Skip Navigation Links | |
Exit Print View | |
Oracle Solaris 11 Security Guidelines Oracle Solaris 11 Information Library |
1. Overview of Oracle Solaris 11 Security
2. Configuring Oracle Solaris 11 Security
This guide presents security guidelines for the Oracle Solaris operating system (Oracle Solaris OS). First, the guide describes security issues that an enterprise OS must address. Then, it describes the default security features of the Oracle Solaris OS. Finally, the guide provides specific steps to take to harden the system and to use Oracle Solaris security features to protect your data and applications. You can tailor the recommendations in this guide to your site security policy.
Oracle Solaris 11 Security Guidelines is intended for security administrators and other administrators who perform the following tasks:
Analyze security requirements
Implement site security policy in software
Install and configure the Oracle Solaris OS
Maintain system and network security
To use this guide, you must have general knowledge of UNIX administration, a good foundation in software security, and knowledge of your site security policy.
Oracle customers have access to electronic support through My Oracle Support. For information, visit http://www.oracle.com/pls/topic/lookup?ctx=acc&id=info or visit http://www.oracle.com/pls/topic/lookup?ctx=acc&id=trs if you are hearing impaired.
The following table describes the typographic conventions that are used in this book.
Table P-1 Typographic Conventions
|
The following table shows the default UNIX system prompt and superuser prompt for shells that are included in the Oracle Solaris OS. Note that the default system prompt that is displayed in command examples varies, depending on the Oracle Solaris release.
Table P-2 Shell Prompts
|