Integrity Monitoring and Server Hardening through AIX 6.1 Trusted Execution 

Tue August 31, 2021 10:02 PM

AIX 6.1 introduced multiple security features to help customers enhance the security of their environment. One of the key features is called Trusted Execution (TE). This feature not only allows customer to monitor the system for integrity violations, but also provides for locking down the system in regards to execution of programs and loading of libraries
and kernel extensions.

While this document was created for AIX 6.1, the information is still very useful for AIX clients on 7.1 and 7.2

    This document explains the policies of Trusted Execution and provides outlines in regards to way administrator can use to protect their system environment.

    Some of the concepts explained in detail in this document include:

    1. Trusted Signature Database (TSD), which stores the baseline integrity data
    2. Volatile files and Trusted Signature Database
    3. Monitor for non approved kernel extension loads
    4. Lock down the production system
    5. Trusted Execution Paths and Trusted Library Paths
    6. Finding Trojan Horses
    7. Relationship between tcbck and trustchk
    8. Integration with Role Based Access Control /Trusted AIX.
    9. Create and ship security attributes in a package


    0 Favorited
    1 Files
    pdf file
    au-trustedexecution.pdf   144 KB   1 version
    Uploaded - Tue August 31, 2021