How secure is HP-UX WLM?
Only individuals with root access can activate a new configuration. Any user can run a syntax check of a configuration file. In addition, you can configure WLM to secure its communications using SSL. Also, the HP-UX 11i v2 (or later) Security Containment feature provides file and processes isolation. WLM’s integration with this feature allows you to create Secure Resource Partitions, which combine the isolation of Security Containment and the resource allocation controls of WLM. WLM’s network interfaces are designed to operate correctly to defend against attacks in a moderate to high threat environment, such as a demilitarized zone (DMZ). (A DMZ is a computer or small subnetwork located between a trusted internal network, such as a private corporate LAN, and an untrusted external network, such as the public internet.) You can use network protections such as firewalls to provide an additional level of defense.