JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Sun Server X3-2 (formerly Sun fire X4170 M3)

Security Guide

search filter icon
search icon

Document Information

Sun Server X3-2 Security Guide

Basic Security

Using Server Configuration and Management Tools Securely

Planning a Secure Environment

Maintaining a Secure Environment

Basic Security

This document provides general security guidelines to help you protect the Oracle Sun Server X3-2, its network interfaces, and the network switches to which it is connected.

Contact your IT Security Officer for additional security requirements that pertain to your system and specific environment.

This section covers the four basic security principles that you should adhere to when using all hardware and software: access, authentication, authorization, and accounting.

Access

Access refers to physical access to hardware, or physical or virtual access to software.

Authentication

Authentication refers to ensuring that users of hardware or software are who they say they are.

Authorization

Authorization refers to restrictions placed on personnel to work with hardware or software.

Accounting

Accounting refers to software and hardware features used to monitor login activity and maintenance of hardware inventories.