Solaris Security Toolkit 4.2 Administration Guide
819-1402-10
Contents |
Securing Systems With the Solaris Security Toolkit Software
Understanding the Software Components
Configuring and Customizing the Solaris Security Toolkit Software
2. Securing Systems: Applying a Methodology
Considering Risks and Benefits
Reviewing Security Policy, Standards, and Related Documentation
Determining Application and Service Requirements
Identifying Application and Operational Service Inventory
Determining Service Requirements
Developing and Implementing a Solaris Security Toolkit Profile
Performing Preinstallation Tasks
Performing the Post-installation Task
Verifying Application and Service Functionality
Verifying Security Profile Installation
Verifying Application and Service Functionality
3. Upgrading, Installing, and Running Security Software
Performing Planning and Preinstallation Tasks
To Upgrade Solaris Security Toolkit Software and the Solaris Operating System
To Upgrade Solaris Security Toolkit Software Only
Downloading Solaris Security Toolkit Software
Downloading Recommended Patch Cluster Software
To Download Recommended Patch Cluster Software
Installing and Executing the Software
Executing the Software in Stand-alone Mode
To Execute the Software in Stand-alone Mode
Executing the Software in JumpStart Mode
To Execute the Software in JumpStart Mode
Validating the System Modifications
Performing QA Checks of Services
Performing Security Assessments of Configuration
Performing the Post-installation Task
Understanding How Changes Are Logged and Reversed
Requirements for Undoing System Changes
Customizing Scripts to Undo Changes
Checking for Files That Were Manually Changed
Using Options With the Undo Feature
To Undo a Solaris Security Toolkit Run
5. Configuring and Managing JumpStart Servers
Configuring JumpStart Servers and Environments
To Configure for JumpStart Mode
Using JumpStart Profile Templates
minimal-SunFire_Domain*.profile
Reviewing Security Prior to Hardening
Using Options and Controlling Audit Output
Host Name, Script Name, and Timestamp Output
Downloading and Installing Security Software
To Download and Install the Security Software
Specifying and Installing the OS Cluster
To Specify and Install the OS Cluster
Configuring the JumpStart Server and Client
Validating and Checking the Rules File
Customizing the Hardening Configuration
Installing Secure Shell Software
Customizing the syslog.conf File
To Customize the syslog.conf File
To Verify Profile Installation
To Verify Application and Service Functionality
Copyright © 2005, Sun Microsystems, Inc. All Rights Reserved.