Multi-level security

The main goal of a secure system is to enforce a site security policy to provide accountability and availability.

The Trusted AIX® security policy provides a defined set of rules that determine the types of allowable system access. This includes holding users accountable for their actions and preventing changes to the operating system.

Trusted AIX uses access control and specific need-to-know criteria to control access to files, directories, processes, and devices.

Trusted AIX maintains an audit trail of all security-relevant events. This audit trail allows for individual accountability, even with programs which modify effective and real user IDs, such as the su command. Trusted AIX also restricts administrative functions to specific individuals with authorizations and least privilege (the granting of the most restrictive set of privileges that will permit a user or process to perform an operation).