The management identifies an experienced administrator with the following qualifications:
Is assessed to be trustworthy
Knows how to administer Solaris systems
Understands the organization's information-processing goals well enough to be responsible for overseeing or implementing the site's security
That person is assigned the job of security administrator.
Long before installing Trusted Extensions software, the security administrator starts to learn about security and to prepare a plan for the site's security policy. First, the security administrator reads the following documents:
Chapter 1, Security Planning for Trusted Extensions, in Oracle Solaris Trusted Extensions Configuration Guide – For guidance on creating a site's security policy
Oracle Solaris Trusted Extensions User’s Guide – To become familiar with label types and appearance
Oracle Solaris Trusted Extensions Administrator’s Procedures – To become familiar with security administrator responsibilities and tools
Chapter 1, Labels in Trusted Extensions Software – To review label concepts
Then, the security administrator starts with a plan for the site's labels. The planning process is described in the following sections.