Trusted Solaris User's Guide

Protecting Information on the System through Access Control

If an intruder does successfully log into the system, there are further obstacles to getting surreptitious access to information. Files and other resources are protected by both access control set by the owner of the information and access control enforced by the system. See "How Trusted Solaris Enforces Access Control Policy".