Abstract
SPI/U3.2 consists of five tools used to assess and report the security posture of computers running the UNIX operating system. The tools are: Access Control Test: A rule-based system which identifies sequential dependencies in UNIX access controls. Binary Authentication Tool: Evaluates the release status of system binaries by comparing a crypto-checksum to provide table entries. Change Detection Tool: Maintains and applies a snapshot of critical system files and attributes for purposes of change detection. Configuration Query Language: Accepts CQL-based scripts (provided) to evaluate queries over the status of system files, configuration of services and many other elements of UNIX system security. Password Security Inspector: Tests for weak or aged passwords. The tools are packaged with a forms-based user interface providing on-line context-sensitive help, job scheduling, parameter management and output report management utilities. Tools may be run independent of the UI.
- Developers:
- Release Date:
- 1995-04-01
- Project Type:
- Closed Source
- Software Type:
- Scientific
- Sponsoring Org.:
-
DOE/SA; DODPrimary Award/Contract Number:W-7405-ENG-48
- Code ID:
- 12412
- Site Accession Number:
- 2385
- Research Org.:
- Lawrence Livermore National Laboratory (LLNL), Livermore, CA (United States)
- Country of Origin:
- United States
Citation Formats
Bartoletti, Tony.
Security Profile Inspector for UNIX Systems.
Computer Software.
DOE/SA; DOD.
01 Apr. 1995.
Web.
doi:10.11578/dc.20180622.2.
Bartoletti, Tony.
(1995, April 01).
Security Profile Inspector for UNIX Systems.
[Computer software].
https://doi.org/10.11578/dc.20180622.2.
Bartoletti, Tony.
"Security Profile Inspector for UNIX Systems." Computer software.
April 01, 1995.
https://doi.org/10.11578/dc.20180622.2.
@misc{
doecode_12412,
title = {Security Profile Inspector for UNIX Systems},
author = {Bartoletti, Tony},
abstractNote = {SPI/U3.2 consists of five tools used to assess and report the security posture of computers running the UNIX operating system. The tools are: Access Control Test: A rule-based system which identifies sequential dependencies in UNIX access controls. Binary Authentication Tool: Evaluates the release status of system binaries by comparing a crypto-checksum to provide table entries. Change Detection Tool: Maintains and applies a snapshot of critical system files and attributes for purposes of change detection. Configuration Query Language: Accepts CQL-based scripts (provided) to evaluate queries over the status of system files, configuration of services and many other elements of UNIX system security. Password Security Inspector: Tests for weak or aged passwords. The tools are packaged with a forms-based user interface providing on-line context-sensitive help, job scheduling, parameter management and output report management utilities. Tools may be run independent of the UI.},
doi = {10.11578/dc.20180622.2},
url = {https://doi.org/10.11578/dc.20180622.2},
howpublished = {[Computer Software] \url{https://doi.org/10.11578/dc.20180622.2}},
year = {1995},
month = {apr}
}