Machine security ensures that the machine's resources are used properly. Access control enables users or administrators to restrict the users who are permitted access to resources on the system. The Solaris operating environment features for machine security and access control include the following:
Login control – Access to the hardware, files, and processes on a computer. See Chapter 3, Securing Machines (Tasks).
UNIX® permissions – Attributes of a file or directory. Permissions restrict the users and groups that are permitted to read, write, or execute a file, or search a directory. See Chapter 4, Securing Files (Tasks).
Role-Based Access Control (RBAC) – An architecture for creating special, restricted user accounts that are permitted to perform specific security-related tasks. See Chapter 5, Role-Based Access Control (Overview).
Security Enhancement Scripts – Through the use of scripts, many system files and parameters can be adjusted to reduce security risks. See Chapter 8, Using the Automated Security Enhancement Tool (Tasks).
Device Allocation – A facility that enables restriction on who can use a device, such as a floppy or CD-ROM drive. The facility ensures that a device is used by only one qualified user at a time. See Managing Device Allocation (Tasks).
SunScreenTM 3.2 Secure Net –A firewall for selectively controlling the flow of information into and out of an organization's network. The firewall also can control the flow of information between segments of a network. See the SunScreen 3.2 documentation set.