Controlling Access to Operating System Software

The operating system controls a computer's operations; 'pre-loaded' with it are commands and utilities which set-up and maintain the computer's environment. All systems, from PCs to large servers, should be hardened to remove all unnecessary development tools and utilities prior to delivery to end users .

N.B. This topic primarily concerns access to systems running on mature operating systems such as UNIX®, VMS®, MVS®, OS/400® etc.

To view the related Policy click      


  • Staff with access to the '$' prompt or command line, could succeed in executing system commands, which could damage and corrupt your system and data files .

There are multiple Key Actions providing safeguards against this Information Security Issue. These are available in the registered version of RUSecure™.


Previous PageTop of this pageNext Page

Information Security Policies from US$595


Use of the guidance contained within RUSecure™ is subject to the End User Licence Agreement
This site created with EasyHTMLHelp(tm) for MS Word


Next PageUpPrevious Page