1. Labels in Trusted Extensions Software
3. Making a Label Encodings File (Tasks)
4. Labeling Printer Output (Tasks)
5. Customizing LOCAL DEFINITIONS
6. Example: Planning an Organization's Labels
Identifying the Site's Label Requirements
Satisfying Information Protection Goals
Trusted Extensions Features That Address Labeling and Access
Analyzing the Requirements for Each Label
Requirements for CONFIDENTIAL: INTERNAL_USE_ONLY
Requirements for CONFIDENTIAL: NEED_TO_KNOW
Requirements for CONFIDENTIAL: REGISTERED
Names of Groups With NEED_TO_KNOW Label
Understanding the Set of Labels
Planning the Use of Words in MAC
Planning the Use of Words in Labeling System Output
Planning Unlabeled Printer Output
Planning for Supporting Procedures
Rules for Protecting a REGISTERED File or Directory
Rules for Configuring Printers
Rules for Handling Printer Output
Planning the Classification Values in a Worksheet
Planning the Compartment Values and Combination Constraints in a Worksheet
Planning the Clearances in a Worksheet
Planning the Printer Banners in a Worksheet
Planning the Channels in a Worksheet
Planning the Minimums in an Accreditation Range
Planning the Colors in a Worksheet
Editing and Installing the label_encodings File
Encoding the Sensitivity Labels
Encoding the Information Labels
Encoding the Accreditation Range
Encoding the Local Definitions
Encoding the Column Headers in Label Builders
Configuring Users and Printers for Labels
The management identifies an experienced administrator with the following qualifications:
Is assessed to be trustworthy
Knows how to administer Solaris systems
Understands the organization's information-processing goals well enough to be responsible for overseeing or implementing the site's security
That person is assigned the job of security administrator.
Long before installing Trusted Extensions software, the security administrator starts to learn about security and to prepare a plan for the site's security policy. First, the security administrator reads the following documents:
Chapter 1, Security Planning for Trusted Extensions, in Oracle Solaris Trusted Extensions Configuration Guide – For guidance on creating a site's security policy
Oracle Solaris Trusted Extensions User’s Guide – To become familiar with label types and appearance
Oracle Solaris Trusted Extensions Administrator’s Procedures – To become familiar with security administrator responsibilities and tools
Chapter 1, Labels in Trusted Extensions Software – To review label concepts
Then, the security administrator starts with a plan for the site's labels. The planning process is described in the following sections.