Planning your security implementation


Use the following guidelines to determine the best way to use the security features of your ESM:

  • Auditing functions

    Your ESM might offer auditing functions that you can turn on to track resource use. If security is a high priority, you can route messages that record violation attempts to a line terminal or console for immediate notification. For information about the various security features that your ESM offers, see your ESM documentation.

  • Generics and global security definitions

    If your ESM supports generics and your site security scheme allows it, you can use generics in naming product resources to create global security definitions. You can define a set of resources that are available either to a select group or to all users.

    Example

    • Your system administrators might require access to all functions in all areas, but your operators can probably perform their jobs with access to fewer areas.

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*