World Library  


Add to Book Shelf
Flag as Inappropriate
Email this Book

Enterprise System Management Security Technical Implementation Guide

Click here to view

Book Id: WPLBN0000696215
Format Type: PDF eBook
File Size: 1.31 MB.
Reproduction Date: 2005
Full Text

Title: Enterprise System Management Security Technical Implementation Guide  
Author:
Volume:
Language: English
Subject: Technology., Reference materials, Technology and literature
Collections: Techonology eBook Collection
Historic
Publication Date:
Publisher:

Citation

APA MLA Chicago

Enterprise System Management Security Technical Implementation Guide. (n.d.). Enterprise System Management Security Technical Implementation Guide. Retrieved from http://worldebooklibrary.com/


Description
Technical Reference Publication

Excerpt
Introduction: This Enterprise System Management (ESM) Security Technical Implementation Guide (STIG) provides security configuration guidance for software products designed to deliver enterprise class system management functions. While the boundaries of the ESM discipline are such that there is no authoritative definition of an ESM product, Section 2, Enterprise System Management Overview, provides a generic description of the elements characteristic of most ESM products. Section 3, Enterprise System Management Security, provides general guidance for ESM products; specific commercial products are addressed in appendices...

Table of Contents
TABLE OF CONTENTS Page 1. INTRODUCTION ..................................................................................................................... 1 1.1 Background......................................................................................................................... 1 1.2 Authority .............................................................................................................................. 2 1.3 Scope................................................................................................................................... 2 1.4 Writing Conventions............................................................................................................ 2 1.5 Vulnerability Severity Code Definitions ............................................................................. 3 1.6 Information Assurance Vulnerability Management (IAVM) .............................................. 3 1.7 STIG Distribution ................................................................................................................ 3 1.8 Document Revisions ............................................................................................................ 4 2. ENTERPRISE SYSTEM MANAGEMENT OVERVIEW....................................................... 5 2.1 General Overview ................................................................................................................ 5 2.1.1 ESM Functional Areas.................................................................................................. 6 2.1.2 ESM Implementation Elements .................................................................................... 8 3. ENTERPRISE SYSTEM MANAGEMENT SECURITY....................................................... 13 3.1 Introduction....................................................................................................................... 13 3.2 Security Design and Configuration.................................................................................... 14 3.2.1 Application Design Characteristics............................................................................. 14 3.2.2 Application Implementation and Configuration ......................................................... 16 3.2.3 Network Access .......................................................................................................... 20 3.3 Identification and Authentication ...................................................................................... 21 3.3.1 Individual Identification.............................................................................................. 22 3.3.2 Authenticator Strength and Protection........................................................................ 23 3.3.3 Key Management ........................................................................................................ 25 3.4 Enclave and Computing Environment ............................................................................... 26 3.4.1 Data Protection............................................................................................................ 26 3.4.2 User Account Management......................................................................................... 27 3.4.3 Application Customization ......................................................................................... 28 3.4.4 Auditing ...................................................................................................................... 29 3.4.5 Network Access .......................................................................................................... 31 3.5 Enclave Boundary Defense................................................................................................ 34 3.6 Physical and Environmental .............................................................................................. 35 3.7 Continuity .......................................................................................................................... 35 3.8 Vulnerability and Incident Management ........................................................................... 37 APPENDIX A. RELATED PUBLICATIONS............................................................................ 39 APPENDIX B. TIVOLI............................................................................................................... 45 B.1. Tivoli ............................................................................................................................... 45 B.1.1 Introduction ................................................................................................................ 45 B.1.2 Tivoli Enterprise Architecture.................................................................................... 45 B.1.3 Tivoli Management Region (TMR) ........................................................................... 45 B.1.4 Tivoli Servers ............................................................................................................. 46

 

Click To View

Additional Books


  • Evaluated Kinetic and Photochemical Data... (by )
  • Toward Next-Generation Construction Mach... (by )
  • Reporting 
  • Secure Cyberspace 
  • Thermodynamic Properties of Dioxygen Dif... (by )
  • Thermodynamic Functions and Properties o... (by )
  • Cross Sections and Related Data for Elec... (by )
  • Cross Sections and Swarm Coefficients fo... (by )
  • Administrative Modifications 
  • Indefinite Delivery Indefinite Quantity ... 
  • Credit Card Purchases 
  • Awards 
Scroll Left
Scroll Right

 



Copyright © World Library Foundation. All rights reserved. eBooks from World eBook Library are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.