--- Klaus Weidner <klaus(a)atsec.com> wrote:
> Even on a cluster?
Hmmm, this is getting a bit off-topic. If it's a
sufficiently secure
network (such as a cluster where the network is not
exposed to
potentially hostile users) I guess it would be okay,
especially if it's
mainly used for automated administrative tasks and
not directly by users.
In a cluster you need to associate the actions
on node N with those on node M where they are
working together. There needs to be sufficient
information in the audit trail to note that a
particular action here is a part of the work being
done there. Good fun.
=====
Casey Schaufler
casey(a)schaufler-ca.com
__________________________________
Do you Yahoo!?
Yahoo! Mail - 250MB free storage. Do more. Manage less.
http://info.mail.yahoo.com/mail_250