[mod.newprod] The Lachman Security Audit - A product from Lachman Associates, Inc.

usenet@mcdchg.UUCP (02/20/87)

Announcing: The Lachman Security Audit - a product from Lachman Associates.

The Security Audit from LAI provides a cost effective approach to achieving
a secure and protected UNIX system. The Audit detects security violations,
specifies actions to correct them, and suggests procedures to reduce the
threat of future security problems. The product is compatible with most
versions of the UNIX operating system, including System V and 4.2/4.3BSD.

Discovering security problems early can prevent the accidental
or deliberate loss of critical data, an eliminate the need for costly
recovery strategies. Developed by LAI, one of the world's leading UNIX system
software and consulting companies, the Security Audit represents the
distillation of over 10 years of experience with system security and
administration.

The product detects security violations and security risks in
the following categories:

     * Logins susceptible to break-ins by intruders

     * Files with insufficient protection

     * Trojan horses and back doors

     * Unauthorized superuser priveleges

     * Illegal access through network software

     * Bugs allowing a breach of security

The product includes source code and up to 2 days of on-site consulting to
install, configure, and run the Audit for the first time, as well as addressing
other security related concerns. Some of the outstanding features of the Audit
include:

    * Password guessing - attempting to find easily guessable passwords using
      permutations of login name and other personal information.

    * Finding dangerous PATHs - similar to the DoD "trusted path" idea, this
      will look at user environments to make sure that the PATH is not
      susceptible to trojan horses.

    * System file checks - making sure that permissions, owner, group, and
      even contents of critical system and device files remain intact.

    * User file checks - making sure that users have protected files properly
      and that no copies of unauthorized files (e.g., games) have been made.

    * Setuid/setgid file control - making sure that there are no unauthorized
      or writable setuid/setgid files around the system.

    * Unauthorized superuser detection - finding those who are attempting to
      gain superuser privileges through the "su" command or zero user id.

    * Uucp security detection - discovering bad uucp configuration allowing
      remote system access to unauthorized local directories.

    * Common bug detection - finding bugs in system utilities that could
      allow a breach of security.

    * And many more checks for security holes and violations.

The approach taken by the Lachman Security Audit was recently published
in the last Uniforum Conference Proceedings (January, 1987 - An Automated
Approach to UNIX System Security) and will soon be published in /usr/group's
Communixations.

For further technical and/or pricing information, please contact:

Carol Bair
Lachman Associates, Inc.
1901 N. Naper Blvd.
Naperville, Illinois 60540
Outside of Illinois: 1-800-LAI-UNIX
Within Illinois: (312) 505-9100