JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Solaris 10 Security Guidelines     Oracle Solaris 10 1/13 Information Library
search filter icon
search icon

Document Information


1.  Oracle Solaris 10 Security Guidelines


This guide provides pointers to and descriptions of security guidelines for the Oracle Solaris operating system (Oracle Solaris OS). The system hardening references describe how to harden Oracle Solaris 10 systems and how to use Oracle Solaris security features to protect your data and applications. You can tailor the recommendations in these references to your site security policy.

Additionally, this guide provides pointers to background information about Oracle Solaris security, and white papers that guide you through common implementations.


The Oracle Solaris 10 Security Guidelines is intended for security administrators and other administrators who perform the following tasks:

To use this guide, you must have general knowledge of UNIX administration, a good foundation in software security, and knowledge of your site security policy.

Access to Oracle Support

Oracle customers have access to electronic support through My Oracle Support. For information, visit or visit if you are hearing impaired.

Typographic Conventions

The following table describes the typographic conventions that are used in this book.

Table P-1 Typographic Conventions

The names of commands, files, and directories, and onscreen computer output
Edit your .login file.

Use ls -a to list all files.

machine_name% you have mail.

What you type, contrasted with onscreen computer output
machine_name% su


Placeholder: replace with a real name or value
The command to remove a file is rm filename.
Book titles, new terms, and terms to be emphasized
Read Chapter 6 in the User's Guide.

A cache is a copy that is stored locally.

Do not save the file.

Note: Some emphasized items appear bold online.

Shell Prompts in Command Examples

The following table shows UNIX system prompts and superuser prompts for shells that are included in the Oracle Solaris OS. In command examples, the shell prompt indicates whether the command should be executed by a regular user or a user with privileges.

Table P-2 Shell Prompts

Bash shell, Korn shell, and Bourne shell
Bash shell, Korn shell, and Bourne shell for superuser
C shell
C shell for superuser