Table of Contents
This overview provides an introduction to the features and benefits of the ClearPath MCP system architecture, ClearPath MCP operating system, and software products that ensure the security of the MCP environment, and ensure security between clients and ClearPath MCP servers in a networking environment.
The following security concepts and system security products are described in this overview:
-
The native MCP operating system, which provides a high security environment and blocks intrusions into the MCP environment.
-
The security concepts that are applied in the MCP environment:
-
Access Control: Enforcing security policies to ensure that users are authorized to access system resources and data.
-
Authentication: Confirming the user and computer program identities.
-
Cryptography: Ensuring that messages and data can be read by authorized senders and receivers only.
-
Network: Ensuring that all data in transit is secured and only correct users and traffic can use the network resources.
-
Audit and Assessment: Recording all attempted acts of intrusion and providing tools to examine and analyze the captured security violation attempts.
-
-
References to product support and product information that enable you to implement and manage a secure networking and data processing environment.
This document replaces the following documents that were previously included in the MCP library:
-
ClearPath Enterprise Servers MCP Security Overview (3834 7639)
-
ClearPath Enterprise Servers Security Administration Guide (8600 0973)

