Security Profile Inspector for UNIX Systems

RESOURCE

Abstract

SPI/U3.2 consists of five tools used to assess and report the security posture of computers running the UNIX operating system. The tools are: Access Control Test: A rule-based system which identifies sequential dependencies in UNIX access controls. Binary Authentication Tool: Evaluates the release status of system binaries by comparing a crypto-checksum to provide table entries. Change Detection Tool: Maintains and applies a snapshot of critical system files and attributes for purposes of change detection. Configuration Query Language: Accepts CQL-based scripts (provided) to evaluate queries over the status of system files, configuration of services and many other elements of UNIX system security. Password Security Inspector: Tests for weak or aged passwords. The tools are packaged with a forms-based user interface providing on-line context-sensitive help, job scheduling, parameter management and output report management utilities. Tools may be run independent of the UI.
Developers:
Release Date:
1995-04-01
Project Type:
Closed Source
Software Type:
Scientific
Sponsoring Org.:
Code ID:
12412
Site Accession Number:
2385
Research Org.:
Lawrence Livermore National Laboratory (LLNL), Livermore, CA (United States)
Country of Origin:
United States

RESOURCE

Citation Formats

Bartoletti, Tony. Security Profile Inspector for UNIX Systems. Computer Software. DOE/SA; DOD. 01 Apr. 1995. Web. doi:10.11578/dc.20180622.2.
Bartoletti, Tony. (1995, April 01). Security Profile Inspector for UNIX Systems. [Computer software]. https://doi.org/10.11578/dc.20180622.2.
Bartoletti, Tony. "Security Profile Inspector for UNIX Systems." Computer software. April 01, 1995. https://doi.org/10.11578/dc.20180622.2.
@misc{ doecode_12412,
title = {Security Profile Inspector for UNIX Systems},
author = {Bartoletti, Tony},
abstractNote = {SPI/U3.2 consists of five tools used to assess and report the security posture of computers running the UNIX operating system. The tools are: Access Control Test: A rule-based system which identifies sequential dependencies in UNIX access controls. Binary Authentication Tool: Evaluates the release status of system binaries by comparing a crypto-checksum to provide table entries. Change Detection Tool: Maintains and applies a snapshot of critical system files and attributes for purposes of change detection. Configuration Query Language: Accepts CQL-based scripts (provided) to evaluate queries over the status of system files, configuration of services and many other elements of UNIX system security. Password Security Inspector: Tests for weak or aged passwords. The tools are packaged with a forms-based user interface providing on-line context-sensitive help, job scheduling, parameter management and output report management utilities. Tools may be run independent of the UI.},
doi = {10.11578/dc.20180622.2},
url = {https://doi.org/10.11578/dc.20180622.2},
howpublished = {[Computer Software] \url{https://doi.org/10.11578/dc.20180622.2}},
year = {1995},
month = {apr}
}