Trusted Solaris Installation and Configuration

Collecting Information

Each role needs to gather the information for the tasks particular to the role. Concrete examples are in Appendix B, Checklists for a Secure Trusted Solaris Environment.