|Skip Navigation Links|
|Exit Print View|
|Oracle Solaris Trusted Extensions Label Administration Oracle Solaris 11 Express 11/10|
The manager in charge of information protection identifies an experienced administrator with the following qualifications:
Is assessed to be trustworthy
Knows how to administer Solaris systems
Understands the organization's information-processing goals well enough to be responsible for overseeing and implementing the site's security
That person is assigned the job of security administrator.
Long before installing Trusted Extensions software, the security administrator starts to learn about security and to prepare a plan for the site's security policy. First, the security administrator reads the following documents:
Chapter 1, Security Planning for Trusted Extensions, in Oracle Solaris Trusted Extensions Configuration and Administration – For guidance on creating a site's security policy
Oracle Solaris Trusted Extensions User Guide – To become familiar with label types and label appearance
Oracle Solaris Trusted Extensions Configuration and Administration – To become familiar with security administrator responsibilities and tools
Chapter 1, Labels in Trusted Extensions Software (Overview) – To review label concepts
Then, the security administrator starts with a plan for the site's labels. The planning process is described in the following sections.