1. Security Planning for Trusted Extensions
2. Configuration Roadmap for Trusted Extensions
3. Adding Trusted Extensions Software to the Solaris OS (Tasks)
4. Configuring Trusted Extensions (Tasks)
5. Configuring LDAP for Trusted Extensions (Tasks)
6. Configuring a Headless System With Trusted Extensions (Tasks)
Creating and Managing a Security Policy
Computer Security Recommendations
Physical Security Recommendations
Personnel Security Recommendations
Additional Security References
General Computer Security Publications
B. Using CDE Actions to Install Zones in Trusted Extensions
The security administrator must design the Trusted Extensions network based on the site's security policy. The security policy dictates configuration decisions, such as the following:
How much auditing is done for all users and for which classes of events
How much auditing is done for users in roles and for which classes of events
How audit data is managed, archived, and reviewed
Which labels are used in the system and whether the ADMIN_LOW and ADMIN_HIGH labels will viewable by regular users
Which user clearances are assigned to individuals
Which devices (if any) can be allocated by which regular users
Which label ranges are defined for systems, printers, and other devices
Whether Trusted Extensions is used in an evaluated configuration or not