The phrase security policy, or policy, is used throughout this book to refer to an organization's security guidelines. Your site's security policy is the set of rules that define the sensitivity of the information that is being processed and the measures that are used to protect the information from unauthorized access. Security technologies such as Solaris Secure Shell, authentication, RBAC, authorization, privileges, and resource control provide measures to protect information.
Some security technologies also use the word policy when describing specific aspects of their implementation. For example, Solaris auditing uses audit policy options to configure some aspects of auditing policy. The following table points to glossary, man page, and information on features that use the word policy to describe specific aspects of their implementation.
Table 1–1 Use of Policy in the Solaris OS
Glossary Definition |
Selected Man Pages |
Further Information |
---|---|---|
Chapter 25, Administering Kerberos Principals and Policies (Tasks) |
||
ipfilter(5), ifconfig(1M), ike.config(4), ipsecconf(1M), routeadm(1M) |
Part IV, IP Security, in System Administration Guide: IP Services |
|