Under Construction

Working with AIX

AIX Security

AIX Trusted Installation

Digital Signature Policies (chsignpolicy)

The Digital Signature Catalog (DSC)

Verifying the digital signature of a fileset

Digital signature for your own fileset

Optional: Generate a digital certificate for Trusted Installation

Adding certificate and public key to dsc_key and/or dsc_keystore

Generating the digital signature of a fileset and adding it to the DSC

Disadvantages of the DSC verification procedure

The Digital Signature Block

Verifying the digital signature of a fileset (DSB)

Digital signature for a self created file set (DSB)

AIX Security Expert (AIXPert)

Introduction to AIX Security Expert

Checking a System against any XML Security Profile

Applying a Security Level

Prereq Requirements are not met

Implementing a Rule fails

Checking the current Security Settings of a System

Resetting Security Settings (undo)

Applying the Default Security Level

How AIX Security Expert works

XML Files with Security Policies

Process when Applying a Security Level

Process when Checking a Security Level

Create your own Security Level (Profile)

Creating your own aixpert Script

Functions of an aixpert Script

Aixpert Script for PermitRootLogin (SSHD)

Step 1: Create a rudimentary Script

Step 2: Create a minimal XML File

Step 3: First Test Run of the Verification

Step 4: Messages and Error Messages

Step 5: Set PermitRootLogin to no

Step 6: Implementing Undo

Aixpert Script for SSHD Settings

Trusted Execution (TE)

Prerequisites for TE

Trusted Signature Database (TSD)

Listing TSD Entries

Audit of the Security Status of a System

Creating your own TSD

Adding TSD Entries

Files with frequently changing (volatile) Content

Files whose Content should be monitored

Creating a self-signed Certificate with “trustchk -k”

Creating a self-signed Certificate with OpenSSL

Adding non-volatile Files

Adding File Definitions

Updating a TSD Entry

Deleting TSD Entries

TE Policies

View TE Policies

Changing TE Policies

Enabling Trusted Execution (TE)