Trusted Extensions Configuration and Administration

Exit Print View

Updated: July 2014
 
 

Understanding Your Site's Security Policy

Trusted Extensions effectively enables you to integrate your site's security policy with the Oracle Solaris OS. Thus, you need to have a good understanding of the scope of your policy and how Trusted Extensions software can implement that policy. A well-planned configuration must provide a balance between consistency with your site security policy and convenience for users who are working on the system.

    Trusted Extensions is certified to comply with the Common Criteria Recognition Agreement (CCRA) at Assurance Level EAL4+ against the following protection profiles:

  • Advanced Management

  • Extended Identification and Authentication

  • Labeled Security

  • Virtualization

For more information, see the Common Criteria web site.