Solaris Trusted Extensions Installation and Configuration for Solaris 10 11/06 and Solaris 10 8/07 Releases

Devising an Installation and Configuration Strategy for Trusted Extensions

As in the Solaris OS, Trusted Extensions software is initially installed by the root user. However, allowing the root user to configure the software is not a secure strategy. The following describes the installation and configuration strategies from the most secure strategy to the least secure strategy:

Task division by role is shown in the following figure. The security administrator sets up auditing, protects file systems, sets device policy, determines which programs require privilege to run, and protects users, among other tasks. The system administrator shares and mounts file systems, installs software packages, and creates users, among other tasks.

Figure 1–1 Administering a Trusted Extensions System: Task Division by Role

Illustration shows the install team tasks, then shows
the tasks for the Security Administrator and the System Administrator.