Sun Cluster Security Hardening uses the Solaris operating system hardening techniques recommended by the Sun BluePrintsTM program to achieve basic security hardening for clusters. The Solaris Security Toolkit automates the implementation of Sun Cluster Security Hardening.
The Sun Cluster Security Hardening documentation is available at http://www.sun.com/blueprints/0203/817-1079.pdf. You can also access the article from http://www.sun.com/software/security/blueprints. From this URL, scroll down to the Architecture heading to locate the article “Securing the Sun Cluster 3.x Software.” The documentation describes how to secure Sun Cluster 3.x deployments in a Solaris environment. The description includes the use of the Solaris Security Toolkit and other best-practice security techniques recommended by Sun security experts. The following data services are support by Sun Cluster security hardening:
Sun Cluster HA for Apache
Sun Cluster HA for Apache Tomcat
Sun Cluster HA for BEA WebLogic Server
Sun Cluster HA for DHCP
Sun Cluster HA for DNS
Sun Cluster HA for MySQL
Sun Cluster HA for N1 GridEngine
Sun Cluster HA for NetBackup
Sun Cluster HA for NFS
Sun Cluster HA for Oracle E-Business Suite
Sun Cluster HA for Oracle
Sun Cluster Support for Oracle Real Application Clusters
Sun Cluster HA for PostgreSQL
Sun Cluster HA for Samba
Sun Cluster HA for Siebel
Sun Cluster HA for Solaris Containers
Sun Cluster HA for SWIFTAlliance Access
Sun Cluster HA for SWIFTAlliance Gateway
Sun Cluster HA for Sun Java System Directory Server
Sun Cluster HA for Sun Java System Message Queue
Sun Cluster HA for Sun Java System Messaging Server
Sun Cluster HA for Sun Java System Web Server
Sun Cluster HA for Sybase ASE
Sun Cluster HA for WebSphere MQ
Sun Cluster HA for WebSphere MQ Integrator