Intruders and rogue employees alike are able to invisibly exploit weaknesses from the inside out. This online eCourse allows you to browse various AIX security topics to learn how to mitigate common threats to your AIX environment.
By Core Security
Editor's note: This article introduces the AIX Security Basics eCourse, which is On-Demand and available to download and view from the MC White Paper Center.
With thousands of configuration settings and permissions to manage inside of AIX systems, it can seem overwhelming to ensure these systems maintain proper compliance. From users, password services, file, and directory permissions to how file systems are mounted and configured, there are countless elements to be on the lookout for. As you expand this into many different systems and start adding in Linux machines, which have the same compliance rules, and then add in your Windows machines with the same compliance rules, you quickly understand the tremendous scope you are managing, even in a small configuration with a few dozen systems.