Trusted Solaris Installation and Configuration

Understanding Your Site's Security Policy

Through its configurability, the Trusted Solaris environment effectively enables you to integrate your site's security policy with the operating environment. Thus, you need to have a good feel for the scope of your policy and the ability of Trusted Solaris software to accommodate it. A good configuration should provide a balance between consistency with your site security policy and convenience for those working in the environment.

The Trusted Solaris operating environment is configured by default to conform with the ITSEC evaluation certificate FB1 (and FC2 which is less stringent). To meet these evaluated levels, you must:

Note that your configuration may no longer conform with the ITSEC security levels if you do any of the following: