6.2.3Audit record format (AU.3)

Section 5.6.3.2 describes information stored in each audit record.

6.2.4Audit post-processing (AU.4)

Section 5.15.2 describes audit subsystem utilities provided for post-processing of audit data.

6.3Discretionary Access Control

Sections 5.1 and 5.2 provide details on Discretionary Access Control (DAC) on the SLES system.

6.3.1General DAC policy (DA.1)

Sections 5.1 and 5.2.2 provides details on the functions that implement general Discretionary Access policy.

6.3.2Permission bits (DA.2)

Sections 4.1.2.1.2, 4.1.2.1.3, 5.1.2.1, 5.1.5.1, and 5.11.2.1 provide details on calls that perform DAC based on permission bits.

6.3.3ACLs (DA.3)

Sections 5.1.2.1, 5.1.5.2, and 5.1.5.2.1 provide details on DAC based on ACLs on file system objects.

6.3.4DAC: IPC objects (DA.4)

Section 5.3 provides details on DAC for IPC objects.

6.4Object reuse

Sections 5.1, 5.2, 5.3, and 5.5 provide details on object reuse handling by the SLES kernel.

6.4.1Object reuse: file system objects (OR.1)

Section 5.1.2.1 provides details on object reuse handling for data blocks for file system objects.

6.4.2Object reuse: IPC objects (OR.2)

Sections 5.3.3.2, 5.3.3.3, 5.3.3.4, and 5.3.3.5 provide details on object reuse handling for message queues, semaphores, and shared-memory segments.

6.4.3Object reuse: memory objects (OR.3)

Sections 5.5.2.1, 5.5.2.2, and 5.5.2.4 provide details on object reuse handling for memory objects.

6.5Security management

Section 5.13 provides details about various commands used to perform security management.

219

Page 231
Image 231
IBM 10 SP1 EAL4 manual Discretionary Access Control, Object reuse, Security management