General Security Considerations

For a system to continue to meet high-security requirements, you should not change the configuration of the system without ensuring that the changes are in accordance with your security policy. You should take the following additional measures when running a high-security environment:

  • Tape security policy should follow the recommendations given in “Tape Security Policy” in Controlling File Access.

  • Regular security-related auditing of system activities should be carried out. For suggestions, see Defining Auditing Policy.