic Security Module), which is an auditing tool for system security provided by SUN Microsystems. We can make use of it to increase security on our Solaris systems. This article discusses the pros and cons of BSM. It describes how to enable, configure, and manage the BSM auditing on Solaris servers to secure the system. Based on the author's experience, this article also gives a few solutions to overcome some problems and disadvantages of BSM. Solaris is a SUN Microsystems's OS product in the UNIX world. Solaris is heavily used and provides excellent networking solutions for both private and government sectors. BSM is a subsystem under the Solaris Operating Environment and it has been a feature of this Environment since Solaris version 2.5. The full name of the subsystem is SolarisOE SunSHIELD™ Basic Security Module. This auditing tool was added to Solaris to provide the features required by the Trusted Computer System Evaluation Criteria (TCSEC) to a security level referred to as C2. The TCSEC has been superseded by the newer and more internationally recognized Common Criteria security requirements. The Solaris 8 Operating Environment is certified at Evaluated Assurance Level 4 (EAL4) under the Controlled Access Protection Profile (CAPP) of the Common Criteria IT security evaluation. Basically, this means that the Solaris Operating Environment has been tested and verified to meet security standards set for operating systems that allow user discretionary access control.
منابع مشابه
eXpert-BSM: A Host-Based Intrusion Detection Solution for Sun Solaris
eXpert-BSM is a real time forward-reasoning expert system that analyzes Sun Solaris audit trails. Based on many years of intrusion detection research, eXpert-BSM’s knowledge base detects a wide range of specific and general forms of misuse, provides detailed reports and recommendations to the system operator, and has a low false-alarm rate. Host-based intrusion detection offers the ability to d...
متن کاملAudlib: a configurable, high-fidelity application audit mechanism
In this paper, we introduce Audlib, an extendable tool for generating security-relevant information on Unix systems. Audlib is a wrapper environment that generates application level audit information from existing executable programs. Audlib is not a detection system, instead it is designed to supplement existing audit systems and work transparently with them. Audlib records information that is...
متن کاملSecuring Solaris Servers Using Host-based Firewalls
This paper will cover the addition of security to several Solaris servers through the use of host-based firewall software. The servers reside on an unsecured university network. I will attempt to detail the choices that were made in the selection of the firewall software as well as its installation and configuration. I will conclude with a comparison of the vulnerability assessments from before...
متن کاملOracle Solaris and Oracle SPARC Servers— Integrated and Optimized for Mission Critical Computing
This document is intended for IT architects, system administrators, and developers that want to understand the details of how Oracle ® Solaris and SPARC ® servers can improve your application solution environment. This paper will provide technical information on how Oracle Solaris and the SPARC processor have been highly optimized for each other, improving throughput, security, and resiliency t...
متن کاملIntrusion Detection Applying Machine Learning to Solaris Audit Data
An Intrusion Detection System (IDS) seeks to identify unauthorized access to computer systems' resources and data. The most common analysis tool that these modern systems apply is the operating system audit trail that provides a ngerprint of system events over time. In this research, the Basic Security Module auditing tool of Sun's Solaris operating environment was used in both an anomoly and m...
متن کامل