Controlling Access to Operating System Software

The operating system controls a computer's operations; 'pre-loaded' with it are commands and utilities which set-up and maintain the computer's environment. All systems, from PCs to large servers, should be hardened to remove all unnecessary development tools and utilities prior to delivery to end users .

N.B. This topic primarily concerns access to systems running on mature operating systems such as UNIX®, VMS®, MVS®, OS/400® etc.

To view the related Policy click      

 

  • Staff with access to the '$' prompt or command line, could succeed in executing system commands, which could damage and corrupt your system and data files .

There are multiple Key Actions providing safeguards against this Information Security Issue. These are available in the registered version of RUSecure™.

 

Previous PageTop of this pageNext Page


Information Security Policies from US$595

 From
 US$595

Use of the guidance contained within RUSecure™ is subject to the End User Licence Agreement
This site created with EasyHTMLHelp(tm) for MS Word

 

Next PageUpPrevious Page