Preface

This manual contains reference information for understanding and using Solaristrademark Security Toolkit software. This manual is primarily intended for persons who use the Solaris Security Toolkit software to secure Solaristrademark Operating System (OS) versions 8, 9, and 10, such as administrators, consultants, and others, who are deploying new Sun systems or securing deployed systems. The instructions apply to using the software in either its JumpStarttrademark mode or stand-alone mode.


Before You Read This Book

You should be a Sun Certified System Administrator for Solaristrademark or Sun Certified Network Administrator for Solaristrademark. You should also have an understanding of standard network protocols and topologies.

Because this book is designed to be useful to people with varying degrees of experience or knowledge of security, your experience and knowledge will determine how you use this book.


How This Book Is Organized

This manual serves as a user guide. Its chapters contain information, instructions, and guidelines for using the software to secure systems. This book is structured as follows:

Chapter 1 describes the design and purpose of the Solaris Security Toolkit software. It covers the key components, features, benefits, and supported platforms.

Chapter 2 provides a methodology for securing systems. You can apply the Solaris Security Toolkit process before securing your systems using the software.

Chapter 3 provides instructions for downloading, installing, and running the Solaris Security Toolkit software and other security-related software.

Chapter 4 provides information and procedures for reversing (undoing) the changes made by the Solaris Security Toolkit software during hardening runs.

Chapter 5 provides information for configuring and managing JumpStart servers to use the Solaris Security Toolkit software.

Chapter 6 describes how to audit (validate) a system's security using the Solaris Security Toolkit software. Use the information and procedures in this chapter for maintaining an established security profile after hardening.

Chapter 7 describes how to apply the information and expertise provided in earlier chapters to a realistic scenario for installing and securing a new system.


Using UNIX Commands

This document might not contain information on basic UNIX® commands and procedures such as shutting down the system, booting the system, and configuring devices. Refer to the following for this information:

http://docs.sun.com


Shell Prompts


Shell

Prompt

C shell

machine-name%

C shell superuser

machine-name#

Bourne shell and Korn shell

$

Bourne shell and Korn shell superuser

#



Typographic Conventions


Typeface[1]

Meaning

Examples

AaBbCc123

The names of commands, files, and directories; on-screen computer output

Edit your.login file.

Use ls -a to list all files.

% You have mail.

AaBbCc123

What you type, when contrasted with on-screen computer output

% su

Password:

AaBbCc123

Book titles, new words or terms, words to be emphasized. Replace command-line variables with real names or values.

Read Chapter 6 in the User's Guide.

These are called class options.

You must be superuser to do this.

To delete a file, type rm filename.



Using Generic Terms for Hardware Models

Sun Firetrademark high-end systems refers to these model numbers:

Sun Fire midrange systems refers to these model numbers:

Sun Fire entry-level midrange systems refers to these model numbers:


Supported Hardware Systems

Solaris Security Toolkit 4.2 software supports SPARC®, 64-bit only, and x86/x64 systems running the Solaris 10 OS. Solaris Security Toolkit 4.2 software does support SPARC 32-bit systems running on Solaris 8 and 9; for example, the Ultra 2 Creator 3D.


Supported Solaris OS Versions

Sun support for Solaris Security Toolkit software is available only for its use in the Solaris 8, Solaris 9, and Solaris 10 Operating Systems.



Note - For Solaris Security Toolkit 4.2 software, Solaris 10 can be used only on Sun Fire high-end systems domains, not on the system controller (SC).



While the software can be used in the Solaris 2.5.1, Solaris 2.6, and Solaris 7 Operating Systems, Sun support is not available for its use in those operating systems.

The Solaris Security Toolkit software automatically detects which version of the Solaris Operating System software is installed, then runs tasks appropriate for that operating system version.

Note in examples provided throughout this document that when a script checks for a version of the OS, it checks for 5.x, the SunOStrademark versions, instead of 2.x, 7, 8, 9, or 10, the Solaris OS versions. TABLE P-1 shows the correlation between SunOS and Solaris OS versions.


TABLE P-1 Correlation Between SunOS and Solaris OS Versions

SunOS Version

Solaris OS Version

5.5.1

2.5.1

5.6

2.6

5.7

7

5.8

8

5.9

9

5.10

10



Supported SMS Versions

If you are using System Management Services (SMS) to run the system controller (SC) on your Sun Fire high-end systems, then Solaris Security Toolkit 4.2 software is supported on all Solaris 8 and 9 OS versions when used with SMS versions 1.3, 1.4.1, and 1.5. No version of SMS is supported on Solaris 10 OS with Solaris Security Toolkit 4.2 software.



Note - For Solaris Security Toolkit 4.2 software, Solaris 10 can be used only on domains, not on the system controller (SC).




Related Documentation

The documents listed as online are available at:

http://www.sun.com/products-n-solutions/hardware/docs/
Software/enterprise_computing/systems_management/sst/index.html


Application

Title

Part Number

Format

Location

Release Notes

Solaris Security Toolkit 4.2 Release Notes

819-1504-10

PDF

HTML

Online

Reference

Solaris Security Toolkit 4.2 Reference Manual

819-1503-10

PDF

HTML

Online

Man Pages

Solaris Security Toolkit 4.2 Man Page Guide

819-1505-10

PDF

Online



Documentation, Support, and Training


Sun Function

URL

Description

Documentation

http://www.sun.com/documentation/

Download PDF and HTML documents, and order printed documents

Support

http://www.sun.com/support/

Obtain technical support and download patches

Training

http://www.sun.com/training/

Learn about Sun courses



Third-Party Web Sites

Sun is not responsible for the availability of third-party web sites mentioned in this document. Sun does not endorse and is not responsible or liable for any content, advertising, products, or other materials that are available on or through such sites or resources. Sun will not be responsible or liable for any actual or alleged damage or loss caused by or in connection with the use of or reliance on any such content, goods, or services that are available on or through such sites or resources.


Sun Welcomes Your Comments

Sun is interested in improving its documentation and welcomes your comments and suggestions. You can submit your comments by going to:

http://www.sun.com/hwdocs/feedback

Please include the title and part number of your document with your feedback:

Solaris Security Toolkit 4.2 Administration Guide, part number 819-1402-10

 


1 (TableFootnote) The settings on your browser might differ from these settings.